Compare commits

...

47 commits

Author SHA1 Message Date
d218d0495d Format all files 2024-11-29 01:15:08 +01:00
6d1c9fee53 FIx handling users with no docker services 2024-11-29 01:15:08 +01:00
7f9616be02 Fix invalid git cli call 2024-11-29 01:15:08 +01:00
e20681a1bd Add missing function argument 2024-11-29 01:15:08 +01:00
597fa1ee1f Inherit all env variables in the tmux session 2024-11-29 01:15:08 +01:00
98ff044bc2 Back up teamspeak properly 2024-11-29 01:15:08 +01:00
85b6f8ccc6 Force creation of an ssh key for backups 2024-11-29 01:15:08 +01:00
d1588b4d9f Preserve PATH for setup actions 2024-11-29 01:15:08 +01:00
9b53e96561 Add scripts for installing a terraria server 2024-11-29 01:15:08 +01:00
70d2323d68 Back up extra files using getExtraBackupPatterns 2024-11-29 01:15:08 +01:00
2e1fa261bd Remove world mounts for minecraft services 2024-11-29 01:15:08 +01:00
080d3d3222 Simplify xaseco command handling 2024-11-29 01:15:08 +01:00
1e2ce910c2 Silence unnecessary output 2024-11-29 01:15:08 +01:00
f259592064 Allow specifying xaseco operators and admins 2024-11-29 01:15:08 +01:00
df1077ffe8 Normalize display name of vaultwarden mailer 2024-11-29 01:15:08 +01:00
8bed36aed5 Store all game data of TrackMania service 2024-11-29 01:15:08 +01:00
3b9943f1a1 Add declaration of transmission service 2024-11-29 01:15:08 +01:00
05d0d5a692 Leave user of wekan container unchanged 2024-11-29 01:15:08 +01:00
5970d729af Store domain names in overrides 2024-11-29 01:15:08 +01:00
3b489ee5fb Normalize the save path of service data 2024-11-29 01:15:08 +01:00
ad1d72d85b Improve the format of the docker files 2024-11-29 01:15:08 +01:00
54b6eccbf0 Rename secrets files to overrides 2024-11-29 01:15:08 +01:00
d3134647dd Store Jellyfin domain in secrets 2024-11-29 01:15:08 +01:00
3ab2b71afb Allow specifying overrides for docker services 2024-11-29 01:15:08 +01:00
d144876afb Allow specifying additional patterns to back up 2024-11-29 01:15:08 +01:00
18e531141b Configure forgejo runner by default 2024-11-29 01:15:08 +01:00
4db9a640b3 Store all forgejo files in data/ 2024-11-29 01:15:08 +01:00
5ee149e42a Set forgejo domain by default 2024-11-29 01:15:08 +01:00
269f8b89e9 Reduce redundancy of drone setup 2024-11-29 01:15:08 +01:00
d9ace95328 Fix order of properties in drone templates 2024-11-29 01:15:08 +01:00
7248ec703a Load enabled services from machine config 2024-11-29 01:15:08 +01:00
e25c00cd39 Ensure nix channels are functioning 2024-11-29 01:15:08 +01:00
df2e0ffc16 Force running actions as setup-user 2024-11-29 01:15:08 +01:00
981e6eaa5c Skip backup questions if specified 2024-11-29 01:15:08 +01:00
222467b5ae Create backup whitelist for docker-compose 2024-11-29 01:15:08 +01:00
f8e4e94af5 Add a profile for the server 2024-11-29 01:15:08 +01:00
67e5e04a06 Add options for enabling docker-compose services 2024-11-29 01:15:08 +01:00
3df1501fbc Add scripts for installing woodpecker 2024-11-29 01:15:08 +01:00
395d69c974 Add scripts for installing wekan 2024-11-29 01:15:08 +01:00
567a0d8070 Add scripts for installing TrackMania server 2024-11-29 01:15:08 +01:00
b4b87f37ea Replace yq with go-yq 2024-11-29 01:15:08 +01:00
5e1686402c Add scripts for installing TeamSpeak 2024-11-29 01:15:08 +01:00
885e7cf9d0 Add scripts for installing ryot 2024-11-29 01:15:08 +01:00
8b9758dea0 Add scripts for installing nextcloud 2024-11-29 01:15:08 +01:00
ed237fb750 Restructure service overrides 2024-11-29 01:15:08 +01:00
61276f51c9 Add scripts for installing Minecraft 2024-11-29 01:15:08 +01:00
a4bd5c60d2 Add settings for allowing VPN access in lxc 2024-11-29 01:15:08 +01:00
106 changed files with 2638 additions and 797 deletions

View file

@ -5,17 +5,16 @@ fi
~/.automated_script.sh ~/.automated_script.sh
if bash -c "ls /sys/class/backlight/*/max_brightness" > /dev/null 2>&1 if bash -c "ls /sys/class/backlight/*/max_brightness" >/dev/null 2>&1; then
then cat /sys/class/backlight/*/max_brightness >/sys/class/backlight/*/brightness
cat /sys/class/backlight/*/max_brightness > /sys/class/backlight/*/brightness
fi fi
cd "/root/PortValhalla" || exit cd "/root/PortValhalla" || exit
git diff -p -R --no-ext-diff --no-color --diff-filter=M \ git diff -p -R --no-ext-diff --no-color --diff-filter=M |
| grep -E "^(diff|(old|new) mode)" --color=never \ grep -E "^(diff|(old|new) mode)" --color=never |
| sed "/^diff/{ x; d; }; x; /./{ p; z; }; x;" \ sed "/^diff/{ x; d; }; x; /./{ p; z; }; x;" |
| git apply git apply
loadkeys de_CH-latin1 loadkeys de_CH-latin1
./scripts/Arch/OS/setup.fish ./scripts/Arch/OS/setup.fish

View file

@ -16,9 +16,8 @@ begin
and begin and begin
git -C "$projectDir" ls-files git -C "$projectDir" ls-files
git -C "$projectDir" ls-files --exclude-standard --others git -C "$projectDir" ls-files --exclude-standard --others
end | \ end | rsync --files-from=/dev/stdin --exclude={.gitignore,README.md,scripts,LICENSE,valhalla.patch} "$dir/.." "$contextRoot"
rsync --files-from=/dev/stdin --exclude={.gitignore,README.md,scripts,LICENSE,valhalla.patch} "$dir/.." "$contextRoot" end &>/dev/null
end &> /dev/null
and git -C "$contextRoot" diff and git -C "$contextRoot" diff
end end

View file

@ -2,5 +2,5 @@
# Updates the patch to be applicable to Arch's current `releng` template. # Updates the patch to be applicable to Arch's current `releng` template.
begin begin
set -l dir (status dirname) set -l dir (status dirname)
"$dir/show-diff.fish" > "$dir/valhalla.patch" "$dir/show-diff.fish" >"$dir/valhalla.patch"
end end

View file

@ -1,23 +1,22 @@
diff --git a/airootfs/root/.zlogin b/airootfs/root/.zlogin diff --git a/airootfs/root/.zlogin b/airootfs/root/.zlogin
index bf6bc8f..bdbe55c 100644 index bf6bc8f..e71dc26 100644
--- a/airootfs/root/.zlogin --- a/airootfs/root/.zlogin
+++ b/airootfs/root/.zlogin +++ b/airootfs/root/.zlogin
@@ -4,3 +4,18 @@ if grep -Fqa 'accessibility=' /proc/cmdline &> /dev/null; then @@ -4,3 +4,17 @@ if grep -Fqa 'accessibility=' /proc/cmdline &> /dev/null; then
fi fi
~/.automated_script.sh ~/.automated_script.sh
+ +
+if bash -c "ls /sys/class/backlight/*/max_brightness" > /dev/null 2>&1 +if bash -c "ls /sys/class/backlight/*/max_brightness" >/dev/null 2>&1; then
+then + cat /sys/class/backlight/*/max_brightness >/sys/class/backlight/*/brightness
+ cat /sys/class/backlight/*/max_brightness > /sys/class/backlight/*/brightness
+fi +fi
+ +
+cd "/root/PortValhalla" || exit +cd "/root/PortValhalla" || exit
+ +
+git diff -p -R --no-ext-diff --no-color --diff-filter=M \ +git diff -p -R --no-ext-diff --no-color --diff-filter=M |
+ | grep -E "^(diff|(old|new) mode)" --color=never \ + grep -E "^(diff|(old|new) mode)" --color=never |
+ | sed "/^diff/{ x; d; }; x; /./{ p; z; }; x;" \ + sed "/^diff/{ x; d; }; x; /./{ p; z; }; x;" |
+ | git apply + git apply
+ +
+loadkeys de_CH-latin1 +loadkeys de_CH-latin1
+./scripts/Arch/OS/setup.fish +./scripts/Arch/OS/setup.fish

View file

@ -45,6 +45,7 @@
valhalla = { valhalla = {
DerGeret = import ./profiles/machines/manuel/DerGeret/Arch/config.nix; DerGeret = import ./profiles/machines/manuel/DerGeret/Arch/config.nix;
ManuSurface = import ./profiles/machines/manuel/ManuSurface/Arch/config.nix; ManuSurface = import ./profiles/machines/manuel/ManuSurface/Arch/config.nix;
server = import ./profiles/machines/manuel/server.nix;
}; };
}; };
} }

View file

@ -5,8 +5,10 @@ let
overlay = [ ]; overlay = [ ];
}; };
property = (builtins.getEnv "PROPERTY"); property = (builtins.getEnv "PROPERTY");
processor = if (builtins.stringLength property > 0) then processor =
(_: lib.attrsets.getAttrFromPath (lib.strings.splitString "." property) _) if (builtins.stringLength property > 0) then
else (_: lib.attrsets.getAttrFromPath (lib.strings.splitString "." property) _)
(_: _); else
in _: processor (lib.evalModules { modules = [ _ ]; }).config (_: _);
in
_: processor (lib.evalModules { modules = [ _ ]; }).config

View file

@ -3,7 +3,8 @@ let
inherit (lib) mkOption types; inherit (lib) mkOption types;
optionalAttrs = lib.attrsets.optionalAttrs; optionalAttrs = lib.attrsets.optionalAttrs;
hw = config.valhalla.hardware; hw = config.valhalla.hardware;
in { in
{
options = { options = {
valhalla = { valhalla = {
hardware = { hardware = {

View file

@ -4,7 +4,8 @@ in {
options = { options = {
valhalla = mkOption { valhalla = mkOption {
type = types.submodule ( type = types.submodule (
{ extendModules, ... }: let { extendModules, ... }:
let
osVariant = extendModules { osVariant = extendModules {
modules = [ modules = [
({ config, ... }: { ({ config, ... }: {
@ -35,7 +36,8 @@ in {
}; };
windowsVariant = osVariant.extendModules { }; windowsVariant = osVariant.extendModules { };
in { in
{
options = { options = {
linux = mkOption { linux = mkOption {
inherit (linuxVariant) type; inherit (linuxVariant) type;
@ -51,7 +53,8 @@ in {
visible = "shallow"; visible = "shallow";
}; };
}; };
}); }
);
description = "Configuration for PortValhalla."; description = "Configuration for PortValhalla.";
default = { }; default = { };

View file

@ -34,15 +34,17 @@ let
}; };
devicePath = mkOption { devicePath = mkOption {
type = if osDisk then type =
types.nullOr types.str if osDisk then
else types.nullOr types.str
types.str; else
types.str;
description = "The path to the device."; description = "The path to the device.";
default = if osDisk && config.deviceName == null then default =
null if osDisk && config.deviceName == null then
else null
"/dev/${config.deviceName}"; else
"/dev/${config.deviceName}";
}; };
deviceScript = mkOption { deviceScript = mkOption {
@ -69,135 +71,146 @@ let
}; };
}; };
config = let config =
diskVarName = "${diskListVarName}[${config.id}]"; let
diskVar = "\${${diskVarName}}"; diskVarName = "${diskListVarName}[${config.id}]";
diskVar = "\${${diskVarName}}";
diskSelector = '' diskSelector = ''
result="$(mktemp)" result="$(mktemp)"
fish ${./choose-disk.fish} "$result" "Which disk do you wish to install the OS on?" ${./select.fish} fish ${./choose-disk.fish} "$result" "Which disk do you wish to install the OS on?" ${./select.fish}
${diskVarName}="$(cat "$result")" ${diskVarName}="$(cat "$result")"
''; '';
partitions = lib.lists.sortOn (_: _.index) partitions = lib.lists.sortOn (_: _.index)
(builtins.filter (_: _ != null) (builtins.filter (_: _ != null)
(builtins.attrValues config.partitions)); (builtins.attrValues config.partitions));
mkType = type: mkType = type:
lib.strings.escapeShellArg ( lib.strings.escapeShellArg (
if builtins.isInt type then if builtins.isInt type then
"${lib.trivial.toHexString type}" "${lib.trivial.toHexString type}"
else else
type); type
);
fdiskCommand = arguments: "sudo sfdisk ${arguments}"; fdiskCommand = arguments: "sudo sfdisk ${arguments}";
fdiskScript = script: args: append: fdiskScript = script: args: append:
"echo ${script} | ${ "echo ${script} | ${
fdiskCommand "${builtins.concatStringsSep " " args} ${ fdiskCommand "${builtins.concatStringsSep " " args} ${
if append then "--append" else "" if append then "--append" else ""
} ${diskVar}" } ${diskVar}"
}"; }";
wipeScript = script: fdiskScript script [] false; wipeScript = script: fdiskScript script [ ] false;
appendScript = index: script: fdiskScript script ["-N" (builtins.toString index)] true; appendScript = index: script: fdiskScript script [ "-N" (builtins.toString index) ] true;
cleanup = lib.strings.concatLines (builtins.map cleanup = lib.strings.concatLines (builtins.map
(partition: "${fdiskCommand "--delete ${diskVar} ${toString partition.index}"} || true") (partition: "${fdiskCommand "--delete ${diskVar} ${toString partition.index}"} || true")
(lib.lists.sortOn (lib.lists.sortOn
(partition: partition.index * -1) (partition: partition.index * -1)
(builtins.filter (_: !_.keepExisting) partitions))); (builtins.filter (_: !_.keepExisting) partitions)));
fdiskCommands = lib.strings.concatLines fdiskCommands = lib.strings.concatLines
(lib.optionals config.wipe [ (lib.optionals config.wipe [
cleanup cleanup
(wipeScript "label: gpt") (wipeScript "label: gpt")
] ++ (builtins.concatMap ( ] ++ (builtins.concatMap
partition: (
let partition:
inherit (partition) format index keepExisting label sizeScript type; let
inherit (partition) format index keepExisting label sizeScript type;
partVarName = "myPartition"; partVarName = "myPartition";
partVar = "\${${partVarName}}"; partVar = "\${${partVarName}}";
sizeOption = '' sizeOption = ''
${sizeScript} | sed -e "s/.*[^[:space:]]/size=\0/" ${sizeScript} | sed -e "s/.*[^[:space:]]/size=\0/"
''; '';
formatScripts = { formatScripts = {
${fs.ext4} = "mkfs.ext4 -F ${partVar}"; ${fs.ext4} = "mkfs.ext4 -F ${partVar}";
${fs.swap} = "mkswap ${partVar}"; ${fs.swap} = "mkswap ${partVar}";
${fs.ntfs} = "mkfs.ntfs -F ${partVar}"; ${fs.ntfs} = "mkfs.ntfs -F ${partVar}";
${fs.fat32} = "mkfs.fat -F 32 ${partVar}"; ${fs.fat32} = "mkfs.fat -F 32 ${partVar}";
}; };
labelScripts = { labelScripts = {
${fs.ext4} = label: "e2label ${partVar} ${label}"; ${fs.ext4} = label: "e2label ${partVar} ${label}";
${fs.swap} = label: "swaplabel ${partVar} --label ${label}"; ${fs.swap} = label: "swaplabel ${partVar} --label ${label}";
${fs.ntfs} = label: "ntfslabel ${partVar} ${label}"; ${fs.ntfs} = label: "ntfslabel ${partVar} ${label}";
${fs.fat32} = label: "fatlabel ${partVar} ${label}"; ${fs.fat32} = label: "fatlabel ${partVar} ${label}";
}; };
create = lib.strings.concatLines [ create = lib.strings.concatLines [
(appendScript index ''${toString index}: "$(${sizeOption})" type=${mkType type}'') (appendScript index ''${toString index}: "$(${sizeOption})" type=${mkType type}'')
probeScript probeScript
"sudo ${formatScripts.${format}}" "sudo ${formatScripts.${format}}"
]; ];
fallback = '' fallback = ''
if ! { ls "${partVar}" 2>&1; } > /dev/null if ! { ls "${partVar}" 2>&1; } > /dev/null
then then
${create} ${create}
fi fi
''; '';
in [ in
''local diskPath="$(find -L /dev/disk/by-diskseq -samefile ${diskVar})"'' [
''local ${partVarName}="$diskPath-part${toString index}"'' ''local diskPath="$(find -L /dev/disk/by-diskseq -samefile ${diskVar})"''
(if keepExisting then fallback else create) ''local ${partVarName}="$diskPath-part${toString index}"''
"sudo ${labelScripts.${format} label}" (if keepExisting then fallback else create)
]) partitions)); "sudo ${labelScripts.${format} label}"
]
)
partitions));
fixType = lib.strings.concatLines (builtins.concatMap ( fixType = lib.strings.concatLines (builtins.concatMap
partition: (
lib.optional partition:
(partition.keepExisting && !(builtins.isNull partition.type)) lib.optional
''sudo sfdisk --part-type ${diskVar} ${toString partition.index} ${mkType partition.type}'') (partition.keepExisting && !(builtins.isNull partition.type))
partitions); ''sudo sfdisk --part-type ${diskVar} ${toString partition.index} ${mkType partition.type}''
in { )
id = if osDisk then "os" else "disk-${name}"; partitions);
deviceVariable = diskVar; in
{
id = if osDisk then "os" else "disk-${name}";
deviceVariable = diskVar;
deviceScript = if osDisk && config.devicePath == null then '' deviceScript =
${diskSelector} if osDisk && config.devicePath == null then ''
'' else '' ${diskSelector}
${diskVarName}=${config.devicePath} '' else ''
${if osDisk then '' ${diskVarName}=${config.devicePath}
if [ ! -b ${diskVar} ]; then ${if osDisk then ''
function fallback() { if [ ! -b ${diskVar} ]; then
echo "Couldn't find the specified disk \"${diskVar}\"." function fallback() {
if fish ${./confirm.fish} "Do you want to install the OS on another disk?"; then echo "Couldn't find the specified disk \"${diskVar}\"."
${diskSelector} if fish ${./confirm.fish} "Do you want to install the OS on another disk?"; then
else ${diskSelector}
exit 1 else
exit 1
fi
}
fallback
fi fi
} '' else
""}
'';
fallback script = lib.mkDefault ''
fi function partition() {
'' else ${if (!config.wipe) then cleanup else ""}
""} ${probeScript}
''; ${fdiskCommands}
${fixType}
}
script = lib.mkDefault '' partition
function partition() { '';
${if (!config.wipe) then cleanup else ""} };
${probeScript} }
${fdiskCommands} );
${fixType}
}
partition
'';
};
});
partitionType = types.submodule ( partitionType = types.submodule (
{ name, config, ... }: { { name, config, ... }: {
@ -228,10 +241,11 @@ let
format = mkOption { format = mkOption {
type = types.enum (builtins.attrValues fs); type = types.enum (builtins.attrValues fs);
description = "The file system format of the partition."; description = "The file system format of the partition.";
default = if (isSwap config) then default =
fs.swap if (isSwap config) then
else fs.swap
throw ("Partition format not specified."); else
throw ("Partition format not specified.");
}; };
size = mkOption { size = mkOption {
@ -271,8 +285,10 @@ let
else else
"echo ${lib.strings.escapeShellArg (toString config.size)}"); "echo ${lib.strings.escapeShellArg (toString config.size)}");
}; };
}); }
in { );
in
{
options = { options = {
valhalla = { valhalla = {
partition = { partition = {
@ -304,41 +320,50 @@ in {
config = { config = {
valhalla = { valhalla = {
partition = { partition = {
script = lib.mkDefault (let script = lib.mkDefault (
cfg = config.valhalla.partition; let
inherit (cfg) os rootDir; cfg = config.valhalla.partition;
inherit (lib.strings) normalizePath; inherit (cfg) os rootDir;
partPath = part: "/dev/disk/by-label/${part.label}"; inherit (lib.strings) normalizePath;
disks = ([ os ] ++ (builtins.attrValues cfg.disks)); partPath = part: "/dev/disk/by-label/${part.label}";
partitions = (builtins.concatMap (_: (builtins.attrValues _.partitions)) disks); disks = ([ os ] ++ (builtins.attrValues cfg.disks));
partitions = (builtins.concatMap (_: (builtins.attrValues _.partitions)) disks);
mountScript = lib.strings.concatLines (builtins.concatMap ( mountScript = lib.strings.concatLines (builtins.concatMap
_: [ (
probeScript _: [
(builtins.concatStringsSep " " ([ probeScript
"sudo" (builtins.concatStringsSep " " ([
"mount" "sudo"
"--mkdir" "mount"
] ++ (lib.optionals (_.format == "ntfs") [ "--mkdir"
"-t" "ntfs3" ] ++ (lib.optionals (_.format == "ntfs") [
]) ++ [ "-t"
(builtins.concatStringsSep " " (builtins.map (_: "-o ${_}") _.mountOptions)) "ntfs3"
(partPath _) ]) ++ [
(normalizePath "/${rootDir}/${_.mountPoint}") (builtins.concatStringsSep " " (builtins.map (_: "-o ${_}") _.mountOptions))
])) (partPath _)
]) (lib.lists.sortOn (normalizePath "/${rootDir}/${_.mountPoint}")
(_: normalizePath "/${_.mountPoint}") ]))
]
)
(lib.lists.sortOn
(_: normalizePath "/${_.mountPoint}")
(builtins.filter (_: _.mountPoint != null) partitions))); (builtins.filter (_: _.mountPoint != null) partitions)));
swapScript = lib.strings.concatLines (builtins.map ( swapScript = lib.strings.concatLines (builtins.map
_: '' (
${probeScript} _: ''
sudo swapon ${partPath _} ${probeScript}
'') (builtins.filter (_: _.useSwap) partitions)); sudo swapon ${partPath _}
in lib.strings.concatLines ([ ''
"#!/bin/bash" )
"set -o errexit" (builtins.filter (_: _.useSwap) partitions));
] in
lib.strings.concatLines ([
"#!/bin/bash"
"set -o errexit"
]
++ (builtins.map (_: _.deviceScript) disks) ++ (builtins.map (_: _.deviceScript) disks)
++ lib.optionals ((builtins.length disks) > 0) [ ++ lib.optionals ((builtins.length disks) > 0) [
''echo "$(tput setaf 3)==== WARNING ====$(tput sgr0)"'' ''echo "$(tput setaf 3)==== WARNING ====$(tput sgr0)"''
@ -353,7 +378,8 @@ in {
] ++ (builtins.map (_: _.script) disks) ++ [ ] ++ (builtins.map (_: _.script) disks) ++ [
mountScript mountScript
swapScript swapScript
])); ])
);
}; };
}; };
}; };

View file

@ -11,78 +11,87 @@ let
}; };
config = { config = {
programs = builtins.mapAttrs ( programs = builtins.mapAttrs
name: config: { (
enable = mkDefault config.enable; name: config: {
}) osConfig.programs; enable = mkDefault config.enable;
}; }
})); )
osConfig.programs;
};
}
));
}; };
mkPrograms = infos: builtins.foldl' (programs: info: mkPrograms = infos: builtins.foldl'
programs // { (programs: info:
${builtins.elemAt info 0} = { programs // {
enable = mkEnableOption (builtins.elemAt info 1); ${builtins.elemAt info 0} = {
}; enable = mkEnableOption (builtins.elemAt info 1);
}) { } infos; };
})
{ }
infos;
programs = mkPrograms [ programs = mkPrograms [
["aliae" "aliae"] [ "aliae" "aliae" ]
["brave" "Brave Browser"] [ "brave" "Brave Browser" ]
["discord" "Discord"] [ "discord" "Discord" ]
["docker" "docker"] [ "firefox" "Firefox Web Browser" ]
["firefox" "Firefox Web Browser"] [ "openssh" "OpenSSH" ]
["openssh" "OpenSSH"] [ "osu!lazer" "osu!lazer" ]
["osu!lazer" "osu!lazer"] [ "pennywise" "Pennywise" ]
["pennywise" "Pennywise"] [ "powershell" "PowerShell Core" ]
["powershell" "PowerShell Core"] [ "retroarch" "RetroArch" ]
["retroarch" "RetroArch"] [ "steam" "Steam" ]
["steam" "Steam"] [ "thunderbird" "Thunderbird" ]
["thunderbird" "Thunderbird"] [ "vscode" "Visual Studio Code" ]
["vscode" "Visual Studio Code"] [ "zoxide" "zoxide" ]
["zoxide" "zoxide"]
]; ];
linuxPrograms = mkPrograms [ linuxPrograms = mkPrograms [
["bash" "Bash"] [ "bash" "Bash" ]
["fish" "fish"] [ "fish" "fish" ]
["icedtea" "IcedTea"] [ "icedtea" "IcedTea" ]
["grub" "GRUB"] [ "grub" "GRUB" ]
["logo-ls" "logo-ls"] [ "logo-ls" "logo-ls" ]
["lutris" "Lutris"] [ "lutris" "Lutris" ]
["minegrub-theme" "Minegrub Theme"] [ "minegrub-theme" "Minegrub Theme" ]
["nodejs-n" "n"] [ "nginx" "nginx" ]
["nuke-usb" "nuke-usb"] [ "nodejs-n" "n" ]
["nvidia-dkms" "Nvidia Drivers"] [ "nuke-usb" "nuke-usb" ]
["plasma" "Plasma"] [ "nvidia-dkms" "Nvidia Drivers" ]
["pyenv" "pyenv"] [ "plasma" "Plasma" ]
["sddm" "SDDM"] [ "pyenv" "pyenv" ]
["vim" "Vim"] [ "sddm" "SDDM" ]
["virt-manager" "Virtual Machine Manager"] [ "vim" "Vim" ]
["waydroid" "Waydroid"] [ "virt-manager" "Virtual Machine Manager" ]
["xone" "xone"] [ "waydroid" "Waydroid" ]
[ "xone" "xone" ]
]; ];
windowsPrograms = mkPrograms [ windowsPrograms = mkPrograms [
["lghub" "Logitech G Hub"] [ "lghub" "Logitech G Hub" ]
["maniaplanet" "ManiaPlanet"] [ "maniaplanet" "ManiaPlanet" ]
["msedge-redirect" "MSEdgeRedirect"] [ "msedge-redirect" "MSEdgeRedirect" ]
["nvs" "Node Version Switcher"] [ "nvs" "Node Version Switcher" ]
["osu!" "Osu!"] [ "osu!" "Osu!" ]
["posh-git" "posh-git"] [ "posh-git" "posh-git" ]
["putty" "PuTTY"] [ "putty" "PuTTY" ]
["rewasd" "reWASD"] [ "rewasd" "reWASD" ]
["terminal-icons" "Terminal Icons"] [ "terminal-icons" "Terminal Icons" ]
["tm-nations-forever" "TrackMania Nations Forever"] [ "tm-nations-forever" "TrackMania Nations Forever" ]
["tm-united-forever" "TrackMania United Forever"] [ "tm-united-forever" "TrackMania United Forever" ]
["tobii-gamehub" "Tobii Game Hub"] [ "tobii-gamehub" "Tobii Game Hub" ]
["tobii-ghost" "Tobii Ghost"] [ "tobii-ghost" "Tobii Ghost" ]
["ubiquiti-unifi-controller" "Ubiquiti UniFi Controller"] [ "ubiquiti-unifi-controller" "Ubiquiti UniFi Controller" ]
["visualstudio" "Visual Studio"] [ "visualstudio" "Visual Studio" ]
["winscp" "WinSCP"] [ "winscp" "WinSCP" ]
]; ];
in { in
{
imports = [ imports = [
./programs/docker.nix
./programs/git.nix ./programs/git.nix
./programs/nextcloud.nix ./programs/nextcloud.nix
./programs/oh-my-posh.nix ./programs/oh-my-posh.nix

View file

@ -0,0 +1,45 @@
{ lib, ... }:
let
inherit (lib) mkEnableOption mkOption types;
commonOptions = {
enable = mkEnableOption "docker";
};
in
{
options = {
valhalla = {
programs.docker = commonOptions;
users = mkOption {
type = types.attrsOf (types.submodule (
{ ... }: {
options = {
programs.docker = commonOptions;
};
}
));
};
linux = {
programs = {
docker = {
services = {
anki-sync.enable = mkEnableOption "Anki Sync server";
drone.enable = mkEnableOption "drone server";
forgejo.enable = mkEnableOption "Forgejo server";
jellyfin.enable = mkEnableOption "Jellyfin media server";
minecraft.enable = mkEnableOption "Minecraft server";
nextcloud.enable = mkEnableOption "Nextcloud server";
teamspeak.enable = mkEnableOption "TeamSpeak server";
terraria.enable = mkEnableOption "Terraria server";
trackmania.enable = mkEnableOption "TrackMania server";
vaultwarden.enable = mkEnableOption "Vaultwarden server";
woodpecker.enable = mkEnableOption "Woodpecker CI server";
};
};
};
};
};
};
}

View file

@ -31,7 +31,8 @@ let
default = { }; default = { };
}; };
}; };
in { in
{
options = { options = {
valhalla = { valhalla = {
programs.git = gitOption; programs.git = gitOption;
@ -42,7 +43,8 @@ in {
options = { options = {
programs.git = gitOption; programs.git = gitOption;
}; };
})); }
));
}; };
}; };
}; };

View file

@ -31,7 +31,8 @@ let
default = [ ]; default = [ ];
}; };
}; };
in { in
{
options = { options = {
valhalla = { valhalla = {
programs.nextcloud = commonOptions; programs.nextcloud = commonOptions;
@ -42,7 +43,8 @@ in {
options = { options = {
programs.nextcloud = commonOptions; programs.nextcloud = commonOptions;
}; };
})); }
));
}; };
windows.users = mkOption { windows.users = mkOption {
@ -51,7 +53,8 @@ in {
options = { options = {
programs.nextcloud = userOptions; programs.nextcloud = userOptions;
}; };
})); }
));
}; };
}; };
}; };

View file

@ -16,7 +16,8 @@ let
default = lib.strings.removeSuffix ".omp" (lib.strings.removeSuffix ".json" (builtins.baseNameOf config.source)); default = lib.strings.removeSuffix ".omp" (lib.strings.removeSuffix ".json" (builtins.baseNameOf config.source));
}; };
}; };
}); }
);
commonOptions = { commonOptions = {
enable = mkEnableOption "Oh My Posh"; enable = mkEnableOption "Oh My Posh";
@ -35,7 +36,8 @@ let
default = [ ]; default = [ ];
}; };
}; };
in { in
{
options = { options = {
valhalla = { valhalla = {
programs.oh-my-posh = commonOptions; programs.oh-my-posh = commonOptions;
@ -46,7 +48,8 @@ in {
options = { options = {
programs.oh-my-posh = userOptions; programs.oh-my-posh = userOptions;
}; };
})); }
));
}; };
}; };
}; };

View file

@ -16,7 +16,8 @@ let
default = null; default = null;
}; };
}; };
}); }
);
commonOptions = { commonOptions = {
enable = mkEnableOption "rclone"; enable = mkEnableOption "rclone";
@ -29,7 +30,8 @@ let
default = { }; default = { };
}; };
}; };
in { in
{
options = { options = {
valhalla.linux = { valhalla.linux = {
programs.rclone = commonOptions; programs.rclone = commonOptions;
@ -40,7 +42,8 @@ in {
options = { options = {
programs.rclone = userOptions; programs.rclone = userOptions;
}; };
})); }
));
}; };
}; };
}; };

View file

@ -1,150 +1,156 @@
{ lib, ... }: { lib, ... }:
let inherit (lib) mkOption types; let inherit (lib) mkOption types;
in { in {
imports = [ imports = [
./programs.nix ./programs.nix
]; ];
options = { options = {
valhalla = mkOption { valhalla = mkOption {
type = types.submodule ( type = types.submodule (
{ config, ... }: { config, ... }:
let let
optionalAttrs = lib.attrsets.optionalAttrs; optionalAttrs = lib.attrsets.optionalAttrs;
cfg = config; cfg = config;
inherit (cfg.software) coding desktopExperience essential gaming server socialMedia; inherit (cfg.software) coding desktopExperience essential gaming server socialMedia;
mkPrograms = programs: builtins.foldl' ( mkPrograms = programs: builtins.foldl'
programs: name: programs // { (
${name}.enable = true; programs: name: programs // {
}) {} programs; ${name}.enable = true;
in { }
options = { )
software = { { }
essential = mkOption { programs;
type = types.bool; in
description = "A value indicating whether essentials should be installed."; {
default = false; options = {
}; software = {
essential = mkOption {
server = mkOption { type = types.bool;
type = types.bool; description = "A value indicating whether essentials should be installed.";
description = "A value indicating whether server applications should be installed."; default = false;
default = false;
};
desktopExperience = mkOption {
type = types.bool;
description = "A value indicating whether GUI apps should be installed.";
default = false;
};
school = mkOption {
type = types.bool;
description = "A value indicating whether software for studies should be installed.";
default = false;
};
productivity = mkOption {
type = types.bool;
description = "A value indicating whether productivity apps should be installed.";
default = false;
};
socialMedia = mkOption {
type = types.bool;
description = "A value indicating whether social media apps should be installed.";
default = false;
};
media = mkOption {
type = types.bool;
description = "A value indicating whether media apps should be installed.";
default = false;
};
gaming = mkOption {
type = types.bool;
description = "A value indicating whether gaming apps should be installed.";
default = false;
};
coding = mkOption {
type = types.bool;
description = "A value indicating whether development apps should be installed.";
default = false;
};
};
}; };
config = { server = mkOption {
programs = (optionalAttrs essential (mkPrograms [ type = types.bool;
"aliae" description = "A value indicating whether server applications should be installed.";
"git" default = false;
"oh-my-posh"
"openssh"
"powershell"
"zoxide"
])) // (optionalAttrs desktopExperience (mkPrograms [
"brave"
"firefox"
"pennywise"
"thunderbird"
])) // (optionalAttrs socialMedia (mkPrograms [
"discord"
])) // (optionalAttrs coding (mkPrograms [
"docker"
"vscode"
])) // (optionalAttrs gaming (mkPrograms [
"osu!lazer"
"retroarch"
"steam"
]));
linux.programs = (optionalAttrs essential (mkPrograms [
"bash"
"logo-ls"
"minegrub-theme"
"nuke-usb"
"vim"
])) // (optionalAttrs desktopExperience (mkPrograms [
"icedtea"
"plasma"
"sddm"
"waydroid"
"virt-manager"
])) // (optionalAttrs coding (mkPrograms [
"nodejs-n"
"pyenv"
])) // (optionalAttrs gaming (mkPrograms [
"lutris"
])) // (optionalAttrs server (mkPrograms [
"nginx"
]));
# Essentials
windows.programs = (optionalAttrs essential (mkPrograms [
"posh-git"
"terminal-icons"
# Desktop Experience
])) // (optionalAttrs desktopExperience (mkPrograms [
"msedge-redirect"
"putty"
"winscp"
# Development
])) // (optionalAttrs coding (mkPrograms [
"nvs"
"visualstudio"
# Gaming
])) // (optionalAttrs gaming (mkPrograms [
"maniaplanet"
"osu!"
"rewasd"
"tm-nations-forever"
"tm-united-forever"
]));
}; };
});
}; desktopExperience = mkOption {
type = types.bool;
description = "A value indicating whether GUI apps should be installed.";
default = false;
};
school = mkOption {
type = types.bool;
description = "A value indicating whether software for studies should be installed.";
default = false;
};
productivity = mkOption {
type = types.bool;
description = "A value indicating whether productivity apps should be installed.";
default = false;
};
socialMedia = mkOption {
type = types.bool;
description = "A value indicating whether social media apps should be installed.";
default = false;
};
media = mkOption {
type = types.bool;
description = "A value indicating whether media apps should be installed.";
default = false;
};
gaming = mkOption {
type = types.bool;
description = "A value indicating whether gaming apps should be installed.";
default = false;
};
coding = mkOption {
type = types.bool;
description = "A value indicating whether development apps should be installed.";
default = false;
};
};
};
config = {
programs = (optionalAttrs essential (mkPrograms [
"aliae"
"git"
"oh-my-posh"
"openssh"
"powershell"
"zoxide"
])) // (optionalAttrs desktopExperience (mkPrograms [
"brave"
"firefox"
"pennywise"
"thunderbird"
])) // (optionalAttrs socialMedia (mkPrograms [
"discord"
])) // (optionalAttrs coding (mkPrograms [
"docker"
"vscode"
])) // (optionalAttrs gaming (mkPrograms [
"osu!lazer"
"retroarch"
"steam"
]));
linux.programs = (optionalAttrs essential (mkPrograms [
"bash"
"logo-ls"
"minegrub-theme"
"nuke-usb"
"vim"
])) // (optionalAttrs desktopExperience (mkPrograms [
"icedtea"
"plasma"
"sddm"
"waydroid"
"virt-manager"
])) // (optionalAttrs coding (mkPrograms [
"nodejs-n"
"pyenv"
])) // (optionalAttrs gaming (mkPrograms [
"lutris"
])) // (optionalAttrs server (mkPrograms [
"nginx"
]));
# Essentials
windows.programs = (optionalAttrs essential (mkPrograms [
"posh-git"
"terminal-icons"
# Desktop Experience
])) // (optionalAttrs desktopExperience (mkPrograms [
"msedge-redirect"
"putty"
"winscp"
# Development
])) // (optionalAttrs coding (mkPrograms [
"nvs"
"visualstudio"
# Gaming
])) // (optionalAttrs gaming (mkPrograms [
"maniaplanet"
"osu!"
"rewasd"
"tm-nations-forever"
"tm-united-forever"
]));
};
}
);
}; };
} };
}

View file

@ -25,7 +25,8 @@ let
default = [ ]; default = [ ];
}; };
}; };
}); }
);
linuxUserType = types.submodule ( linuxUserType = types.submodule (
{ ... }: { { ... }: {
@ -36,7 +37,8 @@ let
default = null; default = null;
}; };
}; };
}); }
);
winUserType = types.submodule ( winUserType = types.submodule (
{ ... }: { { ... }: {
@ -47,8 +49,10 @@ let
default = false; default = false;
}; };
}; };
}); }
in { );
in
{
options = { options = {
valhalla = { valhalla = {
users = mkOption { users = mkOption {

View file

@ -2,7 +2,8 @@
let let
inherit (lib) mkDefault mkEnableOption mkIf mkOption types; inherit (lib) mkDefault mkEnableOption mkIf mkOption types;
capitalize = (import ../text.nix { inherit lib; }).capitalize; capitalize = (import ../text.nix { inherit lib; }).capitalize;
in { in
{
options = { options = {
valhalla = { valhalla = {
windows = { windows = {

View file

@ -2,6 +2,6 @@
capitalize = text: capitalize = text:
let chars = lib.strings.stringToCharacters text; let chars = lib.strings.stringToCharacters text;
in lib.strings.concatStrings in lib.strings.concatStrings
([ (lib.strings.toUpper (builtins.elemAt chars 0)) ] ([ (lib.strings.toUpper (builtins.elemAt chars 0)) ]
++ (lib.lists.drop 1 chars)); ++ (lib.lists.drop 1 chars));
} }

View file

@ -37,12 +37,13 @@ in {
keyboardLayout = "ch"; keyboardLayout = "ch";
i18n = { i18n = {
localeSettings = let defaultLocale = "en_US.UTF-8"; localeSettings =
in { let defaultLocale = "en_US.UTF-8";
LANG = "de_CH.UTF-8"; in {
LANGUAGE = defaultLocale; LANG = "de_CH.UTF-8";
LC_MESSAGE = defaultLocale; LANGUAGE = defaultLocale;
}; LC_MESSAGE = defaultLocale;
};
}; };
software = { software = {
@ -58,45 +59,46 @@ in {
linux.programs.grub.enable = true; linux.programs.grub.enable = true;
programs = { programs = {
git = let defaultBranch = "main"; git =
in { let defaultBranch = "main";
inherit defaultBranch; in {
inherit defaultBranch;
flow = { flow = {
mainBranch = defaultBranch; mainBranch = defaultBranch;
devBranch = "dev"; devBranch = "dev";
}; };
aliases = { aliases = {
ahfange = "init"; ahfange = "init";
tuedezue = "add"; tuedezue = "add";
beschuldig = "blame"; beschuldig = "blame";
zieh = "pull"; zieh = "pull";
druck = "push"; druck = "push";
machnah = "clone"; machnah = "clone";
hol = "fetch"; hol = "fetch";
zwiigab = "branch"; zwiigab = "branch";
buechiih = "commit"; buechiih = "commit";
eich = "rebase"; eich = "rebase";
erd = "rebase"; erd = "rebase";
gahufwiifelde = "rebase"; gahufwiifelde = "rebase";
vergliich = "diff"; vergliich = "diff";
tuezemme = "merge"; tuezemme = "merge";
versorg = "stash"; versorg = "stash";
markier = "tag"; markier = "tag";
pflueckoepfel = "cherry-pick"; pflueckoepfel = "cherry-pick";
pflueckhimbeeri = "cherry-pick"; pflueckhimbeeri = "cherry-pick";
buechuus = "checkout"; buechuus = "checkout";
quaetsch = "merge --squash"; quaetsch = "merge --squash";
pfudle = "push --force"; pfudle = "push --force";
beschuldigung = "blame"; beschuldigung = "blame";
zwiigli = "branch"; zwiigli = "branch";
tagebuech = "log"; tagebuech = "log";
versteck = "stash"; versteck = "stash";
zuestand = "status"; zuestand = "status";
markierig = "tag"; markierig = "tag";
};
}; };
};
}; };
}; };
}; };

View file

@ -0,0 +1,75 @@
{ lib, config, ... }:
let fs = import ../../../lib/modules/partition/fs.nix;
in {
imports = [ ./defaults.nix ];
config = {
valhalla = {
partition = {
os = {
partitions = {
Boot = {
index = 1;
type = "uefi";
size = "+1G";
format = fs.fat32;
mountPoint = config.valhalla.boot.efiMountPoint;
};
Swap = {
index = 2;
type = "swap";
};
OS = {
index = 3;
label = lib.mkDefault config.valhalla.boot.label;
type = "linux";
format = fs.ext4;
mountPoint = "/";
};
};
};
};
hostname = "nuth.ch";
timeZone = "Europe/Zurich";
keyMap = "de_CH-latin1";
keyboardLayout = "ch";
i18n = {
localeSettings =
let defaultLocale = "en_US.UTF-8";
in {
LANG = "de_CH.UTF-8";
LANGUAGE = defaultLocale;
LC_MESSAGE = defaultLocale;
};
};
software = {
essential = true;
server = true;
};
programs.docker.enable = true;
linux.programs = {
docker = {
services = {
drone.enable = true;
forgejo.enable = true;
jellyfin.enable = true;
minecraft.enable = true;
nextcloud.enable = true;
teamspeak.enable = true;
terraria.enable = true;
trackmania.enable = true;
vaultwarden.enable = true;
woodpecker.enable = true;
};
};
};
};
};
}

View file

@ -29,20 +29,22 @@
windows.users.manuel = { windows.users.manuel = {
programs = { programs = {
nextcloud = { nextcloud = {
folderSyncs = let folderSyncs =
localPath = "C:/tools/RetroArch-Win64"; let
remotePath = "/Saved Games/RetroArch"; localPath = "C:/tools/RetroArch-Win64";
in [ remotePath = "/Saved Games/RetroArch";
{ in
remotePath = "${remotePath}/Saves"; [
localPath = "${localPath}/saves"; {
virtualFiles = false; remotePath = "${remotePath}/Saves";
} localPath = "${localPath}/saves";
{ virtualFiles = false;
remotePath = "${remotePath}/System"; }
localPath = "${localPath}/system"; {
} remotePath = "${remotePath}/System";
]; localPath = "${localPath}/system";
}
];
}; };
}; };
}; };

View file

@ -20,11 +20,11 @@ begin
sudo sed -i \ sudo sed -i \
-e "/esp=/{" \ -e "/esp=/{" \
-e "a esp=$(echo "$efiDir" | string escape)" \ -e "a esp=$(echo "$efiDir" | string escape)" \
-e "d" \ -e d \
-e "}" \ -e "}" \
-e "/bootloader_id=/{" \ -e "/bootloader_id=/{" \
-e "a bootloader_id=$(echo "$label" | string escape)" \ -e "a bootloader_id=$(echo "$label" | string escape)" \
-e "d" \ -e d \
-e "}" \ -e "}" \
/etc/secureboot.conf /etc/secureboot.conf

View file

@ -27,7 +27,7 @@ begin
and yayinst \ and yayinst \
linux-headers \ linux-headers \
pacman-contrib \ pacman-contrib \
yq go-yq
end end
source "$dir/../../Common/OS/install.fish" source "$dir/../../Common/OS/install.fish"

View file

@ -61,7 +61,7 @@ begin
and arch-chroot "$mountDir" hwclock --systohc and arch-chroot "$mountDir" hwclock --systohc
and begin and begin
getOSConfig i18n.localeSettings --json | \ getOSConfig i18n.localeSettings --json |
jq --raw-output '[.[] | split(".") | .[0]] | unique | join("\\\\|")' jq --raw-output '[.[] | split(".") | .[0]] | unique | join("\\\\|")'
end | begin end | begin
read LOCALES read LOCALES
@ -70,7 +70,7 @@ begin
end end
and begin and begin
getOSConfig i18n.localeSettings --json | \ getOSConfig i18n.localeSettings --json |
jq --raw-output '[keys[] as $key | "\($key)=\(.[$key])"] | join("\n")' jq --raw-output '[keys[] as $key | "\($key)=\(.[$key])"] | join("\n")'
end | arch-chroot "$mountDir" tee /etc/locale.conf >/dev/null end | arch-chroot "$mountDir" tee /etc/locale.conf >/dev/null

View file

@ -10,6 +10,8 @@ begin
docker-compose \ docker-compose \
docker-buildx \ docker-buildx \
docker-scan docker-scan
installSWBase $argv
end end
runInstaller $argv runInstaller $argv

View file

@ -147,7 +147,7 @@ function deploySoftware -d "Deploys a the specified software action" -a action
and yayinst propertree-git # mac .plist config file editor and yayinst propertree-git # mac .plist config file editor
end end
and if isProgramEnabled "thunderbird" && $isInstall and if isProgramEnabled thunderbird && $isInstall
yayinst thunderbird yayinst thunderbird
end end
@ -200,7 +200,7 @@ function deploySoftware -d "Deploys a the specified software action" -a action
audius-client-bin audius-client-bin
end end
and if isProgramEnabled "nextcloud" and if isProgramEnabled nextcloud
yayinst nextcloud-client yayinst nextcloud-client
end end
end end
@ -284,7 +284,7 @@ function deploySoftware -d "Deploys a the specified software action" -a action
yayinst osu-lazer-bin yayinst osu-lazer-bin
end end
and if isProgramEnabled "retroarch" and if isProgramEnabled retroarch
yayinst libretro yayinst libretro
end end
end end

View file

@ -14,31 +14,34 @@ function backupAction -V dir
set -l deployScript (getDeploymentScript) set -l deployScript (getDeploymentScript)
if fish "$dir/../../../lib/modules/partition/confirm.fish" "Do you wish to store the backup on an SSH server?" n if [ -z "$VALHALLA_BACKUP_DIR" ]
read -xP "Please specify the host name of the SSH server: " VALHALLA_BACKUP_SERVER if fish "$dir/../../../lib/modules/partition/confirm.fish" "Do you wish to store the backup on an SSH server?" n
read -xP "Please specify the port of the SSH server (default 22): " VALHALLA_BACKUP_SERVER_PORT read -xP "Please specify the host name of the SSH server: " VALHALLA_BACKUP_SERVER
read -xP "Please specify the name of the user to log in to the SSH server: " VALHALLA_BACKUP_SERVER_USER read -xP "Please specify the port of the SSH server (default 22): " VALHALLA_BACKUP_SERVER_PORT
read -xP "Please specify the name of the user to log in to the SSH server: " VALHALLA_BACKUP_SERVER_USER
read -xP "Please specify the path to the key file for logging in to the SSH server: " VALHALLA_BACKUP_SERVER_KEY
if [ -z "$VALHALLA_BACKUP_SERVER_PORT" ] if [ -z "$VALHALLA_BACKUP_SERVER_PORT" ]
set -x VALHALLA_BACKUP_SERVER_PORT 22 set -x VALHALLA_BACKUP_SERVER_PORT 22
end
if [ -n "$VALHALLA_BACKUP_SERVER_USER" ]
set -x VALHALLA_BACKUP_SERVER "$VALHALLA_BACKUP_SERVER_USER@$VALHALLA_BACKUP_SERVER"
end
echo
echo "$(tput setaf 3)==== WARNING ====$(tput sgr0)"
echo "For a seamless experience, please make sure that you are able to establish an unattended ssh connection using key authentication."
echo
echo "$(tput bold)This command should succeed without user interaction:$(tput sgr0)"
echo "sudo ssh -o PasswordAuthentication=no -i $(string escape -- "$VALHALLA_BACKUP_SERVER_KEY") -p $VALHALLA_BACKUP_SERVER_PORT $VALHALLA_BACKUP_SERVER true"
read -P "Press enter once you're done: "
echo
end end
if [ -n "$VALHALLA_BACKUP_SERVER_USER" ] read -xP "Please specify the path to the directory to save the backup to: " VALHALLA_BACKUP_DIR
set -x VALHALLA_BACKUP_SERVER "$VALHALLA_BACKUP_SERVER_USER@$VALHALLA_BACKUP_SERVER"
end
echo
echo "$(tput setaf 3)==== WARNING ====$(tput sgr0)"
echo "For a seamless experience, please make sure that you are able to establish an unattended ssh connection using key authentication."
echo
echo "$(tput bold)This command should succeed without user interaction:$(tput sgr0)"
echo "ssh -o PasswordAuthentication=no -p $VALHALLA_BACKUP_SERVER_PORT $VALHALLA_BACKUP_SERVER true"
read -P "Press enter once you're done: "
echo
end end
read -xP "Please specify the path to the directory to save the backup to: " VALHALLA_BACKUP_DIR
runHook backupSoftware || begin runHook backupSoftware || begin
echo "Backing up software..." echo "Backing up software..."
@ -51,7 +54,7 @@ function backupAction -V dir
if [ -n "$deployScript" ] if [ -n "$deployScript" ]
for name in (getUsers | jq '.[]' --raw-output0 | string split0) for name in (getUsers | jq '.[]' --raw-output0 | string split0)
echo "Backing up user `$name`..." echo "Backing up user `$name`..."
and source $deployScript userBackup $name and source $deployScript userBackup --user $name
end end
end end
end end

View file

@ -34,7 +34,7 @@ function installAction -V dir
for name in (getUsers | jq '.[]' --raw-output0 | string split0) for name in (getUsers | jq '.[]' --raw-output0 | string split0)
echo "Configuring user `$name`..." echo "Configuring user `$name`..."
and source $deployScript userConfig $name and source $deployScript userConfig --user $name
end end
end end
end end

View file

@ -27,7 +27,7 @@ $null = New-Module {
Value = "$Value"; Value = "$Value";
} ` } `
-User $User ` -User $User `
".alias |= [((. // [])[] | select(.name != env.Name))] + [{ name: env.Name, value: env.Value }]"; ".alias |= [((. // [])[] | select(.name != env(Name)))] + [{ name: env(Name), value: env(Value) }]";
} }
<# <#
@ -53,7 +53,7 @@ $null = New-Module {
Value = "$Value"; Value = "$Value";
} ` } `
-User $User ` -User $User `
".env |= [((. // [])[] | select(.name != env.Name))] + [{ name: env.Name, value: env.Value }]"; ".env |= [((. // [])[] | select(.name != env(Name)))] + [{ name: env(Name), value: env(Value) }]";
} }
<# <#
@ -92,7 +92,7 @@ $null = New-Module {
} }
sudo @using:flags pwsh -CommandWithArgs 'Get-Content -Raw $args[0]' $using:path | Set-Content $file; sudo @using:flags pwsh -CommandWithArgs 'Get-Content -Raw $args[0]' $using:path | Set-Content $file;
yq -yi $using:Script $file; yq -i $using:Script $file;
sudo @using:flags pwsh -CommandWithArgs 'Set-Content $args[0] -Value $args[1]' $using:path (Get-Content -Raw $file); sudo @using:flags pwsh -CommandWithArgs 'Set-Content $args[0] -Value $args[1]' $using:path (Get-Content -Raw $file);
Remove-Item $file; Remove-Item $file;
} | Receive-Job -Wait; } | Receive-Job -Wait;

View file

@ -12,5 +12,19 @@ begin
sudo usermod -aG docker "$_flag_user" sudo usermod -aG docker "$_flag_user"
end end
function installSWDependencies -V dir -V args
source "$dir/../../../lib/settings.fish"
set -la argv $args
argparse -i "name=" "user=" -- $argv
set -l services (getProgramConfig --name "$_flag_name" --json | jq '.services')
for service in (echo "$services" | jq '. // {} | keys[]' --raw-output0 | string split0)
if echo "$services" | SERVICE=$service jq --exit-status ".[env.SERVICE].enable" >/dev/null
fish "$dir/services/$service/main.fish" $argv
end
end
end
runInstaller $argv runInstaller $argv
end end

View file

@ -2,8 +2,5 @@ services:
anki: anki:
image: yangchuansheng/anki-sync-server image: yangchuansheng/anki-sync-server
restart: unless-stopped restart: unless-stopped
extends:
file: docker-compose.secrets.yml
service: anki
volumes: volumes:
- ./data:/ankisyncdir - ./data:/ankisyncdir

View file

@ -2,18 +2,18 @@
begin begin
set -l name anki set -l name anki
set -l dir (status dirname) set -l dir (status dirname)
set -l source "$dir/docker-compose.secrets.yml" set -l source "$dir/docker-compose.overrides.yml"
source "$dir/../service.fish" source "$dir/../service.fish"
function installSW -V dir -V source function installSW -V dir -V source
set -l pw (nix-shell -p keepassxc --run "keepassxc-cli generate --length 32") set -l pw (nix-shell -p keepassxc --run "keepassxc-cli generate --length 32")
set -l userKey ".services.anki.environment.SYNC_USER1" set -l userKey ".services.anki.environment.SYNC_USER1"
set -l user (yq --raw-output "$userKey" "$source" | sed "s/:.*\$/:$pw/") set -l user (yq "$userKey" "$source" | sed "s/:.*\$/:$pw/")
initializeServiceInstallation $argv initializeServiceInstallation $argv
sudo cp "$dir/docker-compose.yml" (getServiceRoot $argv) sudo cp "$dir/docker-compose.base.yml" (getServiceRoot $argv)
USER=$user yq "$userKey = env.USER" "$source" | \ USER=$user yq "$userKey = env(USER)" "$source" |
sudo tee (getServiceSecretsConfig $argv) >/dev/null sudo tee (getServiceOverrides $argv) >/dev/null
installDockerService $argv installDockerService $argv
end end

View file

@ -0,0 +1,4 @@
include:
- path:
- docker-compose.base.yml
- docker-compose.overrides.yml

View file

@ -0,0 +1,23 @@
services:
ci:
build:
context: .
dockerfile: ci.Dockerfile
restart: unless-stopped
env_file:
- server.common.env
docker:
image: drone/drone-runner-docker
restart: unless-stopped
env_file: runner.common.env
environment:
DRONE_RUNNER_NAME: docker-runner
volumes:
- /var/run/docker.sock:/var/run/docker.sock
ssh:
image: drone/drone-runner-ssh
restart: unless-stopped
env_file:
- runner.common.env
environment:
DRONE_RUNNER_NAME: ssh-runner

View file

@ -1,35 +1,19 @@
services: services:
ci-template: ci-template:
build:
context: .
dockerfile: ci.Dockerfile
extends: extends:
file: docker-compose.secrets.yml file: docker-compose.core.yml
service: template service: ci
restart: unless-stopped env_file: []
env_file: environment: {}
- server.common.env
docker-template: docker-template:
image: drone/drone-runner-docker
restart: unless-stopped
extends: extends:
file: docker-compose.secrets.yml file: docker-compose.core.yml
service: template service: docker
depends_on: [] depends_on: []
env_file: env_file: []
- runner.common.env
environment:
DRONE_RUNNER_NAME: docker-runner
volumes:
- /var/run/docker.sock:/var/run/docker.sock
ssh-template: ssh-template:
image: drone/drone-runner-ssh
restart: unless-stopped
extends: extends:
file: docker-compose.secrets.yml file: docker-compose.core.yml
service: template service: ssh
depends_on: [] depends_on: []
env_file: env_file: []
- runner.common.env
environment:
DRONE_RUNNER_NAME: ssh-runner

View file

@ -10,16 +10,16 @@ begin
function installSW -V dir -V environments -V source function installSW -V dir -V environments -V source
set -l root (getServiceRoot $argv) set -l root (getServiceRoot $argv)
set -l config "$root/docker-compose.yml" set -l config "$root/docker-compose.base.yml"
set -l secrets (getServiceSecretsConfig $argv) set -l overrides (getServiceOverrides $argv)
set -l ciTemplate (yq (getServiceKey ci-template) "$source") set -l ciTemplate (yq -oj (getServiceKey ci-template) "$source")
set -l dockerTemplate (yq (getServiceKey docker-template) "$source") set -l dockerTemplate (yq -oj (getServiceKey docker-template) "$source")
set -l sshTemplate (yq (getServiceKey ssh-template) "$source") set -l sshTemplate (yq -oj (getServiceKey ssh-template) "$source")
initializeServiceInstallation $argv initializeServiceInstallation $argv
echo "{}" | sudo tee "$config" >/dev/null echo "{}" | sudo tee "$config" >/dev/null
echo "{}" | sudo tee "$secrets" >/dev/null echo "{}" | sudo tee "$overrides" >/dev/null
cp "$dir"/{ci.Dockerfile,.dockerignore} "$root" cp "$dir"/{ci.Dockerfile,docker-compose.core.yml,.dockerignore} "$root"
echo "DRONE_JSONNET_ENABLED=true" | sudo tee "$root/server.common.env" >/dev/null echo "DRONE_JSONNET_ENABLED=true" | sudo tee "$root/server.common.env" >/dev/null
echo "DRONE_RUNNER_CAPACITY=2" | sudo tee "$root/runner.common.env" >/dev/null echo "DRONE_RUNNER_CAPACITY=2" | sudo tee "$root/runner.common.env" >/dev/null
@ -32,7 +32,7 @@ begin
set -l runners ssh docker set -l runners ssh docker
set -l services ci $runners set -l services ci $runners
set -l tmpConfig (mktemp) set -l tmpConfig (mktemp)
set -l tmpSecrets (mktemp) set -l tmpOverrides (mktemp)
set -l ciName "$name-ci" set -l ciName "$name-ci"
set -l sshName "$name-ssh-runner" set -l sshName "$name-ssh-runner"
set -l dockerName "$name-docker-runner" set -l dockerName "$name-docker-runner"
@ -41,7 +41,7 @@ begin
set -l dockerEnv set -l dockerEnv
cp "$config" "$tmpConfig" cp "$config" "$tmpConfig"
cp "$secrets" "$tmpSecrets" cp "$overrides" "$tmpOverrides"
for serviceName in $services for serviceName in $services
set -l file (mktemp) set -l file (mktemp)
@ -52,8 +52,8 @@ begin
end end
CI_NAME=$ciName \ CI_NAME=$ciName \
SECRET_ENV="$name.secret.env" \ SECRET_ENV="$name.secret.env" \
RUNNER_ENV="$name.runner.env" begin RUNNER_ENV="$name.runner.env" begin
begin begin
printf "%s\n" \ printf "%s\n" \
DRONE_RPC_PROTO=http \ DRONE_RPC_PROTO=http \
@ -62,53 +62,32 @@ begin
echo "DRONE_RPC_SECRET=$secret" | sudo tee "$root/$SECRET_ENV" >/dev/null echo "DRONE_RPC_SECRET=$secret" | sudo tee "$root/$SECRET_ENV" >/dev/null
yq "$ciKey = $ciTemplate" "$tmpConfig" | \ yq "$ciKey = $ciTemplate" "$tmpConfig" |
ENTRY="./data/$name:/data" yq "$ciKey.volumes = [ env.ENTRY ]" | \ ENTRY="./data/$name:/data" yq "$ciKey.volumes = [ env(ENTRY) ]" |
yq "$ciKey.env_file |= . + [ env.SECRET_ENV ]" | \ yq "$ciKey.env_file |= . + [ env(SECRET_ENV) ]" |
PROTO=https yq "$ciEnv.DRONE_SERVER_PROTO = env.PROTO" | \ PROTO=https yq "$ciEnv.DRONE_SERVER_PROTO = env(PROTO)" |
HOST=(getServiceDomain "$subdomain" "$domain") yq "$ciEnv.DRONE_SERVER_HOST = env.HOST" | \ HOST=(getServiceDomain "$subdomain" "$domain") yq "$ciEnv.DRONE_SERVER_HOST = env(HOST)" |
yq "$dockerKey = $dockerTemplate" | \ yq "$dockerKey = $dockerTemplate" |
yq "$sshKey = $sshTemplate" | \ yq "$sshKey = $sshTemplate" |
yq "$dockerKey.depends_on = [ env.CI_NAME ]" | \ yq "$dockerKey.depends_on = [ env(CI_NAME) ]" |
yq -y "." | \
sudo tee "$config" >/dev/null sudo tee "$config" >/dev/null
for key in $dockerKey $sshKey for key in $dockerKey $sshKey
set -l file (mktemp) set -l file (mktemp)
yq "$key.depends_on = [ env.CI_NAME ]" "$config" | \ yq "$key.depends_on = [ env(CI_NAME) ]" "$config" |
yq "$key.env_file |= . + [ env.RUNNER_ENV, env.SECRET_ENV ]" | \ yq "$key.env_file |= . + [ env(RUNNER_ENV), env(SECRET_ENV) ]" |
yq -y "." | \
tee "$file" >/dev/null tee "$file" >/dev/null
sudo cp "$file" "$config" sudo cp "$file" "$config"
rm "$file" rm "$file"
end end
PORT="127.0.0.1:1337:80" yq "$ciKey.ports = [ env.PORT ]" "$tmpSecrets" | \ PORT="127.0.0.1:1337:80" yq "$ciKey.ports = [ env(PORT) ]" "$tmpOverrides" |
yq -y "." | \ sudo tee "$overrides" >/dev/null
sudo tee "$secrets" >/dev/null
end end
end end
set -l services (yq --raw-output0 ".services | keys[]" "$config" | string split0)
for service in $services
set -l file (mktemp)
set -l key "$(getServiceKey "$service").extends"
cat "$config" | if string match "*-ci" "$service" >/dev/null
SERVICE="$service" yq "$key.service |= env.SERVICE" "$config"
else
yq "del($key)" "$config"
end | \
yq -y "." | \
tee "$file" >/dev/null
sudo cp "$file" "$config"
rm "$file"
end
installDockerService $argv installDockerService $argv
end end
@ -122,7 +101,7 @@ begin
for i in (seq 1 3 (count $environments)) for i in (seq 1 3 (count $environments))
set -l domain $environments[(math $i + 2)] set -l domain $environments[(math $i + 2)]
set -l subdomain $environments[(math $i + 1)] set -l subdomain $environments[(math $i + 1)]
printf "%s\0" "$subdomain" "$domain" printf "%s\0" "$subdomain" "$domain"
end end
end end
@ -133,8 +112,8 @@ begin
printf "%s\0" "$name-ci" / printf "%s\0" "$name-ci" /
end end
function getBackupArgs function getExtraBackupPatterns
printf "%s\n" --hidden --no-ignore "data|\.secrets?\." (getServiceRoot $argv) echo "\.secret\.env\$"
end end
runInstaller --force $argv runInstaller --force $argv

View file

@ -2,9 +2,6 @@ services:
forgejo: forgejo:
image: codeberg.org/forgejo/forgejo:7 image: codeberg.org/forgejo/forgejo:7
restart: unless-stopped restart: unless-stopped
extends:
file: docker-compose.secrets.yml
service: forgejo
depends_on: depends_on:
- db - db
environment: environment:
@ -31,9 +28,6 @@ services:
db: db:
image: mariadb image: mariadb
restart: unless-stopped restart: unless-stopped
extends:
file: docker-compose.secrets.yml
service: db
environment: environment:
MARIADB_RANDOM_ROOT_PASSWORD: "yes" MARIADB_RANDOM_ROOT_PASSWORD: "yes"
MARIADB_AUTO_UPGRADE: "yes" MARIADB_AUTO_UPGRADE: "yes"
@ -46,7 +40,7 @@ services:
image: shenxn/protonmail-bridge image: shenxn/protonmail-bridge
restart: unless-stopped restart: unless-stopped
volumes: volumes:
- ./bridge:/root - ./data/bridge:/root
runner: runner:
image: gitea/act_runner image: gitea/act_runner
restart: unless-stopped restart: unless-stopped

View file

@ -5,3 +5,4 @@ services:
- 127.0.0.1:1337:3000 - 127.0.0.1:1337:3000
- 127.0.0.1:1338:22 - 127.0.0.1:1338:22
db: {} db: {}
runner: {}

View file

@ -1,8 +1,8 @@
#!/bin/env fish #!/bin/env fish
begin begin
set -l dir (status dirname) set -l dir (status dirname)
set -l user "forgejo" set -l user forgejo
set -l domain "git" set -l domain git
set -l server "$domain" "" set -l server "$domain" ""
set -l service $user set -l service $user
source "$dir/../service.fish" source "$dir/../service.fish"
@ -13,29 +13,31 @@ begin
function installSW -V dir -V domain -V server -V service function installSW -V dir -V domain -V server -V service
set -l root (getServiceRoot $argv) set -l root (getServiceRoot $argv)
set -l secrets (getServiceSecretsConfig $argv) set -l overrides (getServiceOverrides $argv)
set -l source "$dir/$(basename "$secrets")" set -l source "$dir/$(basename "$overrides")"
set -l pw (nix-shell -p keepassxc --run "keepassxc-cli generate --length 32") set -l pw (nix-shell -p keepassxc --run "keepassxc-cli generate --length 32")
set -l port (getRandomPort) set -l port (getRandomPort)
initializeServiceInstallation $argv initializeServiceInstallation $argv
sudo cp "$dir/docker-compose.yml" "$root" sudo cp "$dir/docker-compose.base.yml" "$root"
set port (yq (getSSHPortKey) "$source" --raw-output | mutatePort "$port") set port (yq (getSSHPortKey) "$source" | mutatePort "$port")
DOMAIN=(getServiceDomain $server) PW=$pw DB=Git USER=forgejo PW=$pw begin DOMAIN=(getServiceDomain $server) PW=$pw DB=Git USER=forgejo PW=$pw begin
set -l gitEnv "$(getServiceKey "$service").environment" set -l gitEnv "$(getServiceKey "$service").environment"
set -l dbEnv "$(getServiceKey "db").environment" set -l actEnv "$(getServiceKey "runner").environment"
set -l dbEnv "$(getServiceKey "db").environment"
PORT=$port yq "$(getSSHPortKey) = env.PORT" "$source" | \ PORT=$port yq "$(getSSHPortKey) = env(PORT)" "$source" |
yq "$gitEnv.FORGEJO__database__NAME = env.DB" | \ yq "$gitEnv.FORGEJO__server__DOMAIN = env(DOMAIN)" |
yq "$gitEnv.FORGEJO__database__USER = env.USER" | \ yq "$gitEnv.FORGEJO__database__NAME = env(DB)" |
yq "$gitEnv.FORGEJO__database__PASSWD = env.PW" | \ yq "$gitEnv.FORGEJO__database__USER = env(USER)" |
yq "$dbEnv.MARIADB_DATABASE = env.DB" | \ yq "$gitEnv.FORGEJO__database__PASSWD = env(PW)" |
yq "$dbEnv.MARIADB_USER = env.USER" | \ yq "$dbEnv.MARIADB_DATABASE = env(DB)" |
yq "$dbEnv.MARIADB_PASSWORD = env.PW" | \ yq "$dbEnv.MARIADB_USER = env(USER)" |
yq -y . | \ yq "$dbEnv.MARIADB_PASSWORD = env(PW)" |
sudo tee "$secrets" >/dev/null URL="https://$DOMAIN/" yq "$actEnv.GITEA_INSTANCE_URL = env(URL)" |
end sudo tee "$overrides" >/dev/null
end
installDockerService $argv installDockerService $argv
end end
@ -47,9 +49,9 @@ begin
set -l file (mktemp) set -l file (mktemp)
set -l root (getServiceRoot $argv) set -l root (getServiceRoot $argv)
set -l dir "$root/data" set -l dir "$root/data"
set -l bin "/usr/local/bin/forgejo" set -l bin /usr/local/bin/forgejo
set -l config "$root/docker-compose.yml" set -l config "$root/docker-compose.base.yml"
set -l secrets (getServiceSecretsConfig $argv) set -l overrides (getServiceOverrides $argv)
set -l envKey "$(getServiceKey "$service").environment" set -l envKey "$(getServiceKey "$service").environment"
configureDockerService $argv configureDockerService $argv
cp "$config" "$file" cp "$config" "$file"
@ -64,16 +66,15 @@ begin
set uid (id -u $user) set uid (id -u $user)
set gid (id -g $user) set gid (id -g $user)
and yq "$envKey.USER_UID = $uid" "$file" | \ and yq "$envKey.USER_UID = $uid" "$file" |
yq "$envKey.USER_GID = $gid" | \ yq "$envKey.USER_GID = $gid" |
yq -y . |
sudo tee "$config" >/dev/null sudo tee "$config" >/dev/null
mkdir -p "$dir" mkdir -p "$dir"
and chown -R $uid:$gid "$dir" and chown -R $uid:$gid "$dir"
rm "$file" rm "$file"
set port (yq (getSSHPortKey) "$secrets" --raw-output | extractPort) set port (yq (getSSHPortKey) "$overrides" | extractPort)
begin begin
printf "%s\n" \ printf "%s\n" \
@ -93,9 +94,5 @@ begin
printf "%s\0" "$_flag_name" / printf "%s\0" "$_flag_name" /
end end
function getBackupArgs
printf "%s\n" --hidden --no-ignore . --exclude "docker-compose.yml" (getServiceRoot $argv)
end
runInstaller --force $argv runInstaller --force $argv
end end

View file

@ -2,12 +2,8 @@ services:
jellyfin: jellyfin:
image: jellyfin/jellyfin image: jellyfin/jellyfin
restart: unless-stopped restart: unless-stopped
extends:
file: docker-compose.secrets.yml
service: jellyfin
user: 1337:1337 user: 1337:1337
hostname: Jellyfin hostname: Jellyfin
environment: {}
volumes: volumes:
- ./config/jellyfin:/config - ./config/jellyfin:/config
- cache:/cache - cache:/cache
@ -15,9 +11,6 @@ services:
radarr: radarr:
image: linuxserver/radarr image: linuxserver/radarr
restart: unless-stopped restart: unless-stopped
extends:
file: docker-compose.secrets.yml
service: radarr
environment: environment:
PUID: 1337 PUID: 1337
PGID: 1337 PGID: 1337
@ -29,9 +22,6 @@ services:
sonarr: sonarr:
image: linuxserver/sonarr image: linuxserver/sonarr
restart: unless-stopped restart: unless-stopped
extends:
file: docker-compose.secrets.yml
service: sonarr
environment: environment:
PUID: 1337 PUID: 1337
PGID: 1337 PGID: 1337
@ -43,9 +33,6 @@ services:
lidarr: lidarr:
image: linuxserver/lidarr image: linuxserver/lidarr
restart: unless-stopped restart: unless-stopped
extends:
file: docker-compose.secrets.yml
service: lidarr
environment: environment:
PUID: 1337 PUID: 1337
PGID: 1337 PGID: 1337
@ -57,9 +44,6 @@ services:
prowlarr: prowlarr:
image: linuxserver/prowlarr image: linuxserver/prowlarr
restart: unless-stopped restart: unless-stopped
extends:
file: docker-compose.secrets.yml
service: prowlarr
environment: environment:
PUID: 1337 PUID: 1337
PGID: 1337 PGID: 1337
@ -85,9 +69,6 @@ services:
flood: flood:
image: jesec/flood image: jesec/flood
restart: unless-stopped restart: unless-stopped
extends:
file: docker-compose.secrets.yml
service: flood
user: 1337:1337 user: 1337:1337
command: --baseuri /flood command: --baseuri /flood
--rundir /flood --rundir /flood
@ -114,14 +95,43 @@ services:
-o directory.default.set=/downloads -o directory.default.set=/downloads
-o 'method.set=group.seeding.ratio.command, "d.cloase = ; d.erase = "' -o 'method.set=group.seeding.ratio.command, "d.cloase = ; d.erase = "'
volumes: volumes:
- /etc/localtime:/etc/localtime:ro
- ./config/rtorrent:/config - ./config/rtorrent:/config
- ./downloads:/downloads - ./downloads:/downloads
- /etc/localtime:/etc/localtime:ro
- ./proton:/proton - ./proton:/proton
devices: devices:
- /dev/net/tun - /dev/net/tun
cap_add: cap_add:
- NET_ADMIN - NET_ADMIN
# transmission:
# build:
# dockerfile: ./transmission.Dockerfile
# context: .
# restart: unless-stopped
# hostname: transmission
# env_file:
# - ./proton.env
# environment:
# PUID: 1337
# PGID: 1337
# PVPN_TIER: 1337
# TZ: Europe/Zurich
# TRANSMISSION_WEB_HOME: /transmission
# TRANSMISSION_WEB_USER: "scott"
# TRANSMISSION_WEB_PASS: "tiger"
# MAX_UPTIME: -1
# command: --no-incomplete-dir
# --download-dir /downloads
# ports:
# - 127.0.0.1:1337:9091
# volumes:
# - ./config/transmission:/config
# - ./downloads:/downloads
# - /etc/localtime:/etc/localtime:ro
# devices:
# - /dev/net/tun
# cap_add:
# - NET_ADMIN
volumes: volumes:
cache: {} cache: {}

View file

@ -1,5 +1,6 @@
services: services:
jellyfin: jellyfin:
environment: {}
ports: ports:
- 127.0.0.1:1337:8096 - 127.0.0.1:1337:8096
radarr: radarr:

View file

@ -1,8 +1,8 @@
#!/bin/env fish #!/bin/env fish
begin begin
set -l dir (status dirname) set -l dir (status dirname)
set -l user "jellyfin" set -l user jellyfin
set -l domain "media" set -l domain media
set -l server "$domain" "" set -l server "$domain" ""
set -l servarr radarr sonarr lidarr prowlarr set -l servarr radarr sonarr lidarr prowlarr
set -l flood flood set -l flood flood
@ -11,16 +11,16 @@ begin
function installSW -V dir -V domain -V server -V service function installSW -V dir -V domain -V server -V service
set -l root (getServiceRoot $argv) set -l root (getServiceRoot $argv)
set -l secrets (getServiceSecretsConfig $argv) set -l overrides (getServiceOverrides $argv)
set -l source "$dir/$(basename "$secrets")" set -l source "$dir/$(basename "$overrides")"
set -l port (getRandomPort) set -l port (getRandomPort)
set -l servarrKeys set -l servarrKeys
initializeServiceInstallation $argv initializeServiceInstallation $argv
sudo cp "$dir/docker-compose.yml" "$root" sudo cp "$dir/docker-compose.base.yml" "$root"
sudo cp "$dir/.dockerignore" "$root" sudo cp "$dir/.dockerignore" "$root"
sudo cp "$dir/pvpn-cli.py" "$root" sudo cp "$dir/pvpn-cli.py" "$root"
sudo cp "$dir/rtorrent.Dockerfile" "$root" sudo cp "$dir/rtorrent.Dockerfile" "$root"
sudo cp "$source" "$secrets" sudo cp "$source" "$overrides"
installDockerService $argv installDockerService $argv
end end
@ -31,9 +31,9 @@ begin
set -l port set -l port
set -l file (mktemp) set -l file (mktemp)
set -l root (getServiceRoot $argv) set -l root (getServiceRoot $argv)
set -l bin "/usr/local/bin/forgejo" set -l bin /usr/local/bin/forgejo
set -l config "$root/docker-compose.yml" set -l config "$root/docker-compose.base.yml"
set -l secrets (getServiceSecretsConfig $argv) set -l overrides (getServiceOverrides $argv)
set -l envKey "$(getServiceKey "$service").environment" set -l envKey "$(getServiceKey "$service").environment"
configureDockerService $argv configureDockerService $argv
@ -50,23 +50,21 @@ begin
for name in $service $flood for name in $service $flood
set -l userKey "$(getServiceKey "$name").user" set -l userKey "$(getServiceKey "$name").user"
cp "$config" "$file" cp "$config" "$file"
USER=$uid:$gid yq -y "$userKey = env.USER" "$file" | sudo tee "$config" >/dev/null USER=$uid:$gid yq "$userKey = env(USER)" "$file" | sudo tee "$config" >/dev/null
end end
for name in $servarr rtorrent for name in $servarr rtorrent
set -l envKey "$(getServiceKey "$name").environment" set -l envKey "$(getServiceKey "$name").environment"
sudo cp "$config" "$file" sudo cp "$config" "$file"
and yq "$envKey.PUID = $uid" "$file" | \ and yq "$envKey.PUID = $uid" "$file" |
yq "$envKey.PGID = $gid" | \ yq "$envKey.PGID = $gid" |
yq -y . | \
sudo tee "$config" >/dev/null sudo tee "$config" >/dev/null
end end
cp "$config" "$file" cp "$overrides" "$file"
URL="https://$(getServiceDomain "$domain" "")/" yq "$(getServiceKey "$service").environment.JELLYFIN_PublishedServerUrl = env.URL" "$file" | \ URL="https://$(getServiceDomain "$domain" "")/" yq "$(getServiceKey "$service").environment.JELLYFIN_PublishedServerUrl = env(URL)" "$file" |
yq -y . | \ sudo tee "$overrides" >/dev/null
sudo tee "$config" >/dev/null
for dir in "$root"/{downloads,config/{,jellyfin,flood,rtorrent,radarr,sonarr,lidarr,prowlarr},media/{,movies,series,music}} for dir in "$root"/{downloads,config/{,jellyfin,flood,rtorrent,radarr,sonarr,lidarr,prowlarr},media/{,movies,series,music}}
sudo mkdir -p "$dir" sudo mkdir -p "$dir"
@ -109,13 +107,13 @@ begin
getServiceDefaultProxy $domain $s "$location" --comment "Proxy main Jellyfin traffic" $argv getServiceDefaultProxy $domain $s "$location" --comment "Proxy main Jellyfin traffic" $argv
getServiceDefaultProxy $domain $s "= /web/" --path "/web/index.html" --comment "Proxy main Jellyfin traffic" $argv getServiceDefaultProxy $domain $s "= /web/" --path "/web/index.html" --comment "Proxy main Jellyfin traffic" $argv
getServiceDefaultProxy $domain $s "/socket" --comment "Proxy Jellyfin Websockets traffic" $argv getServiceDefaultProxy $domain $s /socket --comment "Proxy Jellyfin Websockets traffic" $argv
else if [ "$s" = "$flood" ] else if [ "$s" = "$flood" ]
getServiceDefaultProxy $argv getServiceDefaultProxy $argv
printf "%s\n" \ printf "%s\n" \
"location = /flood {" \ "location = /flood {" \
'return 302 $scheme://$host$uri/$is_args$args;' \ 'return 302 $scheme://$host$uri/$is_args$args;' \
"}" "}"
else else
getServiceDefaultProxy $argv --path "$location" getServiceDefaultProxy $argv --path "$location"
@ -128,7 +126,7 @@ begin
printf "%s\n" \ printf "%s\n" \
"# Disable buffering when the nginx proxy gets very resource heavy upon streaming" \ "# Disable buffering when the nginx proxy gets very resource heavy upon streaming" \
"proxy_buffering off;" "proxy_buffering off;"
else if [ "$location" = "/socket" ] else if [ "$location" = /socket ]
printf "%s\n" \ printf "%s\n" \
'# Websocket' \ '# Websocket' \
"proxy_http_version 1.1;" \ "proxy_http_version 1.1;" \
@ -138,8 +136,8 @@ begin
end end
end end
function getBackupArgs function getExtraBackupPatterns
printf "%s\n" --hidden --no-ignore . --exclude "docker-compose.yml" (getServiceRoot $argv) echo "^proton\.env\$"
end end
runInstaller --force $argv runInstaller --force $argv

View file

@ -7,6 +7,7 @@ import subprocess
import sys import sys
from protonvpn_cli.cli import FeatureEnum, protonvpn from protonvpn_cli.cli import FeatureEnum, protonvpn
def run_proton(args): def run_proton(args):
exit( exit(
subprocess.run( subprocess.run(
@ -17,6 +18,7 @@ def run_proton(args):
PIPENV_VENV_IN_PROJECT=f"{1}", PIPENV_VENV_IN_PROJECT=f"{1}",
PVPN_CMD_ARGS=" ".join(args))).returncode) PVPN_CMD_ARGS=" ".join(args))).returncode)
protonvpn.ensure_connectivity() protonvpn.ensure_connectivity()
args = sys.argv[1:] args = sys.argv[1:]
@ -56,9 +58,11 @@ else:
try: try:
session.ensure_valid() session.ensure_valid()
except: except:
raise Exception("Your current session is invalid. Please initialize the session using the `init` subcommand.") raise Exception(
"Your current session is invalid. Please initialize the session using the `init` subcommand.")
environ["PVPN_USERNAME"] = session.vpn_username + (environ.get("PVPN_TAGS") or "") environ["PVPN_USERNAME"] = session.vpn_username + \
(environ.get("PVPN_TAGS") or "")
environ["PVPN_PASSWORD"] = session.vpn_password environ["PVPN_PASSWORD"] = session.vpn_password
environ["PVPN_TIER"] = f"{session.vpn_tier}" environ["PVPN_TIER"] = f"{session.vpn_tier}"
@ -95,6 +99,7 @@ else:
run_proton(["connect", server.name]) run_proton(["connect", server.name])
else: else:
raise Exception(f"Unable to find a server matching the specified criteria {args[1:]}!") raise Exception(
f"Unable to find a server matching the specified criteria {args[1:]}!")
else: else:
run_proton(args) run_proton(args)

View file

@ -0,0 +1,30 @@
services:
legacy:
image: itzg/minecraft-server
restart: unless-stopped
environment:
UID: 1337
GID: 1337
EULA: "TRUE"
ports:
- 25565:25565
volumes:
- /etc/localtime:/etc/localtime:ro
- ./mods:/mods
- ./config/legacy:/config
- ./data/legacy:/data
- ./legacy.properties:/data/server.properties
bedrock:
image: itzg/minecraft-bedrock-server
restart: unless-stopped
environment:
UID: 1337
GID: 1337
EULA: "TRUE"
ports:
- 19132:19132/udp
- 19133:19133/udp
volumes:
- /etc/localtime:/etc/localtime:ro
- ./data/bedrock:/data
- ./bedrock.properties:/data/server.properties

View file

@ -0,0 +1,73 @@
#!/bin/env fish
begin
set -l dir (status dirname)
set -l user minecraft
source "$dir/../service.fish"
function installSW -V dir -V domain -V server -V service
initializeServiceInstallation $argv
sudo cp "$dir/docker-compose.yml" (getServiceRoot $argv)
installDockerService $argv
end
function configureSW -V dir -V user -V service
set -l uid
set -l gid
set -l file (mktemp)
set -l root (getServiceRoot $argv)
set -l dirs "$root"/{mods,{data,config}/{legacy,bedrock}}
set -l files "$root"/{legacy,bedrock}.properties
set -l config "$root/docker-compose.yml"
configureDockerService $argv
and sudo useradd \
--system \
--shell /bin/false \
--comment 'Minecraft server' \
--groups docker \
$user
set uid (id -u $user)
set gid (id -g $user)
for service in (yq -0 ".services | keys[]" "$config" | string split0)
set -l envKey "$(getServiceKey "$service").environment"
cp "$config" "$file"
and yq "$envKey.UID = $uid" "$file" |
yq "$envKey.GID = $gid" |
sudo tee "$config" >/dev/null
end
and for dir in $dirs
sudo mkdir -p "$dir"
end
and begin
set -l file
for file in $files
sudo mkdir -p (dirname "$file")
sudo touch "$file"
end
end
and for item in $dirs $files
sudo chown -R $uid:$gid "$item"
end
rm "$file"
end
function getServiceServers -V server
end
function getServiceLocations
end
function getExtraBackupPatterns
echo "\.properties\$|^(config|mods)\$"
end
runInstaller --force $argv
end

View file

@ -0,0 +1 @@
*

View file

@ -0,0 +1,3 @@
FROM redis
ENV REDIS_HOST_PASSWORD default-password
CMD ["sh", "-c", "exec redis-server --requirepass \"${REDIS_HOST_PASSWORD}\""]

View file

@ -0,0 +1,33 @@
FROM nextcloud:fpm
# Workaround for Nextcloud image not including `bz2`
RUN apt-get update && \
apt-get install -y \
libbz2-dev \
libfcgi-bin && \
rm -rf /var/lib/apt/lists/* && \
docker-php-ext-install bz2
RUN apt-get update && \
curl -fsSL https://deb.nodesource.com/setup_lts.x | bash - && \
apt-get install -y nodejs && \
rm -rf /var/lib/apt/lists/*
RUN apt-get update && \
apt-get install -y --no-install-recommends \
libmagickcore-6.q16-6-extra \
libxss1 \
libx11-xcb1 \
wget && \
wget -q -O - https://dl-ssl.google.com/linux/linux_signing_key.pub | apt-key add - && \
sh -c 'echo "deb [arch=amd64] http://dl.google.com/linux/chrome/deb/ stable main" >> /etc/apt/sources.list.d/google.list' && \
apt-get update && \
apt-get install -y google-chrome-stable --no-install-recommends && \
apt-get remove -y wget gnupg && \
rm -rf /var/lib/apt/lists/* && \
rm /etc/apt/sources.list.d/google.list
RUN curl -Lo /usr/local/bin/php-fpm-healthcheck https://raw.githubusercontent.com/renatomefi/php-fpm-healthcheck/v0.5.0/php-fpm-healthcheck && \
chmod +x /usr/local/bin/php-fpm-healthcheck
RUN npm install --global pageres-cli --unsafe-perm

View file

@ -0,0 +1,107 @@
services:
web:
image: nginx
extends:
file: docker-compose.core.yml
service: web
volumes:
- ./nginx/web.conf:/etc/nginx/nginx.conf
- ./nginx/logs/nginx:/var/log/nginx
depends_on:
core:
condition: service_healthy
installer:
extends:
file: docker-compose.core.yml
service: setup
image: nextcloud:fpm
restart: on-failure
entrypoint:
- bash
- -c
- /entrypoint.sh php-fpm & while ! echo '' 2>/dev/null >/dev/tcp/127.0.0.1/9000; do sleep 1; done; kill -9 $!; true;
db:
image: mariadb:lts
restart: unless-stopped
env_file: db.env
environment:
MARIADB_RANDOM_ROOT_PASSWORD: "yes"
MARIADB_MYSQL_LOCALHOST_USER: 1
volumes:
- ./data/db:/var/lib/mysql
command:
- --innodb_read_only_compressed=OFF
healthcheck:
test: [CMD, healthcheck.sh, --su-mysql, --connect, --innodb_initialized]
start_period: 1m
start_interval: 10s
interval: 1m
timeout: 5s
retries: 3
cache:
build:
context: .
dockerfile: cache.Dockerfile
restart: unless-stopped
env_file:
- cache.env
volumes:
- ./data/cache:/data
healthcheck:
test: [CMD, bash, -c, echo '' > /dev/tcp/127.0.0.1/6379]
interval: 5s
timeout: 3s
retries: 5
core:
extends:
file: docker-compose.core.yml
service: nextcloud
build:
context: .
dockerfile: cloud.Dockerfile
cap_add:
- SYS_ADMIN
depends_on: &nextcloud-conditions
db:
condition: service_healthy
cache:
condition: service_healthy
installer:
condition: service_completed_successfully
restart: true
healthcheck:
test: [CMD, bash, -c , php-fpm-healthcheck]
start_period: 1m
start_interval: 10s
interval: 1m
timeout: 5s
retries: 5
cron:
extends:
file: docker-compose.core.yml
service: nextcloud
image: nextcloud:fpm
depends_on:
<<: *nextcloud-conditions
entrypoint: /cron.sh
bridge:
image: shenxn/protonmail-bridge
restart: unless-stopped
volumes:
- ./data/bridge:/root
turn:
image: instrumentisto/coturn
restart: unless-stopped
collabora:
image: collabora/code
restart: unless-stopped
environment:
dictionaries: de_CH de en
extra_params: '--o:logging.level_startup=warning --o:ssl.enable=true --o:ssl.termination=true --o:user_interface.mode=notebookbar'
volumes:
- /etc/localtime:/etc/localtime:ro
cap_add:
- MKNOD
volumes:
webroot: {}

View file

@ -0,0 +1,32 @@
services:
web:
restart: unless-stopped
volumes:
- webroot:/var/www/html:z
- ./php.ini:/usr/local/etc/php/conf.d/nextcloud.ini
- ./data/cloud/apps:/var/www/html/custom_apps
- ./data/cloud/config:/var/www/html/config
- ./data/cloud/data:/var/www/html/data
- ./data/cloud/themes:/var/www/html/themes
- ./data/public:/public
- ../jellyfin/downloads:/downloads
setup:
extends:
service: web
environment:
FCGI_STATUS_PATH: "/fpm-status"
env_file:
- db.env
- cache.env
volumes:
- ./fpm/nextcloud.conf:/usr/local/etc/php-fpm.d/zz-nextcloud.conf
- ./fpm/status.conf:/usr/local/etc/php-fpm.d/zz-status.conf
nextcloud:
extends:
service: setup
env_file:
- nextcloud.env
environment:
MYSQL_HOST: db
REDIS_HOST: cache
TRUSTED_PROXIES: 172.16.0.0/12

View file

@ -0,0 +1,12 @@
services:
web:
ports:
- 127.0.0.1:1337:80
turn:
ports:
- 1337:3478/tcp
- 1337:3478/udp
command: [-n, --log-file=stdout, --min-port=49160, --max-port=49200, --use-auth-secret]
collabora:
ports:
- 127.0.0.1:1337:9980

View file

@ -0,0 +1,5 @@
[www]
; pm.max_children = 200
; pm.start_servers = 50
; pm.min_spare_servers = 50
; pm.max_spare_servers = 150

View file

@ -0,0 +1 @@
pm.status_path = /fpm-status

View file

@ -0,0 +1,108 @@
#!/bin/env fish
begin
set -l dir (status dirname)
set -l turn turn
set -l domain cloud ""
set -l service web
set -l office collabora
set -l officeDomain office ""
set -l server $service $domain
set -l services \
$server \
$turn turn "" \
$office $officeDomain
source "$dir/../service.fish"
function installSW -V dir -V domain -V service -V turn -V office -V officeDomain
set -l genPW __generatePW
function $genPW -a length
if [ -z "$length" ]
set length 32
end
nix-shell -p keepassxc --run "keepassxc-cli generate --length $length"
end
set -l file (mktemp)
set -l root (getServiceRoot $argv)
set -l source "$dir/docker-compose.core.yml"
set -l core "$root/$(basename "$source")"
set -l domain (getServiceDomain $domain)
set -l overrides (getServiceOverrides $argv)
set -l overridesSource "$dir/$(basename "$overrides")"
set -l turnKey "$(getServiceKey "$turn")"
set -l portKey "$turnKey.ports[1]"
set -l officeEnv "$(getServiceKey "$office").environment"
set -l dbPW ($genPW)
set -l turnPW ($genPW)
set -l turnPort
set -l redisPW ($genPW)
set -l nextcloudPW ($genPW 64)
initializeServiceInstallation $argv
sudo cp -r "$dir"/{cache.Dockerfile,cloud.Dockerfile,docker-compose.{base,core}.yml,.dockerignore,fpm,nginx,php.ini} "$root"
begin
printf "%s\n" \
"MYSQL_DATABASE=Nextcloud" \
"MYSQL_USER=nextcloud" \
"MYSQL_PASSWORD=$dbPW"
end | sudo tee "$root/db.env" >/dev/null
echo "REDIS_HOST_PASSWORD=$redisPW" | sudo tee "$root/cache.env" >/dev/null
begin
printf "%s\n" \
"NEXTCLOUD_ADMIN_USER=admin" \
"NEXTCLOUD_ADMIN_PASSWORD=$nextcloudPW" \
"NEXTCLOUD_TRUSTED_DOMAINS=$domain" \
"OVERWRITEPROTOCOL=https" \
"OVERWRITEHOST=$domain" \
"OVERWRITECLIURL=https://$domain"
end | sudo tee "$root/nextcloud.env" >/dev/null
PROTO="https" DOMAIN="$domain" begin
set -l key "$turnKey.command"
PW="--static-auth-secret=$turnPW" \
DOMAIN="--realm=$domain" \
yq "$key |= . + [env(PW), env(DOMAIN)]" "$overridesSource" |
DOMAIN=(getServiceDomain $officeDomain) yq "$officeEnv.server_name = env(DOMAIN)" |
URL="https://$(string escape --style regex "$DOMAIN"):443" yq "$officeEnv.aliasgroup1 = env(URL)" |
sudo tee "$overrides" >/dev/null
end
installDockerService $argv
set turnPort (yq (getServicePortKey "$turn") "$overrides" | extractPort)
set turnPort (yq "$portKey" "$overrides" | mutatePort "$turnPort")
cp "$overrides" "$file"
PORT="$turnPort" yq "$portKey = env(PORT)" "$file" | sudo tee "$overrides" >/dev/null
rm "$file"
end
function configureSW -V dir
configureDockerService $argv
end
function getServiceServers -V services
for i in (seq 1 3 (count $services))
printf "%s\0" $services[(math $i + 1)] $services[(math $i + 2)]
end
end
function getServiceLocations -V services -a index
set -l i (math (math (math $index - 1) / 2 "*" 3) + 1)
set -l name $services[$i]
printf "%s\0" "$name" /
end
function getExtraBackupPatterns
echo "^(cache|db|nextcloud)\.env\$"
end
runInstaller --force $argv
end

View file

@ -0,0 +1,185 @@
worker_processes 8;
error_log /var/log/nginx/error.log warn;
pid /var/run/nginx.pid;
events {
worker_connections 1024;
}
http {
include mime.types;
default_type application/octet-stream;
types {
application/javascript cjs mjs;
}
log_format main '$remote_addr - $remote_user [$time_local] "$request" '
'$status $body_bytes_sent "$http_referer" '
'"$http_user_agent" "$http_x_forwarded_for"';
access_log /var/log/nginx/access.log main;
sendfile on;
server_tokens off;
keepalive_timeout 65;
# Set the `immutable` cache control options only for assets with a cache busting `v` argument
map $arg_v $asset_immutable {
"" "";
default "immutable";
}
upstream php-handler {
server core:9000;
}
server {
listen 80;
# set max upload size and increase upload timeout:
client_max_body_size 512M;
client_body_timeout 300s;
fastcgi_buffers 64 4K;
# The settings allow you to optimize the HTTP2 bandwith.
# See https://blog.cloudflare.com/delivering-http-2-upload-speed-improvements/
# for tuning hints
client_body_buffer_size 512k;
# Enable gzip but do not remove ETag headers
gzip on;
gzip_vary on;
gzip_comp_level 4;
gzip_min_length 256;
gzip_proxied expired no-cache no-store private no_last_modified no_etag auth;
gzip_types application/atom+xml text/javascript application/javascript application/json application/ld+json application/manifest+json application/rss+xml application/vnd.geo+json application/vnd.ms-fontobject application/wasm application/x-font-ttf application/x-web-app-manifest+json application/xhtml+xml application/xml font/opentype image/bmp image/svg+xml image/x-icon text/cache-manifest text/css text/plain text/vcard text/vnd.rim.location.xloc text/vtt text/x-component text/x-cross-domain-policy;
# HTTP response headers
add_header Referrer-Policy "no-referrer" always;
add_header X-Content-Type-Options "nosniff" always;
add_header X-Frame-Options "SAMEORIGIN" always;
add_header X-Permitted-Cross-Domain-Policies "none" always;
add_header X-Robots-Tag "noindex, nofollow" always;
add_header X-XSS-Protection "1; mode=block" always;
# Remove X-Powered-By, which is an information leak
fastcgi_hide_header X-Powered-By;
# Path to the root of your installation
root /var/www/html;
# Specify how to handle directories -- specifying `/index.php$request_uri`
# here as the fallback means that Nginx always exhibits the desired behaviour
# when a client requests a path that corresponds to a directory that exists
# on the server. In particular, if that directory contains an index.php file,
# that file is correctly served; if it doesn't, then the request is passed to
# the front-end controller. This consistent behaviour means that we don't need
# to specify custom rules for certain paths (e.g. images and other assets,
# `/updater`, `/ocm-provider`, `/ocs-provider`), and thus
# `try_files $uri $uri/ /index.php$request_uri`
# always provides the desired behaviour.
index index.php index.html /index.php$request_uri;
# Rule borrowed from `.htaccess` to handle Microsoft DAV clients
location = / {
if ( $http_user_agent ~ ^DavClnt ) {
return 302 /remote.php/webdav/$is_args$args;
}
}
location = /robots.txt {
allow all;
log_not_found off;
access_log off;
}
# Make a regex exception for `/.well-known` so that clients can still
# access it despite the existence of the regex rule
# `location ~ /(\.|autotest|...)` which would otherwise handle requests
# for `/.well-known`.
location ^~ /.well-known {
# The rules in this block are an adaptation of the rules
# in `.htaccess` that concern `/.well-known`.
location = /.well-known/carddav { return 301 /remote.php/dav/; }
location = /.well-known/caldav { return 301 /remote.php/dav/; }
# Let Nextcloud's API for `/.well-known` URIs handle all other
# requests by passing them to the front-end controller.
return 301 /index.php$request_uri;
}
# Rules borrowed from `.htaccess` to hide certain paths from clients
location ~ ^/(?:build|tests|config|lib|3rdparty|templates|data)(?:$|/) { return 404; }
location ~ ^/(?:\.|autotest|occ|issue|indie|db_|console) { return 404; }
# Ensure this block, which passes PHP files to the PHP process, is above the blocks
# which handle static assets (as seen below). If this block is not declared first,
# then Nginx will encounter an infinite rewriting loop when it prepends `/index.php`
# to the URI, resulting in a HTTP 500 error response.
location ~ \.php(?:$|/) {
# Required for legacy support
rewrite ^/(?!index|remote|public|cron|core\/ajax\/update|status|ocs\/v[12]|updater\/.+|ocs-provider\/.+|.+\/richdocumentscode\/proxy) /index.php$request_uri;
fastcgi_split_path_info ^(.+?\.php)(/.*)$;
set $path_info $fastcgi_path_info;
try_files $fastcgi_script_name =404;
include fastcgi_params;
fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name;
fastcgi_param PATH_INFO $path_info;
fastcgi_param HTTPS on;
fastcgi_param modHeadersAvailable true; # Avoid sending the security headers twice
fastcgi_param front_controller_active true; # Enable pretty urls
fastcgi_pass php-handler;
fastcgi_intercept_errors on;
fastcgi_request_buffering off;
fastcgi_max_temp_file_size 0;
}
# Javascript mimetype fixes for nginx
# Note: The block below should be removed, and the js|mjs section should be
# added to the block below this one. This is a temporary fix until Nginx
# upstream fixes the js mime-type
location ~* \.(?:js|mjs)$ {
types {
text/javascript js mjs;
}
try_files $uri /index.php$request_uri;
add_header Cache-Control "public, max-age=15778463, $asset_immutable";
access_log off;
}
# Serve static files
location ~ \.(?:css|svg|gif|png|jpg|ico|wasm|tflite|map|ogg|flac)$ {
try_files $uri /index.php$request_uri;
add_header Cache-Control "public, max-age=15778463, $asset_immutable";
access_log off; # Optional: Don't log access to assets
location ~ \.wasm$ {
default_type application/wasm;
}
}
location ~ \.woff2?$ {
try_files $uri /index.php$request_uri;
expires 7d; # Cache-Control policy borrowed from `.htaccess`
access_log off; # Optional: Don't log access to assets
}
# Rule borrowed from `.htaccess`
location /remote {
return 301 /remote.php$request_uri;
}
location / {
try_files $uri $uri/ /index.php$request_uri;
}
}
}

View file

@ -0,0 +1,5 @@
memory_limit = 1G
upload_max_filesize = 16G
post_max_size = 1G
max_input_time = 3600
max_execution_time = 3600

View file

@ -0,0 +1,11 @@
services:
ryot:
image: ghcr.io/ignisda/ryot:latest
restart: unless-stopped
volumes:
- ./data:/data
db:
image: postgres
restart: unless-stopped
volumes:
- ./database:/var/lib/postgresql/data

View file

@ -0,0 +1,11 @@
services:
ryot:
environment:
DATABASE_URL: postgres://ryot:pw@db/Ryot
ports:
- 127.0.0.1:1337:8000
db:
environment:
POSTGRES_DB: Ryot
POSTGRES_USER: ryot
POSTGRES_PASSWORD: pw

View file

@ -0,0 +1,44 @@
#!/bin/env fish
begin
set -l dir (status dirname)
set -l domain tracker ""
set -l service ryot
set -l source "$dir/docker-compose.overrides.yml"
source "$dir/../service.fish"
function installSW -V dir -V domain -V service -V source
set -l domain (getServiceDomain $domain)
set -l root (getServiceRoot $argv)
set -l file "$dir/docker-compose.base.yml"
set -l pw (nix-shell -p keepassxc --run "keepassxc-cli generate --length 32")
set -l envKey ".services.$service.environment"
set -l dbKey "$envKey.DATABASE_URL"
set -l dbUrl (yq "$dbKey" "$source" | sed "s/^\(.*:\/\/.*:\).*\(@.*\/.*\)\$/\1$pw\2/")
initializeServiceInstallation $argv
sudo cp "$file" "$root"
URL=$dbUrl yq "$dbKey = env(URL)" "$source" |
PW=$pw yq ".services.db.environment.POSTGRES_PASSWORD = env(PW)" |
sudo tee (getServiceOverrides $argv) >/dev/null
installDockerService $argv
end
function configureSW -V dir
configureDockerService $argv
end
function getServiceServers -V domain
printf "%s\0" $domain
end
function getServiceLocations -V service
printf "%s\0" $service /
end
function getBackupArgs
printf "%s\n" --hidden --no-ignore . --exclude "docker-compose.yml" (getServiceRoot $argv)
end
runInstaller --force $argv
end

View file

@ -2,7 +2,7 @@
begin begin
set -l dir (status dirname) set -l dir (status dirname)
set -l root /usr/local/lib set -l root /usr/local/lib
set -l secretsFile "docker-compose.secrets.yml" set -l overrides "docker-compose.overrides.yml"
set -l nginxRoot "/etc/nginx/conf.d" set -l nginxRoot "/etc/nginx/conf.d"
source "$dir/../../../../lib/software.fish" source "$dir/../../../../lib/software.fish"
@ -11,7 +11,7 @@ begin
end end
function getPortPattern function getPortPattern
echo "^\([.[:digit:]]\+:\)\([[:digit:]]\+\)\(:[[:digit:]]\+\)" echo "^\([.[:digit:]]\+:\)\?\([[:digit:]]\+\)\(:[[:digit:]]\+\(\/tcp\|udp\)\?\)"
end end
function __substitutePort -a substitution function __substitutePort -a substitution
@ -48,11 +48,11 @@ begin
echo "$nginxRoot/$(getServiceName $argv).conf" echo "$nginxRoot/$(getServiceName $argv).conf"
end end
function getServiceSecretsConfig -V secretsFile function getServiceOverrides -V overrides
echo "$(getServiceRoot $argv)/$secretsFile" echo "$(getServiceRoot $argv)/$overrides"
end end
function __getServicePortKey -V secretsFile -a name function getServicePortKey -V overrides -a name
echo "$(getServiceKey "$name").ports[0]" echo "$(getServiceKey "$name").ports[0]"
end end
@ -78,9 +78,9 @@ begin
function getServiceDefaultProxy -a domain service location function getServiceDefaultProxy -a domain service location
argparse -i "comment=" "path=" "url=" -- $argv argparse -i "comment=" "path=" "url=" -- $argv
set -l url set -l url
set -l config (getServiceSecretsConfig $argv) set -l config (getServiceOverrides $argv)
set -l portKey (__getServicePortKey "$service") set -l portKey (getServicePortKey "$service")
set -l port (yq --raw-output "$portKey" "$config" | extractPort) set -l port (yq "$portKey" "$config" | extractPort)
if [ -n "$_flag_url" ] if [ -n "$_flag_url" ]
set url "$_flag_url" set url "$_flag_url"
@ -111,14 +111,17 @@ begin
function getExtraLocationSettings -a domain service location function getExtraLocationSettings -a domain service location
end end
function initializeServiceInstallation -V nginxRoot function initializeServiceInstallation -V dir -V nginxRoot
set -l root (getServiceRoot $argv)
sudo mkdir -p (getServiceRoot $argv) sudo mkdir -p (getServiceRoot $argv)
sudo mkdir -p "$nginxRoot" sudo mkdir -p "$nginxRoot"
sudo mkdir -p (dirname (getServiceSecretsConfig $argv)) sudo mkdir -p (dirname (getServiceOverrides $argv))
sudo touch "$root/docker-compose.overrides.yml"
sudo cp "$dir/docker-compose.yml" "$root"
end end
function installDockerService -V dir -V nginxRoot function installDockerService -V dir -V nginxRoot
set -l config (getServiceSecretsConfig $argv) set -l config (getServiceOverrides $argv)
set -l servers (getServiceServers $argv | string split0) set -l servers (getServiceServers $argv | string split0)
for i in (seq 1 2 (count $servers)) for i in (seq 1 2 (count $servers))
@ -128,14 +131,14 @@ begin
set -l file (mktemp) set -l file (mktemp)
set -l port (getRandomPort) set -l port (getRandomPort)
set -l service $locations[$j] set -l service $locations[$j]
set -l portKey (__getServicePortKey "$service") set -l portKey (getServicePortKey "$service")
set -l exposedPort set -l exposedPort
sudo mkdir -p (getServiceRoot $argv) sudo mkdir -p (getServiceRoot $argv)
sudo mkdir -p "$nginxRoot" sudo mkdir -p "$nginxRoot"
cp "$config" "$file" cp "$config" "$file"
set exposedPort (yq --raw-output "$portKey" "$file" | mutatePort $port) set exposedPort (yq "$portKey" "$file" | mutatePort $port)
PORT=$exposedPort yq -y "$portKey = env.PORT" "$file" | sudo tee "$config" >/dev/null PORT=$exposedPort yq "$portKey = env(PORT)" "$file" | sudo tee "$config" >/dev/null
end end
end end
end end
@ -170,7 +173,17 @@ begin
sudo systemctl restart nginx sudo systemctl restart nginx
end end
function getExtraBackupPatterns
echo ""
end
function getBackupArgs function getBackupArgs
printf "%s\n" --hidden --no-ignore . --exclude "docker-compose.yml" (getServiceRoot $argv) set -l extraPatterns (getExtraBackupPatterns)
if [ -n "$extraPatterns" ]
set extraPatterns "|$extraPatterns"
end
printf "%s\n" --base-directory (getServiceRoot $argv) --hidden --no-ignore "^(docker-compose\.overrides\.yml|data)\$$extraPatterns"
end end
end end

View file

@ -0,0 +1,21 @@
services:
teamspeak:
image: teamspeak
restart: unless-stopped
depends_on:
- db
environment:
TS3SERVER_DB_PLUGIN: ts3db_mariadb
TS3SERVER_DB_SQLCREATEPATH: create_mariadb
TS3SERVER_DB_HOST: db
TS3SERVER_DB_WAITUNTILREADY: 30
TS3SERVER_LICENSE: accept
volumes:
- ./data/teamspeak:/var/ts3server
db:
image: mariadb
restart: unless-stopped
environment:
MARIADB_RANDOM_ROOT_PASSWORD: "yes"
volumes:
- ./data/db:/var/lib/mysql

View file

@ -0,0 +1,6 @@
services:
teamspeak:
ports:
- 9987:9987/udp
- 10011:10011
- 30033:30033

View file

@ -0,0 +1,44 @@
#!/bin/env fish
begin
set -l dir (status dirname)
set -l source "$dir/docker-compose.overrides.yml"
source "$dir/../service.fish"
function installSW -V dir -V domain -V source
set -l service teamspeak
set -l pw (nix-shell -p keepassxc --run "keepassxc-cli generate --length 32")
set -l db TeamSpeak
set -l tsEnv "$(getServiceKey "$service").environment"
set -l dbEnv "$(getServiceKey db).environment"
initializeServiceInstallation $argv
cp "$dir/docker-compose.base.yml" (getServiceRoot $argv)
USER="$service" begin
yq "$tsEnv.TS3SERVER_DB_USER = env(USER)" "$source" |
yq "$dbEnv.MARIADB_USER = env(USER)"
end | \
PW="$pw" begin
yq "$tsEnv.TS3SERVER_DB_PASSWORD = env(PW)" |
yq "$dbEnv.MARIADB_PASSWORD = env(PW)"
end | \
DB="$db" begin
yq "$tsEnv.TS3SERVER_DB_NAME = env(DB)" |
yq "$dbEnv.MARIADB_DATABASE = env(DB)"
end |
sudo tee (getServiceOverrides $argv) >/dev/null
installDockerService $argv
end
function configureSW -V dir
configureDockerService $argv
end
function getServiceServers -V server
end
function getServiceLocations
end
runInstaller --force $argv
end

View file

@ -0,0 +1,8 @@
services:
terraria:
image: ryshe/terraria:latest
restart: unless-stopped
tty: true
stdin_open: true
volumes:
- ./data:/root/.local/share/Terraria/Worlds

View file

@ -0,0 +1,8 @@
services:
terraria:
environment: {}
command:
-autocreate 1
-difficulty 1
-seed "AwesomeSeed"
-lang "en-US"

View file

@ -0,0 +1,24 @@
#!/bin/env fish
begin
set -l dir (status dirname)
source "$dir/../service.fish"
function installSW -V dir
set -l root (getServiceRoot $argv)
initializeServiceInstallation $argv
cp -rf "$dir"/docker-compose{.base,.overrides}.yml "$root"
installDockerService $argv
end
function configureSW -V dir
configureDockerService $argv
end
function getServiceServers
end
function getServiceLocations
end
runInstaller --force $argv
end

View file

@ -0,0 +1 @@
data/

View file

@ -0,0 +1,72 @@
services:
game:
build:
context: .
dockerfile: trackmania.Dockerfile
restart: unless-stopped
extends:
file: docker-compose.core.yml
service: tm
stdin_open: true
environment:
TM_XMLRPC_ALLOWED_REMOTE: xaseco
volumes:
- ./data/tm/data:/app/GameData
healthcheck:
test: [CMD, bash, -c, echo '' >/dev/tcp/127.0.0.1/5000]
start_period: 1m
start_interval: 10s
interval: 5s
timeout: 3s
retries: 5
downloader:
extends:
file: docker-compose.core.yml
service: xaseco-installer
volumes:
- ./initdb.d:/cache/localdb
healthcheck:
test: [CMD, bash, -c, ls /cache/localdb/*]
start_period: 1m
start_interval: 10s
interval: 5s
timeout: 3s
retries: 5
xaseco:
restart: unless-stopped
extends:
file: docker-compose.core.yml
service: xaseco
depends_on:
game:
condition: service_healthy
db:
condition: service_healthy
environment:
TM_SERVER_HOST: game
MYSQL_HOST: db
volumes:
- ./data/xaseco:/data
db:
image: mysql:5
restart: unless-stopped
extends:
file: docker-compose.core.yml
service: db
depends_on:
downloader:
condition: service_completed_successfully
command: --sql_mode=""
environment:
MYSQL_RANDOM_ROOT_PASSWORD: "yes"
volumes:
- ./data/db:/var/lib/mysql
- ./initdb.d:/docker-entrypoint-initdb.d
healthcheck:
test: [CMD, bash, -c, mysqladmin ping -hlocalhost -u "$$MYSQL_USER" -p"$$MYSQL_PASSWORD"]
timeout: 20s
retries: 10
volumes:
tm-server: {}
xaseco: {}

View file

@ -0,0 +1,19 @@
services:
tm:
environment: &tm-config
TM_SUPERADMIN_PASSWORD: pw
TM_SERVER_USER: null
TM_SERVER_PASSWORD: null
volumes: &tm-volumes
- ./data/tm/tracks:/app/GameData/Tracks/Challenges
db:
environment: &db-config
MYSQL_USER: xaseco
MYSQL_PASSWORD: pw
MYSQL_DATABASE: Aseco
xaseco:
environment:
<<:
- *tm-config
- *db-config
volumes: *tm-volumes

View file

@ -0,0 +1,30 @@
services:
tm:
extends:
file: docker-compose.core.overrides.yml
service: tm
volumes: &tm-volumes
- tm-server:/app
xaseco-installer:
build: &xaseco-build
context: .
dockerfile: xaseco.Dockerfile
restart: on-failure
command: "true"
<<: &xaseco-base
privileged: true
volumes: &xaseco-volumes
- xaseco:/cache
xaseco:
extends:
file: docker-compose.core.overrides.yml
service: xaseco
<<:
- *xaseco-base
- volumes: *tm-volumes
- volumes: *xaseco-volumes
build: *xaseco-build
db:
extends:
file: docker-compose.core.overrides.yml
service: db

View file

@ -0,0 +1,12 @@
services:
game:
command:
- /game_settings=MatchSettings/Nations/NationsBlue.txt
environment: {}
ports:
- 2350:2350
- 2350:2350/udp
- 2353:2353
- 2353:2353/udp
xaseco:
environment: {}

View file

@ -0,0 +1,37 @@
#!/bin/env fish
begin
set -l dir (status dirname)
set -l source "$dir/docker-compose.core.overrides.yml"
source "$dir/../service.fish"
function installSW -V dir -V domain -V source
set -l root (getServiceRoot $argv)
set -l tmPW (nix-shell -p keepassxc --run "keepassxc-cli generate --length 32")
set -l sqlPW (nix-shell -p keepassxc --run "keepassxc-cli generate --length 32")
initializeServiceInstallation $argv
cp -rf "$dir"/{.dockerignore,docker-compose{.base,.overrides,.core{,.overrides}}.yml,parser.patch,tmforever-entrypoint.sh,trackmania.Dockerfile,xaseco-entrypoint.sh,xaseco.Dockerfile} "$root"
PW="$tmPW" yq "$(getServiceKey "tm").environment.TM_SUPERADMIN_PASSWORD = env(PW)" "$source" |
PW="$sqlPW" yq "$(getServiceKey "db").environment.MYSQL_PASSWORD = env(PW)" |
sudo tee "$root/$(basename "$source")" >/dev/null
installDockerService $argv
end
function configureSW -V dir
configureDockerService $argv
end
function getServiceServers
end
function getServiceLocations
end
function getExtraBackupPatterns
echo "^docker-compose\.core\.overrides\.yml\$"
end
runInstaller --force $argv --name tm-forever
end

View file

@ -0,0 +1,11 @@
--- a/includes/xmlparser.inc.php
+++ b/includes/xmlparser.inc.php
@@ -37,8 +37,6 @@
else
$this->data = $source;
- // escape '&' characters
- $this->data = str_replace('&', '<![CDATA[&]]>', $this->data);
// parse xml file
$parsed = xml_parse($this->parser, $this->data);

View file

@ -0,0 +1,145 @@
#!/bin/bash
set -e
configSource="GameData/Config/dedicated_cfg"
configFile="GameData/Config/live_config.xml"
settingsPath="/dedicated"
authLevelsPath="$settingsPath/authorization_levels/level"
accountPath="$settingsPath/masterserver_account"
serverPath="$settingsPath/server_options"
systemPath="$settingsPath/system_config"
TM_SUPERADMIN_PASSWORD="${TM_SUPERADMIN_PASSWORD:-$(openssl rand -base64 33)}"
TM_ADMIN_PASSWORD="${TM_ADMIN_PASSWORD:-$(openssl rand -base64 33)}"
echo "Checking whether the server is present…"
levels=(
TM_SUPERADMIN_PASSWORD 1
TM_ADMIN_PASSWORD 2
TM_USER_PASSWORD 3
)
accountOption=(
TM_SERVER_USER login
TM_SERVER_PASSWORD password
TM_SERVER_VALIDATION_KEY validation_key
)
serverOptions=(
TM_TITLE name
TM_COMMENT comment
TM_HIDDEN hide_server
\
TM_MAX_PLAYERS max_players
TM_PLAYER_PASSWORD password
\
TM_MAX_SPECTATORS max_spectators
TM_SPECTATOR_PASSWORD password_spectator
\
TM_LADDER_MODE ladder_mode
TM_LADDER_LIMIT_MIN ladder_serverlimit_min
TM_LADDER_LIMIT_MAX ladder_serverlimit_max
\
TM_ENABLE_P2P_UPLOAD enable_p2p_upload
TM_ENABLE_P2P_DOWNLOAD enable_p2p_download
\
TM_CALLVOTE_TIMEOUT callvote_timeout
TM_CALLVOTE_RATIO callvote_ratio
\
TM_ALLOW_CHALLENGE_DOWNLOAD allow_challenge_download
TM_AUTOSAVE_REPLAYS autosave_replays
TM_AUTOSAVE_VALIDATION_REPLAYS autosave_validation_replays
\
TM_REFEREE_PASSWORD referee_password
TM_REFEREE_VALIDATION_MODE referee_validation_mode
\
TM_USE_CHANGING_VALIDATION_SEED use_changing_validation_seed
)
systemOptions=(
TM_BIND_IP bind_ip_address
TM_BIND_PORT server_port
TM_P2P_PORT server_p2p_port
TM_CLIENT_PORT client_port
TM_USE_NAT_UPNP use_nat_upnp
\
TM_XMLRPC_PORT xmlrpc_port
TM_XMLRPC_ALLOWED_REMOTE xmlrpc_allowremote
\
TM_PACKMASK packmask
\
TM_CONNECTION_UPLOADRATE connection_uploadrate
TM_CONNECTION_DOWNLOADRATE connection_downloadrate
\
TM_P2P_CACHE_SIZE p2p_cache_size
\
TM_BLACKLIST_URL blacklist_url
TM_GUESTLIST_FILENAME guestlist_filename
TM_BLACKLIST_FILENAME blacklist_filename
\
TM_ALLOW_SPECTATOR_RELAYS allow_spectator_relays
\
TM_USE_PROXY use_proxy
TM_PROXY_LOGIN proxy_login
TM_PROXY_PASSWORD proxy_password
)
if [[ ! -x "./TrackmaniaServer" ]] || [ ! -f "$configSource".* ]; then
echo "Server not found!"
echo "Downloading TrackMania Forever Dedicated Server…"
file="$(mktemp)"
dir="$(mktemp -d)"
wget http://files2.trackmaniaforever.com/TrackmaniaServer_2011-02-21.zip -O "$file" && unzip -o "$file" -d .
fi
if [ -f "$configSource.xml" ]; then
cp "$configSource.xml" "$configFile"
elif [ -f "$configSource.txt" ]; then
cp "$configSource.txt" "$configFile"
fi
for i in $(seq 0 2 $((${#levels[@]} - 1))); do
var="${levels[$i]}"
index="${levels[$(($i + 1))]}"
password="${!var}"
if [ -n "$password" ]; then
xmlstarlet edit --inplace --update "$authLevelsPath[$index]/password" --value "$password" "$configFile"
fi
done
for i in $(seq 0 2 $((${#accountOption[@]} - 1))); do
var="${accountOption[$i]}"
option="${accountOption[$(($i + 1))]}"
value="${!var}"
if [ -n "$value" ]; then
xmlstarlet edit --inplace --update "$accountPath/$option" --value "$value" "$configFile"
fi
done
for i in $(seq 0 2 $((${#serverOptions[@]} - 1))); do
var="${serverOptions[$i]}"
option="${serverOptions[$(($i + 1))]}"
value="${!var}"
if [ -n "$value" ]; then
xmlstarlet edit --inplace --update "$serverPath/$option" --value "$value" "$configFile"
fi
done
for i in $(seq 0 2 $((${#systemOptions[@]} - 1))); do
var="${systemOptions[$i]}"
option="${systemOptions[$(($i + 1))]}"
value="${!var}"
if [ -n "$value" ]; then
xmlstarlet edit --inplace --update "$systemPath/$option" --value "$value" "$configFile"
fi
done
if [ -z "$TM_LOG_FILES" ]; then
set -- "$@" /nologs
fi
unbuffer -p ./TrackmaniaServer /dedicated_cfg="$(basename "$configFile")" /nodaemon $@

View file

@ -0,0 +1,75 @@
FROM debian:11.3
RUN apt-get update -y \
&& apt-get install -y \
expect \
unzip \
wget \
xmlstarlet \
&& rm -rf /var/lib/apt/lists/*
RUN mkdir /app
WORKDIR /app
COPY ./tmforever-entrypoint.sh /usr/local/bin/tmforever-foreground
ENV \
TM_BIND_IP="" \
TM_BIND_PORT="" \
TM_P2P_PORT="" \
TM_CLIENT_PORT="" \
TM_USE_NAT_UPNP="" \
\
TM_XMLRPC_PORT="" \
TM_XMLRPC_ALLOWED_REMOTE="" \
\
TM_SERVER_USER="" \
TM_SERVER_PASSWORD="" \
TM_SERVER_VALIDATION_KEY="" \
\
TM_TITLE="" \
TM_COMMENT="" \
TM_HIDDEN="" \
\
TM_PACKMASK="" \
\
TM_MAX_PLAYERS="" \
TM_PLAYER_PASSWORD="" \
\
TM_MAX_SPECTATORS="" \
TM_SPECTATOR_PASSWORD="" \
\
TM_LADDER_MODE="" \
TM_LADDER_LIMIT_MIN="" \
TM_LADDER_LIMIT_MAX="" \
\
TM_ENABLE_P2P_UPLOAD="" \
TM_ENABLE_P2P_DOWNLOAD="" \
\
TM_CALLVOTE_TIMEOUT="" \
TM_CALLVOTE_RATIO="" \
\
TM_ALLOW_CHALLENGE_DOWNLOAD="" \
TM_AUTOSAVE_REPLAYS="" \
TM_AUTOSAVE_VALIDATION_REPLAYS="" \
\
TM_REFEREE_PASSWORD="" \
TM_REFEREE_VALIDATION_MODE="" \
\
TM_USE_CHANGING_VALIDATION_SEED="" \
\
TM_SUPERADMIN_PASSWORD="" \
TM_ADMIN_PASSWORD="" \
\
TM_CONNECTION_UPLOADRATE="" \
TM_CONNECTION_DOWNLOADRATE="" \
TM_P2P_CACHE_SIZE="" \
TM_BLACKLIST_URL="" \
TM_GUESTLIST_FILENAME="" \
TM_BLACKLIST_FILENAME="" \
TM_ALLOW_SPECTATOR_RELAYS="" \
TM_USE_PROXY="" \
TM_PROXY_LOGIN="" \
TM_PROXY_PASSWORD="" \
\
TM_LOG_FILES=""
ENTRYPOINT [ "tmforever-foreground" ]

View file

@ -0,0 +1,177 @@
#!/bin/bash
export TM_USER="${TM_USER:-SuperAdmin}"
export TM_PASSWORD="${TM_PASSWORD:-$TM_SUPERADMIN_PASSWORD}"
export TM_SERVER_PORT="${TM_SERVER_PORT:-$TM_XMLRPC_PORT}"
export DEDI_USER="${DEDI_USER:-$TM_SERVER_USER}"
export DEDI_PASSWORD="${DEDI_PASSWORD:-$TM_SERVER_PASSWORD}"
overlay="$(mktemp -d)"
upperDir="$overlay/upper"
workDir="$overlay/work"
cache="/cache"
data="/data"
runDir="/opt/xaseco"
entrypoint="$cache/aseco.php"
config="$runDir/config.xml"
adminConfig="$runDir/adminops.xml"
dbConfig="$runDir/localdatabase.xml"
dediConfig="$runDir/dedimania.xml"
pluginConfig="$runDir/plugins.xml"
settingsPath="/settings"
serverPath="$settingsPath/tmserver"
pluginTag="plugin"
pluginPath="/aseco_plugins"
userPattern="^(.+?)(@([[:digit:]]+(.[[:digit:]]+){3}))?\$"
tmOptions=(
TM_SERVER_HOST ip
TM_SERVER_PORT port
TM_USER login
TM_PASSWORD password
TM_TIMEOUT timeout
)
groups=(
ADMINS admins
OPERATORS operators
)
sqlOptions=(
MYSQL_HOST mysql_server
MYSQL_USER mysql_login
MYSQL_PASSWORD mysql_password
MYSQL_DATABASE mysql_database
)
dediOptions=(
DEDI_URL url
DEDI_NAME name
DEDI_USER login
DEDI_PASSWORD password
DEDI_NATION nation
DEDI_LOG_NEWS log_news
DEDI_SHOW_MOTD show_welcome
)
if [ ! -f "$entrypoint" ]; then
file="$(mktemp -u).zip"
root="$(mktemp -d)"
mkdir -p "$(dirname "$file")"
curl -v --insecure https://www.gamers.org/tmn/xaseco_116.zip -o "$file"
unzip -o "$file" -d "$root"
cp -r "$root"/xaseco/* "$cache"
fi
script="$(
printf "%s\n" \
'file="$(basename "$1")";' \
'if [[ "$file" == *".php" ]];' \
' then dir="includes";' \
'else' \
' dir=".";' \
'fi;' \
'if [ ! -f "$0/$dir/$file" ]; then' \
' mkdir -p "$0/$dir";' \
' cp "$1" "$0/$dir";' \
'fi;'
)"
find "$cache/newinstall" -type f -exec bash -c "$script" "$cache" \{\} \;
mount -t tmpfs tmpfs "$overlay"
mkdir -p "$upperDir" "$workDir"
mount -t overlay overlay -o lowerdir="$cache:$data",upperdir="$upperDir",workdir="$workDir" "$runDir"
cd "$runDir"
dos2unix "/root/parser.patch" ./includes/xmlparser.inc.php
patch -p 1 ./includes/xmlparser.inc.php "/root/parser.patch"
if [ -n "$MASTERADMIN_USER" ]; then
loginTag="tmlogin"
ipTag="ipaddress"
adminPath="$settingsPath/aseco/masteradmins"
nodesPath="$adminPath/*"
namePath="$nodesPath[1]"
ipPath="$nodesPath[2]"
if [ "$(xmlstarlet select --template -v "count($nodesPath)" "$config")" -lt 1 ]; then
xmlstarlet edit --inplace --subnode "$adminPath" --type elem -n "$loginTag" "$config"
fi
if [ "$(xmlstarlet select --template -v "count($nodesPath)" "$config")" -lt 2 ] ||
[ "$(xmlstarlet select --template -v "name($ipPath)" "$config")" != "$ipTag" ]; then
xmlstarlet edit --inplace --append "$namePath" --type elem -n "$ipTag" "$config"
fi
xmlstarlet edit --inplace --update "$namePath" --value "$MASTERADMIN_USER" "$config"
if [ -z "$MASTERADMIN_IP" ]; then
xmlstarlet edit --inplace --delete "$ipPath" "$config"
else
xmlstarlet edit --inplace --update "$ipPath" --value "$MASTERADMIN_IP" "$config"
fi
fi
for i in $(seq 0 2 $((${#tmOptions[@]} - 1))); do
var="${tmOptions[$i]}"
option="${tmOptions[$(($i + 1))]}"
value="${!var}"
if [ -n "$value" ]; then
xmlstarlet edit --inplace --update "$serverPath/$option" --value "$value" "$config"
fi
done
for i in $(seq 0 2 $((${#groups[@]} - 1))); do
var="${groups[$i]}"
group="${groups[$(($i + 1))]}"
value="${!var}"
path="/lists/$group"
echo "$value" | while read user; do
name="$(echo "$user" | LC_ALL="C" perl -pe "s/$userPattern/\1/")"
ip="$(echo "$user" | LC_ALL="C" perl -pe "s/$userPattern/\3/")"
xmlstarlet edit --inplace --subnode "$path" --type elem -n "tmlogin" --value "$name" "$adminConfig"
if [ -n "$ip" ]; then
xmlstarlet edit --inplace --subnode "$path" --type elem -n "ipaddress" --value "$ip" "$adminConfig"
fi
done
done
for i in $(seq 0 2 $((${#sqlOptions[@]} - 1))); do
var="${sqlOptions[$i]}"
option="${sqlOptions[$(($i + 1))]}"
value="${!var}"
xmlstarlet edit --inplace --update "$settingsPath/$option" --value "$value" "$dbConfig"
done
for i in $(seq 0 2 $((${#dediOptions[@]} - 1))); do
var="${dediOptions[$i]}"
option="${dediOptions[$(($i + 1))]}"
value="${!var}"
if [ -n "$value" ]; then
xmlstarlet edit --inplace --update "/dedimania/masterserver_account/$option" --value "$value" "$dediConfig"
fi
done
if [ -n "$X1_EXTRA_PLUGINS" ]; then
for plugin in $X1_EXTRA_PLUGINS; do
xmlstarlet edit --inplace --subnode "$pluginPath" --type elem -n "$pluginTag" --value "$plugin" "$pluginConfig"
done
fi
if [ -n "$X1_DISABLED_PLUGINS" ]; then
for i in $(seq 1 "$(xmlstarlet select --template -v "count($pluginPath/$pluginTag)" "$pluginConfig")"); do
for plugin in $X1_DISABLED_PLUGINS; do
path="$pluginPath/$pluginTag[$i]"
if [ "$(xmlstarlet select --template -v "$path/text()" "$pluginConfig")" == "$plugin" ]; then
xmlstarlet edit --inplace --delete "$path" "$pluginConfig"
fi
done
done
fi
$@

View file

@ -0,0 +1,62 @@
FROM alpine:3.14 AS base
RUN apk add xmlstarlet
FROM php:5.5-alpine
USER root
RUN apk update \
&& apk add \
bash \
unzip \
ca-certificates \
# xmlstarlet dependencies
musl \
libxslt \
libxml2 \
perl
RUN update-ca-certificates
RUN docker-php-ext-install mysql
COPY --from=base /usr/bin/xmlstarlet /usr/bin
COPY ./xaseco-entrypoint.sh /usr/local/bin/xaseco-foreground
COPY ./parser.patch /root/parser.patch
# Server dir
RUN mkdir /cache
# Override dir
RUN mkdir /data
# Merged dir
RUN mkdir -p /opt/xaseco
WORKDIR /opt/xaseco
ENV \
MASTERADMIN_USER="" \
MASTERADMIN_IP="" \
\
ADMINS="" \
OPERATORS="" \
\
X1_EXTRA_PLUGINS="" \
X1_DISABLED_PLUGINS="" \
\
TM_SERVER_HOST="" \
TM_SERVER_PORT="" \
TM_XMLRPC_PORT="" \
TM_TIMEOUT="" \
\
TM_USER="" \
TM_PASSWORD="" \
TM_SUPERADMIN_PASSWORD="" \
\
MYSQL_HOST="" \
MYSQL_USER="" \
MYSQL_PASSWORD="" \
MYSQL_DATABASE="" \
\
DEDI_URL="" \
DEDI_NAME="" \
DEDI_USER="" \
DEDI_PASSWORD="" \
DEDI_NATION="" \
DEDI_LOG_NEWS="" \
DEDI_SHOW_MOTD=""
ENTRYPOINT [ "xaseco-foreground" ]
CMD [ "php", "./aseco.php" ]

View file

@ -2,17 +2,12 @@ services:
vaultwarden: vaultwarden:
image: vaultwarden/server image: vaultwarden/server
restart: unless-stopped restart: unless-stopped
extends:
file: docker-compose.secrets.yml
service: vaultwarden
volumes: volumes:
- ./data:/data
- /etc/localtime:/etc/localtime:ro - /etc/localtime:/etc/localtime:ro
- ./data/vault:/data
environment: environment:
DOMAIN: null
SMTP_HOST: bridge SMTP_HOST: bridge
SMTP_FROM: null SMTP_FROM_VALUE: Vaultwarden
SMTP_FROM_VALUE: vaultwarden
SMTP_PORT: 25 SMTP_PORT: 25
SMTP_ACCEPT_INVALID_CERTS: "true" SMTP_ACCEPT_INVALID_CERTS: "true"
SIGNUPS_ALLOWED: "false" SIGNUPS_ALLOWED: "false"
@ -20,16 +15,13 @@ services:
db: db:
image: mariadb image: mariadb
restart: unless-stopped restart: unless-stopped
extends:
file: docker-compose.secrets.yml
service: db
volumes: volumes:
- ./db:/var/lib/mysql
- /etc/localtime:/etc/localtime:ro - /etc/localtime:/etc/localtime:ro
- ./data/db:/var/lib/mysql
environment: environment:
MARIADB_RANDOM_ROOT_PASSWORD: "yes" MARIADB_RANDOM_ROOT_PASSWORD: "yes"
bridge: bridge:
image: shenxn/protonmail-bridge image: shenxn/protonmail-bridge
restart: unless-stopped restart: unless-stopped
volumes: volumes:
- ./bridge:/root - ./data/bridge:/root

View file

@ -1,6 +1,8 @@
services: services:
vaultwarden: vaultwarden:
environment: environment:
DOMAIN: null
SMTP_FROM: null
DATABASE_URL: mysql://vaultwarden:pw@db/vault DATABASE_URL: mysql://vaultwarden:pw@db/vault
ports: ports:
- 127.0.0.1:1337:80 - 127.0.0.1:1337:80

View file

@ -1,25 +1,24 @@
#!/bin/env fish #!/bin/env fish
begin begin
set -l dir (status dirname) set -l dir (status dirname)
set -l domain "passwords" set -l domain passwords
set -l source "$dir/docker-compose.secrets.yml" set -l source "$dir/docker-compose.overrides.yml"
source "$dir/../service.fish" source "$dir/../service.fish"
function installSW -V dir -V domain -V source function installSW -V dir -V domain -V source
set -l file "$dir/docker-compose.yml" set -l file "$dir/docker-compose.base.yml"
set -l pw (nix-shell -p keepassxc --run "keepassxc-cli generate --length 32") set -l pw (nix-shell -p keepassxc --run "keepassxc-cli generate --length 32")
set -l envKey ".services.vaultwarden.environment" set -l envKey ".services.vaultwarden.environment"
set -l dbKey "$envKey.DATABASE_URL" set -l dbKey "$envKey.DATABASE_URL"
set -l dbUrl (yq --raw-output "$dbKey" "$source" | sed "s/^\(.*:\/\/.*:\).*\(@.*\/.*\)\$/\1$pw\2/") set -l dbUrl (yq "$dbKey" "$source" | sed "s/^\(.*:\/\/.*:\).*\(@.*\/.*\)\$/\1$pw\2/")
initializeServiceInstallation $argv initializeServiceInstallation $argv
cp "$dir/docker-compose.base.yml" (getServiceRoot $argv)
URL="https://$domain.$(getMachineFQDN)" yq "$envKey.DOMAIN = env.URL" "$file" | \ URL="https://$domain.$(getMachineFQDN)" yq "$envKey.DOMAIN = env(URL)" "$source" |
ADDRESS="noreply@$(getMachineFQDN)" yq -y "$envKey.SMTP_FROM = env.ADDRESS" | \ ADDRESS="no-reply@$(getMachineFQDN)" yq "$envKey.SMTP_FROM = env(ADDRESS)" |
sudo tee "$(getServiceRoot $argv)/$(basename "$file")" >/dev/null URL=$dbUrl yq "$dbKey = env(URL)" |
PW=$pw yq ".services.db.environment.MARIADB_PASSWORD = env(PW)" |
URL=$dbUrl yq "$dbKey = env.URL" "$source" | \ sudo tee (getServiceOverrides $argv) >/dev/null
PW=$pw yq ".services.db.environment.MARIADB_PASSWORD = env.PW" | \
sudo tee (getServiceSecretsConfig $argv) >/dev/null
installDockerService $argv installDockerService $argv
end end
@ -37,9 +36,5 @@ begin
printf "%s\0" "$_flag_name" / printf "%s\0" "$_flag_name" /
end end
function getBackupArgs
printf "%s\n" --hidden --no-ignore . --exclude "docker-compose.yml" (getServiceRoot $argv)
end
runInstaller --force $argv runInstaller --force $argv
end end

View file

@ -0,0 +1,28 @@
services:
wekan:
image: wekanteam/wekan
restart: unless-stopped
depends_on:
- db
user: 1337:1337
environment:
WRITABLE_PATH: /data
MONGO_URL: mongodb://db:27017/wekan
MONGO_OPLOG_URL:
WITH_API: "true"
RICHER_CARD_COMMENT_EDITOR: "true"
volumes:
- /etc/localtime:/etc/localtime:ro
- ./data/wekan:/data
db:
image: mongo
restart: unless-stopped
command: mongod --logpath /dev/null --oplogSize 128 --quiet
volumes:
- /etc/localtime:/etc/localtime:ro
- ./data/db:/data/db
bridge:
image: shenxn/protonmail-bridge
restart: unless-stopped
volumes:
- ./data/bridge:/root

View file

@ -0,0 +1,6 @@
services:
wekan:
environment:
ROOT_URL: https://example.com
ports:
- 127.0.0.1:1337:8080

View file

@ -0,0 +1,30 @@
#!/bin/env fish
begin
set -l dir (status dirname)
set -l service wekan
set -l domain due ""
source "$dir/../service.fish"
function installSW -V dir -V service -V domain
set -l domain (getServiceDomain $domain)
set -l overrides (getServiceOverrides $argv)
initializeServiceInstallation $argv
sudo cp "$dir/docker-compose.base.yml" (getServiceRoot $argv)
URL="https://$domain" yq "$(getServiceKey "$service").environment.ROOT_URL = env(URL)" "$dir/$(basename "$overrides")" |
sudo tee "$overrides" >/dev/null
installDockerService $argv
end
function getServiceServers -V domain
printf "%s\0" $domain
end
function getServiceLocations -V service
printf "%s\0" "$service" /
end
runInstaller --force $argv
end

View file

@ -0,0 +1 @@
data/

View file

@ -0,0 +1,7 @@
FROM tetafro/golang-gcc AS builder
RUN apk add -U --no-cache git
RUN git clone -b "v2.20.0" --depth=1 https://github.com/drone/drone.git
RUN cd drone && go build -trimpath -ldflags='-w -s' -tags nolimit -o /usr/local/bin/drone-server ./cmd/drone-server
FROM drone/drone
COPY --from=builder /usr/local/bin/drone-server /bin/

View file

@ -0,0 +1,26 @@
services:
ci-template:
image: woodpeckerci/woodpecker-server
restart: unless-stopped
depends_on: []
env_file:
- ci.common.env
environment:
WOODPECKER_DATABASE_DRIVER: mysql
volumes: []
agent-template:
image: woodpeckerci/woodpecker-agent
restart: unless-stopped
depends_on: []
command: agent
env_file:
- agent.common.env
environment: {}
volumes:
- /var/run/docker.sock:/var/run/docker.sock
db-template:
image: mariadb
restart: unless-stopped
environment:
MARIADB_RANDOM_ROOT_PASSWORD: "yes"
volumes: []

View file

@ -0,0 +1,116 @@
#!/bin/env fish
begin
set -l dir (status dirname)
set -l source "$dir/docker-compose.templates.yml"
source "$dir/../service.fish"
set -l environments \
my ci "" \
codeberg bergwache "" \
github gh.ci ""
function installSW -V dir -V environments -V source
set -l root (getServiceRoot $argv)
set -l config "$root/docker-compose.base.yml"
set -l overrides (getServiceOverrides $argv)
set -l ciTemplate (yq -oj (getServiceKey ci-template) "$source")
set -l agentTemplate (yq -oj (getServiceKey agent-template) "$source")
set -l dbTemplate (yq -oj (getServiceKey db-template) "$source")
initializeServiceInstallation $argv
echo "{}" | sudo tee "$config" >/dev/null
echo "{}" | sudo tee "$overrides" >/dev/null
cp "$dir/.dockerignore" "$root"
sudo touch "$root"/{agent,ci}.common.env
for i in (seq 1 3 (count $environments))
set -l name $environments[$i]
set -l domain $environments[(math $i + 2)]
set -l subdomain $environments[(math $i + 1)]
set -l secret (openssl rand -hex 32)
set -l services ci db agent
set -l tmpConfig (mktemp)
set -l tmpOverrides (mktemp)
set -l ciName "$name-ci"
set -l dbName "$name-db"
set -l agentName "$name-agent"
set -l ciEnv
set -l dbEnv
set -l agentEnv
set -l ciKey
set -l dbKey
set -l agentKey
set -l db Woodpecker
set -l dbUser woodpecker
set -l pw (nix-shell -p keepassxc --run "keepassxc-cli generate --length 32")
set -l domain (getServiceDomain "$subdomain" "$domain")
cp "$config" "$tmpConfig"
cp "$overrides" "$tmpOverrides"
for serviceName in $services
set -l file (mktemp)
set -l nameVar "$serviceName""Name"
set -l serviceKey (getServiceKey "$$nameVar")
set "$serviceName""Key" "$serviceKey"
set "$serviceName""Env" "$serviceKey.environment"
end
CI_NAME=$ciName \
SECRET_ENV="$name.secret.env" begin
begin
echo "WOODPECKER_AGENT_SECRET=$secret"
end | sudo tee "$root/$SECRET_ENV" >/dev/null
yq "$ciKey = $ciTemplate" "$tmpConfig" |
DB="$dbName" yq "$ciKey.depends_on |= . + [ env(DB) ]" |
ENTRY="./data/$name/ci:/var/lib/woodpecker" yq "$ciKey.volumes = [ env(ENTRY) ]" |
yq "$ciKey.env_file |= . + [ env(SECRET_ENV) ]" |
yq "$agentKey = $agentTemplate" |
yq "$agentKey.depends_on |= . + [ env(CI_NAME) ]" |
yq "$agentKey.env_file |= . + [ env(SECRET_ENV) ]" |
SERVER="$ciName:9000" yq "$agentEnv.WOODPECKER_SERVER = env(SERVER)" |
yq "$dbKey = $dbTemplate" |
ENTRY="./data/$name/db:/var/lib/mysql" yq "$dbKey.volumes |= . + [ env(ENTRY) ]" |
sudo tee "$config" >/dev/null
HOST="https://$domain" yq "$ciEnv.WOODPECKER_HOST = env(HOST)" "$tmpOverrides" |
PORT="127.0.0.1:1337:8000" yq "$ciKey.ports = [ env(PORT) ]" |
DB="$dbUser:$pw@tcp($dbName:3306)/$db?parseTime=true" yq "$ciEnv.WOODPECKER_DATABASE_DATASOURCE = env(DB)" |
USER="$dbUser" yq "$dbEnv.MARIADB_USER = env(USER)" |
PW="$pw" yq "$dbEnv.MARIADB_PASSWORD = env(PW)" |
DB="$db" yq "$dbEnv.MARIADB_DATABASE = env(DB)" |
sudo tee "$overrides" >/dev/null
end
end
installDockerService $argv
end
function configureSW -V dir
configureDockerService $argv
end
function getServiceServers -V environments
argparse -i "name=" -- $argv
set -l name "$_flag_name"
for i in (seq 1 3 (count $environments))
set -l domain $environments[(math $i + 2)]
set -l subdomain $environments[(math $i + 1)]
printf "%s\0" "$subdomain" "$domain"
end
end
function getServiceLocations -a index -V environments
set -l i (math (math (math $index - 1) / 2 "*" 3) + 1)
set -l name $environments[$i]
printf "%s\0" "$name-ci" /
end
function getExtraBackupPatterns
echo "\.secret\.env\$"
end
runInstaller --force $argv
end

View file

@ -5,6 +5,6 @@ begin
function getUserBackupArgs function getUserBackupArgs
argparse -i "user=" -- $argv argparse -i "user=" -- $argv
printf "%s\n" --base-directory ~"$_flag_user" --exact-depth 1 --hidden "^(\\.ssh|[^.])" --exclude "Games" --exclude "Desktop" ~ --exec fd . {} printf "%s\n" --base-directory ~"$_flag_user" --exact-depth 1 --hidden "^(\\.ssh|[^.])" --exclude Games --exclude Desktop ~ --exec fd . {}
end end
end end

View file

@ -11,6 +11,7 @@ sleep_secs="1"
# * 'ehci-pci' - USB 2.0 # * 'ehci-pci' - USB 2.0
# * 'xhci_hcd' - USB 3.0 # * 'xhci_hcd' - USB 3.0
echo "Looking for USB standards ..." echo "Looking for USB standards ..."
for usb_std in "$base/"?hci[-_]?c*; do for usb_std in "$base/"?hci[-_]?c*; do
echo "* USB standard '$usb_std' ..." echo "* USB standard '$usb_std' ..."
@ -25,4 +26,5 @@ for usb_std in "$base/"?hci[-_]?c*; do
echo " done." echo " done."
done done
echo "done." echo "done."

View file

@ -36,4 +36,4 @@ Start-SoftwareInstaller @args `
}).ToString()) -join "`n") ` }).ToString()) -join "`n") `
-Append; -Append;
} }
}; };

View file

@ -9,7 +9,7 @@ Start-SoftwareInstaller -Force @args `
$null = Push-Location $dir; $null = Push-Location $dir;
Invoke-WebRequest "https://global-download.acer.com/GDFiles/Driver/Monitor/Monitor_Acer_1.0_W7x86W7x64W8x86W8x64_A.zip?acerid=636092441703392074" -OutFile $file; Invoke-WebRequest "https://global-download.acer.com/GDFiles/Driver/Monitor/Monitor_Acer_1.0_W7x86W7x64W8x86W8x64_A.zip?acerid=636092441703392074" -OutFile $file;
Expand-Archive $file; Expand-Archive $file;
$null = Start-Process -Wait -FilePath "pnputil" -ArgumentList "/add-driver","*.inf","/install","/subdirs"; $null = Start-Process -Wait -FilePath "pnputil" -ArgumentList "/add-driver", "*.inf", "/install", "/subdirs";
$null = Pop-Location; $null = Pop-Location;
Remove-Item -Recurse $dir; Remove-Item -Recurse $dir;

View file

@ -1,25 +1,24 @@
InstallGameHub() InstallGameHub() {
{ SetDefaultMouseSpeed(100)
SetDefaultMouseSpeed(100) SetTitleMatchMode("RegEx")
SetTitleMatchMode("RegEx") windowTitle := "^Tobii Game Hub$"
windowTitle := "^Tobii Game Hub$"
Run("setup.exe") Run("setup.exe")
WinWait(windowTitle, unset, 60) WinWait(windowTitle, unset, 60)
WinActivate(windowTitle) WinActivate(windowTitle)
Sleep(2 * 1000) Sleep(2 * 1000)
MouseClick("Left", 485, 365) MouseClick("Left", 485, 365)
MouseClick("Left", 600, 455) MouseClick("Left", 600, 455)
MouseClick("Left", 533, 623) MouseClick("Left", 533, 623)
MouseClick("Left", 936, 662) MouseClick("Left", 936, 662)
Sleep(4 * 1000) Sleep(4 * 1000)
WinActivate(windowTitle) WinActivate(windowTitle)
MouseClick("Left", 1150, 60) MouseClick("Left", 1150, 60)
MouseClick("Left", 518, 203) MouseClick("Left", 518, 203)
Sleep(10 * 1000) Sleep(10 * 1000)
WinActivate(windowTitle) WinActivate(windowTitle)
pid := WinGetPID() pid := WinGetPID()
Run("pwsh -c Stop-Process -Force " . pid) Run("pwsh -c Stop-Process -Force " . pid)
} }
SetWorkingDir(A_InitialWorkingDir) SetWorkingDir(A_InitialWorkingDir)

View file

@ -1,22 +1,21 @@
InstallGhost() InstallGhost() {
{ SetDefaultMouseSpeed(100)
SetDefaultMouseSpeed(100) SetTitleMatchMode("RegEx")
SetTitleMatchMode("RegEx") windowTitle := "^Tobii Ghost$"
windowTitle := "^Tobii Ghost$"
Run("setup.exe") Run("setup.exe")
WinWait(windowTitle, unset, 60) WinWait(windowTitle, unset, 60)
WinActivate(windowTitle) WinActivate(windowTitle)
MouseClick("Left", 44, 694) MouseClick("Left", 44, 694)
MouseClick("Left", 330, 752) MouseClick("Left", 330, 752)
WinWaitNotActive() WinWaitNotActive()
WinWait(windowTitle, unset, 20) WinWait(windowTitle, unset, 20)
MouseClick("Left", 563, 397) MouseClick("Left", 563, 397)
MouseClick("Left", 650, 497) MouseClick("Left", 650, 497)
Sleep(10 * 1000) Sleep(10 * 1000)
WinActivate(windowTitle) WinActivate(windowTitle)
pid := WinGetPID() pid := WinGetPID()
Run("pwsh -c Stop-Process -Force " . pid) Run("pwsh -c Stop-Process -Force " . pid)
} }
SetWorkingDir(A_InitialWorkingDir) SetWorkingDir(A_InitialWorkingDir)

View file

@ -208,7 +208,7 @@ function Deploy-SoftwareAction {
Install-ChocoPackage teamspeak; Install-ChocoPackage teamspeak;
Remove-DesktopIcon "*TeamSpeak*"; Remove-DesktopIcon "*TeamSpeak*";
} }
elseif ($userInstall) { elseif ($userInstall) {
Install-WingetPackage ` Install-WingetPackage `
Element.Element ` Element.Element `
OpenWhisperSystems.Signal ` OpenWhisperSystems.Signal `

View file

@ -186,7 +186,8 @@ $null = New-Module {
$programs = & { $programs = & {
if ($User) { if ($User) {
return Get-UserConfig -UserName $User @args; return Get-UserConfig -UserName $User @args;
} else { }
else {
return Get-OSConfig @args; return Get-OSConfig @args;
} }
} "programs"; } "programs";
@ -207,7 +208,8 @@ $null = New-Module {
try { try {
(Get-ProgramConfig @PSBoundParameters).enable; (Get-ProgramConfig @PSBoundParameters).enable;
} catch { }
catch {
$false; $false;
} }
} }

View file

@ -90,7 +90,7 @@ $null = New-Module {
installer = $installHandler; installer = $installHandler;
arguments = $Arguments; arguments = $Arguments;
context = $Context; context = $Context;
base = { & $runBase @args }; base = { & $runBase @args };
}; };
switch ($Action) { switch ($Action) {

View file

@ -10,14 +10,15 @@ function runActionSetup -V dir
and runHook prepareNix || installNixPkgs and runHook prepareNix || installNixPkgs
and echo "Flagging repository as safe..." and echo "Flagging repository as safe..."
and sudo git config --system --add safe.directory (realpath "$(status dirname)/../..") and sudo git config --system --add safe.directory (realpath -m "$(status dirname)/../..")
and runHook actionPreRun || true and runHook actionPreRun || true
end end
function runActionConfigure function runActionConfigure -V dir
and if [ -z "$CONFIG_NAME" ] and if [ -z "$CONFIG_NAME" ]
source "$dir/settings.fish"
selectProfile config selectProfile config
set -x CONFIG_NAME "$config" set -gx CONFIG_NAME "$config"
end end
end end
@ -26,7 +27,7 @@ function disposeAction -V dir
source "$dir/nix.fish" source "$dir/nix.fish"
runHook actionPostRun || true runHook actionPostRun || true
and uninstallNixPkgs and uninstallNixPkgs
and sudo git config remove-section --system safe || true and sudo git config --remove-section --system safe || true
end end
function runAction -V dir function runAction -V dir
@ -37,39 +38,43 @@ function runAction -V dir
end end
function runSetupUserAction -V dir function runSetupUserAction -V dir
if [ (id -u) -eq 0 ] source "$dir/settings.fish"
runActionSetup
runActionConfigure
set -l name (getOSConfig setupUser.name)
if [ "$USER" != "$name" ]
set -l cmdline (cat /proc/$fish_pid/cmdline | string split0) set -l cmdline (cat /proc/$fish_pid/cmdline | string split0)
if [ -z "$TMUX" ] if [ (id -u) -ne 0 ]
runActionSetup sudo --set-home --preserve-env env "PATH=$PATH" $cmdline
tmux new-session -e "CONFIG_NAME=$CONFIG_NAME" $cmdline
else else
source "$dir/settings.fish" if [ -z "$TMUX" ]
runActionConfigure tmux new-session env (env) $cmdline
set -l sudoConfig "/etc/sudoers.d/PortValhalla" else
set -l name (getOSConfig setupUser.name) set -l sudoConfig "/etc/sudoers.d/PortValhalla"
and begin begin
echo "Creating setup user" echo "Creating setup user"
and useradd \ and useradd \
--comment "PortValhalla Setup User" \ --comment "PortValhalla Setup User" \
--system \ --system \
--no-user-group \ --groups nix-users \
--groups nix-users \ --create-home \
--create-home \ --uid (getOSConfig setupUser.id --json) \
--uid (getOSConfig setupUser.id --json) \ "$name"
"$name"
and begin
echo "$name ALL=(ALL:ALL) NOPASSWD: ALL"
end >"$sudoConfig"
and sudo --preserve-env --set-home --user "$name" env "PATH=$PATH" $cmdline
disposeAction
rm "$sudoConfig"
userdel -rf "$name"
end
end end
and begin
echo "$name ALL=(ALL:ALL) NOPASSWD: ALL"
end >"$sudoConfig"
and sudo --preserve-env --set-home --user "$name" $cmdline
disposeAction
rm "$sudoConfig"
userdel -rf "$name"
end end
else else
$argv $argv

Some files were not shown because too many files have changed in this diff Show more