mirror of
https://github.com/community-scripts/ProxmoxVE.git
synced 2026-05-23 17:04:58 +02:00
Compare commits
7 Commits
2026-05-22
...
main
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
6c7e7ae1af | ||
|
|
a73aefa8fd | ||
|
|
599e841e1a | ||
|
|
cf5db6b687 | ||
|
|
26b1adfbcc | ||
|
|
b97f8b9236 | ||
|
|
de2806ca54 |
19
CHANGELOG.md
19
CHANGELOG.md
@@ -464,6 +464,25 @@ Exercise vigilance regarding copycat or coat-tailing sites that seek to exploit
|
||||
|
||||
</details>
|
||||
|
||||
## 2026-05-23
|
||||
|
||||
### 🚀 Updated Scripts
|
||||
|
||||
- #### 🐞 Bug Fixes
|
||||
|
||||
- IronClaw: Extra configuration during install to ensure Web Gateway can run [@SystemIdleProcess](https://github.com/SystemIdleProcess) ([#14635](https://github.com/community-scripts/ProxmoxVE/pull/14635))
|
||||
- Tunarr: fix path to backup during update [@SystemIdleProcess](https://github.com/SystemIdleProcess) ([#14655](https://github.com/community-scripts/ProxmoxVE/pull/14655))
|
||||
|
||||
- #### ✨ New Features
|
||||
|
||||
- wealthfolio: add: prebuild [@CrazyWolf13](https://github.com/CrazyWolf13) ([#14658](https://github.com/community-scripts/ProxmoxVE/pull/14658))
|
||||
|
||||
### 🧰 Tools
|
||||
|
||||
- #### ✨ New Features
|
||||
|
||||
- kernel-clean: support range syntax in selection prompt [@djhojd](https://github.com/djhojd) ([#14656](https://github.com/community-scripts/ProxmoxVE/pull/14656))
|
||||
|
||||
## 2026-05-22
|
||||
|
||||
### 🆕 New Scripts
|
||||
|
||||
@@ -60,11 +60,12 @@ description
|
||||
|
||||
msg_ok "Completed Successfully!\n"
|
||||
echo -e "${CREATING}${GN}${APP} setup has been successfully initialized!${CL}"
|
||||
echo -e "${INFO}${YW} Complete setup by running:${CL}"
|
||||
echo -e "${TAB}${BGN}ironclaw onboard${CL}"
|
||||
echo -e "${INFO}${YW} Then start the service:${CL}"
|
||||
echo -e "${TAB}${BGN}rc-service ironclaw start${CL}"
|
||||
echo -e "${INFO}${YW} Access the Web UI at:${CL}"
|
||||
echo -e "${INFO}${YW} Next Steps:${CL}"
|
||||
echo -e "${TAB}1. Complete setup by running:${CL}"
|
||||
echo -e "${TAB}${TAB}${BGN}/usr/local/bin/ironclaw onboard${CL}"
|
||||
echo -e "${TAB}2. Start the service:${CL}"
|
||||
echo -e "${TAB}${TAB}${BGN}rc-service ironclaw start${CL}"
|
||||
echo -e "${TAB}3. Access the Web UI at:${CL}"
|
||||
echo -e "${TAB}${GATEWAY}${BGN}http://${IP}:3000${CL}"
|
||||
echo -e "${INFO}${YW} Auth token and database credentials:${CL}"
|
||||
echo -e "${TAB}${BGN}cat /root/.ironclaw/.env${CL}"
|
||||
echo -e "${INFO}${YW} Use Gateway Authentication Token to login:${CL}"
|
||||
echo -e "${TAB}${TAB}${BGN}cat /root/.ironclaw/gateway.creds${CL}"
|
||||
|
||||
@@ -40,7 +40,7 @@ function update_script() {
|
||||
msg_ok "Backed up Configuration"
|
||||
|
||||
fetch_and_deploy_gh_release "ironclaw-bin" "nearai/ironclaw" "prebuild" "latest" "/usr/local/bin" \
|
||||
"ironclaw-$(uname -m)-unknown-linux-$([[ -f /etc/alpine-release ]] && echo "musl" || echo "gnu").tar.gz"
|
||||
"ironclaw-$(uname -m)-unknown-linux-gnu.tar.gz"
|
||||
chmod +x /usr/local/bin/ironclaw
|
||||
|
||||
msg_info "Restoring Configuration"
|
||||
@@ -62,11 +62,12 @@ description
|
||||
|
||||
msg_ok "Completed Successfully!\n"
|
||||
echo -e "${CREATING}${GN}${APP} setup has been successfully initialized!${CL}"
|
||||
echo -e "${INFO}${YW} Complete setup by running:${CL}"
|
||||
echo -e "${TAB}${BGN}ironclaw onboard${CL}"
|
||||
echo -e "${INFO}${YW} Then start the service:${CL}"
|
||||
echo -e "${TAB}${BGN}systemctl start ironclaw${CL}"
|
||||
echo -e "${INFO}${YW} Access the Web UI at:${CL}"
|
||||
echo -e "${INFO}${YW} Next Steps:${CL}"
|
||||
echo -e "${TAB}1. Configure remaining settings:${CL}"
|
||||
echo -e "${TAB}${TAB}${BGN}/usr/local/bin/ironclaw onboard${CL}"
|
||||
echo -e "${TAB}2. Start the service:${CL}"
|
||||
echo -e "${TAB}${TAB}${BGN}systemctl start ironclaw${CL}"
|
||||
echo -e "${TAB}3. Access the Web UI at:${CL}"
|
||||
echo -e "${TAB}${GATEWAY}${BGN}http://${IP}:3000${CL}"
|
||||
echo -e "${INFO}${YW} Auth token and database credentials:${CL}"
|
||||
echo -e "${TAB}${BGN}cat /root/.ironclaw/.env${CL}"
|
||||
echo -e "${INFO}${YW} Use Gateway Authentication Token to login:${CL}"
|
||||
echo -e "${TAB}${TAB}${BGN}cat /root/.ironclaw/gateway.creds${CL}"
|
||||
|
||||
@@ -34,11 +34,11 @@ function update_script() {
|
||||
msg_ok "Stopped Service"
|
||||
|
||||
msg_info "Creating Backup"
|
||||
if [ -d "/usr/local/share/tunarr" ]; then
|
||||
tar -czf "/opt/${APP}_backup_$(date +%F).tar.gz" /usr/local/share/tunarr $STD
|
||||
if [ -d "/root/.local/share/tunarr" ]; then
|
||||
tar -czf "/opt/${APP}_backup_$(date +%F).tar.gz" /root/.local/share/tunarr $STD
|
||||
msg_ok "Backup Created"
|
||||
else
|
||||
msg_error "Backup failed: /usr/local/share/tunarr does not exist"
|
||||
msg_error "Backup failed: /root/.local/share/tunarr does not exist"
|
||||
fi
|
||||
|
||||
CLEAN_INSTALL=1 fetch_and_deploy_gh_release "tunarr" "chrisbenincasa/tunarr" "prebuild" "latest" "/opt/tunarr" "*linux-x64.tar.gz"
|
||||
|
||||
@@ -3,13 +3,13 @@ source <(curl -fsSL https://raw.githubusercontent.com/community-scripts/ProxmoxV
|
||||
# Copyright (c) 2021-2026 community-scripts ORG
|
||||
# Author: CrazyWolf13
|
||||
# License: MIT | https://github.com/community-scripts/ProxmoxVE/raw/main/LICENSE
|
||||
# Source: https://wealthfolio.app/ | Github: https://github.com/afadil/wealthfolio
|
||||
# Source: https://wealthfolio.app/ | Github: https://github.com/wealthfolio/wealthfolio
|
||||
|
||||
APP="Wealthfolio"
|
||||
var_tags="${var_tags:-finance;portfolio}"
|
||||
var_cpu="${var_cpu:-4}"
|
||||
var_ram="${var_ram:-4096}"
|
||||
var_disk="${var_disk:-10}"
|
||||
var_cpu="${var_cpu:-1}"
|
||||
var_ram="${var_ram:-512}"
|
||||
var_disk="${var_disk:-4}"
|
||||
var_os="${var_os:-debian}"
|
||||
var_version="${var_version:-13}"
|
||||
var_arm64="${var_arm64:-no}"
|
||||
@@ -30,13 +30,11 @@ function update_script() {
|
||||
exit
|
||||
fi
|
||||
|
||||
NODE_VERSION="24" NODE_MODULE="pnpm" setup_nodejs
|
||||
|
||||
if grep -q '^WF_CORS_ALLOW_ORIGINS=\*$' /opt/wealthfolio/.env; then
|
||||
sed -i "s|^WF_CORS_ALLOW_ORIGINS=\*$|WF_CORS_ALLOW_ORIGINS=http://${LOCAL_IP}:8080|" /opt/wealthfolio/.env
|
||||
fi
|
||||
|
||||
if check_for_gh_release "wealthfolio" "afadil/wealthfolio"; then
|
||||
if check_for_gh_release "wealthfolio" "wealthfolio/wealthfolio"; then
|
||||
msg_info "Stopping Service"
|
||||
systemctl stop wealthfolio
|
||||
msg_ok "Stopped Service"
|
||||
@@ -46,21 +44,8 @@ function update_script() {
|
||||
cp /opt/wealthfolio/.env /opt/wealthfolio_env_backup
|
||||
msg_ok "Backed up Data"
|
||||
|
||||
CLEAN_INSTALL=1 fetch_and_deploy_gh_release "wealthfolio" "afadil/wealthfolio" "tarball"
|
||||
|
||||
msg_info "Building Frontend (patience)"
|
||||
cd /opt/wealthfolio
|
||||
export BUILD_TARGET=web
|
||||
$STD pnpm install --frozen-lockfile
|
||||
$STD pnpm --filter frontend... build
|
||||
msg_ok "Built Frontend"
|
||||
|
||||
msg_info "Building Backend (patience)"
|
||||
source ~/.cargo/env
|
||||
$STD cargo build --release --manifest-path apps/server/Cargo.toml
|
||||
cp /opt/wealthfolio/target/release/wealthfolio-server /usr/local/bin/wealthfolio-server
|
||||
chmod +x /usr/local/bin/wealthfolio-server
|
||||
msg_ok "Built Backend"
|
||||
CLEAN_INSTALL=1 fetch_and_deploy_gh_release "wealthfolio" "wealthfolio/wealthfolio" "prebuild" "latest" "/opt/wealthfolio" "wealthfolio-server-*-linux-amd64.tar.gz"
|
||||
install -m 755 /opt/wealthfolio/wealthfolio-server /usr/local/bin/wealthfolio-server
|
||||
|
||||
msg_info "Restoring Data"
|
||||
cp -r /opt/wealthfolio_data_backup/. /opt/wealthfolio_data
|
||||
@@ -68,12 +53,6 @@ function update_script() {
|
||||
rm -rf /opt/wealthfolio_data_backup /opt/wealthfolio_env_backup
|
||||
msg_ok "Restored Data"
|
||||
|
||||
msg_info "Cleaning Up"
|
||||
rm -rf /opt/wealthfolio/target
|
||||
rm -rf /root/.cargo/registry
|
||||
rm -rf /opt/wealthfolio/node_modules
|
||||
msg_ok "Cleaned Up"
|
||||
|
||||
msg_info "Starting Service"
|
||||
systemctl start wealthfolio
|
||||
msg_ok "Started Service"
|
||||
|
||||
@@ -35,20 +35,41 @@ fetch_and_deploy_gh_release "ironclaw-bin" "nearai/ironclaw" "prebuild" "latest"
|
||||
"ironclaw-$(uname -m)-unknown-linux-musl.tar.gz"
|
||||
chmod +x /usr/local/bin/ironclaw
|
||||
|
||||
msg_info "Configuring IronClaw"
|
||||
mkdir -p /root/.ironclaw
|
||||
msg_info "Configuring Environment"
|
||||
GATEWAY_TOKEN=$(openssl rand -hex 32)
|
||||
mkdir -p /root/.ironclaw
|
||||
{
|
||||
echo "Gateway-Token"
|
||||
echo "Token: $GATEWAY_TOKEN"
|
||||
} >> /root/.ironclaw/gateway.creds
|
||||
|
||||
mkdir -p /root/.ironclaw
|
||||
cat <<EOF >/root/.ironclaw/.env
|
||||
DATABASE_BACKEND=postgres
|
||||
DATABASE_URL=postgresql://ironclaw:${PG_PASS}@localhost:5432/ironclaw?sslmode=disable
|
||||
GATEWAY_ENABLED=true
|
||||
GATEWAY_HOST=0.0.0.0
|
||||
GATEWAY_PORT=3000
|
||||
GATEWAY_AUTH_TOKEN=${GATEWAY_TOKEN}
|
||||
CLI_ENABLED=false
|
||||
AGENT_NAME=ironclaw
|
||||
RUST_LOG=ironclaw=info,tower_http=info
|
||||
EOF
|
||||
chmod 600 /root/.ironclaw/.env
|
||||
msg_ok "Configured Environment"
|
||||
|
||||
msg_info "Configuring IronClaw"
|
||||
# Set values in the database since it is typically the true source of truth and ensures values are set correctly on first run before the service starts.
|
||||
/usr/local/bin/ironclaw --no-onboard config set database_backend postgres >/dev/null
|
||||
/usr/local/bin/ironclaw --no-onboard config set database_url "postgresql://ironclaw:${PG_PASS}@localhost:5432/ironclaw?sslmode=disable" >/dev/null
|
||||
/usr/local/bin/ironclaw --no-onboard config set channels.gateway_enabled true >/dev/null
|
||||
/usr/local/bin/ironclaw --no-onboard config set channels.gateway_host 0.0.0.0 >/dev/null
|
||||
/usr/local/bin/ironclaw --no-onboard config set channels.gateway_port 3000 >/dev/null
|
||||
/usr/local/bin/ironclaw --no-onboard config set channels.gateway_auth_token "${GATEWAY_TOKEN}" >/dev/null
|
||||
/usr/local/bin/ironclaw --no-onboard config set channels.cli_enabled false >/dev/null
|
||||
/usr/local/bin/ironclaw --no-onboard config set secrets_master_key_source none >/dev/null
|
||||
# Running ironclaw defaults to use env for secrets and creates this entry, but we want to set that during onboard.
|
||||
sleep 5
|
||||
sed -i '/SECRETS_MASTER_KEY/d' /root/.ironclaw/.env
|
||||
msg_ok "Configured IronClaw"
|
||||
|
||||
msg_info "Creating Service"
|
||||
|
||||
@@ -24,23 +24,44 @@ PG_VERSION="17" PG_MODULES="pgvector" setup_postgresql
|
||||
PG_DB_NAME="ironclaw" PG_DB_USER="ironclaw" PG_DB_EXTENSIONS="vector" setup_postgresql_db
|
||||
|
||||
fetch_and_deploy_gh_release "ironclaw-bin" "nearai/ironclaw" "prebuild" "latest" "/usr/local/bin" \
|
||||
"ironclaw-$(uname -m)-unknown-linux-$([[ -f /etc/alpine-release ]] && echo "musl" || echo "gnu").tar.gz"
|
||||
"ironclaw-$(uname -m)-unknown-linux-gnu.tar.gz"
|
||||
chmod +x /usr/local/bin/ironclaw
|
||||
|
||||
msg_info "Configuring IronClaw"
|
||||
mkdir -p /root/.ironclaw
|
||||
msg_info "Configuring Environment"
|
||||
GATEWAY_TOKEN=$(openssl rand -hex 32)
|
||||
mkdir -p /root/.ironclaw
|
||||
{
|
||||
echo "Gateway-Token"
|
||||
echo "Token: $GATEWAY_TOKEN"
|
||||
} >> /root/.ironclaw/gateway.creds
|
||||
|
||||
mkdir -p /root/.ironclaw
|
||||
cat <<EOF >/root/.ironclaw/.env
|
||||
DATABASE_BACKEND=postgres
|
||||
DATABASE_URL=postgresql://${PG_DB_USER}:${PG_DB_PASS}@localhost:5432/${PG_DB_NAME}?sslmode=disable
|
||||
GATEWAY_ENABLED=true
|
||||
GATEWAY_HOST=0.0.0.0
|
||||
GATEWAY_PORT=3000
|
||||
GATEWAY_AUTH_TOKEN=${GATEWAY_TOKEN}
|
||||
CLI_ENABLED=false
|
||||
AGENT_NAME=ironclaw
|
||||
RUST_LOG=ironclaw=info,tower_http=info
|
||||
EOF
|
||||
chmod 600 /root/.ironclaw/.env
|
||||
msg_ok "Configured Environment"
|
||||
|
||||
msg_info "Configuring IronClaw"
|
||||
# Set values in the database since it is typically the true source of truth and ensures values are set correctly on first run before the service starts.
|
||||
/usr/local/bin/ironclaw --no-onboard config set database_backend postgres >/dev/null
|
||||
/usr/local/bin/ironclaw --no-onboard config set database_url "postgresql://${PG_DB_USER}:${PG_DB_PASS}@localhost:5432/${PG_DB_NAME}?sslmode=disable" >/dev/null
|
||||
/usr/local/bin/ironclaw --no-onboard config set channels.gateway_enabled true >/dev/null
|
||||
/usr/local/bin/ironclaw --no-onboard config set channels.gateway_host 0.0.0.0 >/dev/null
|
||||
/usr/local/bin/ironclaw --no-onboard config set channels.gateway_port 3000 >/dev/null
|
||||
/usr/local/bin/ironclaw --no-onboard config set channels.gateway_auth_token "${GATEWAY_TOKEN}" >/dev/null
|
||||
/usr/local/bin/ironclaw --no-onboard config set channels.cli_enabled false >/dev/null
|
||||
/usr/local/bin/ironclaw --no-onboard config set secrets_master_key_source none >/dev/null
|
||||
# Running ironclaw defaults to use env for secrets and creates this entry, but we want to set that during onboard.
|
||||
sleep 5
|
||||
sed -i '/SECRETS_MASTER_KEY/d' /root/.ironclaw/.env
|
||||
msg_ok "Configured IronClaw"
|
||||
|
||||
msg_info "Creating Service"
|
||||
@@ -51,10 +72,7 @@ After=network.target postgresql.service
|
||||
|
||||
[Service]
|
||||
Type=simple
|
||||
User=root
|
||||
WorkingDirectory=/root
|
||||
EnvironmentFile=/root/.ironclaw/.env
|
||||
ExecStart=/usr/bin/dbus-run-session /usr/local/bin/ironclaw
|
||||
ExecStart=/usr/bin/dbus-run-session /usr/local/bin/ironclaw run
|
||||
Restart=on-failure
|
||||
RestartSec=5
|
||||
|
||||
|
||||
@@ -3,7 +3,7 @@
|
||||
# Copyright (c) 2021-2026 community-scripts ORG
|
||||
# Author: CrazyWolf13
|
||||
# License: MIT | https://github.com/community-scripts/ProxmoxVE/raw/main/LICENSE
|
||||
# Source: https://wealthfolio.app/ | Github: https://github.com/afadil/wealthfolio
|
||||
# Source: https://wealthfolio.app/ | Github: https://github.com/wealthfolio/wealthfolio
|
||||
|
||||
source /dev/stdin <<<"$FUNCTIONS_FILE_PATH"
|
||||
color
|
||||
@@ -14,31 +14,14 @@ network_check
|
||||
update_os
|
||||
|
||||
msg_info "Installing Dependencies"
|
||||
$STD apt install -y \
|
||||
pkg-config \
|
||||
libssl-dev \
|
||||
build-essential \
|
||||
libsqlite3-dev \
|
||||
argon2
|
||||
$STD apt install -y argon2
|
||||
msg_ok "Installed Dependencies"
|
||||
|
||||
setup_rust
|
||||
NODE_VERSION="24" NODE_MODULE="pnpm" setup_nodejs
|
||||
fetch_and_deploy_gh_release "wealthfolio" "afadil/wealthfolio" "tarball"
|
||||
fetch_and_deploy_gh_release "wealthfolio" "wealthfolio/wealthfolio" "prebuild" "latest" "/opt/wealthfolio" "wealthfolio-server-*-linux-amd64.tar.gz"
|
||||
|
||||
msg_info "Building Frontend (patience)"
|
||||
cd /opt/wealthfolio
|
||||
export BUILD_TARGET=web
|
||||
$STD pnpm install --frozen-lockfile
|
||||
$STD pnpm --filter frontend... build
|
||||
msg_ok "Built Frontend"
|
||||
|
||||
msg_info "Building Backend (patience)"
|
||||
source ~/.cargo/env
|
||||
$STD cargo build --release --manifest-path apps/server/Cargo.toml
|
||||
cp /opt/wealthfolio/target/release/wealthfolio-server /usr/local/bin/wealthfolio-server
|
||||
chmod +x /usr/local/bin/wealthfolio-server
|
||||
msg_ok "Built Backend"
|
||||
msg_info "Installing Wealthfolio"
|
||||
install -m 755 /opt/wealthfolio/wealthfolio-server /usr/local/bin/wealthfolio-server
|
||||
msg_ok "Installed Wealthfolio"
|
||||
|
||||
msg_info "Configuring Wealthfolio"
|
||||
mkdir -p /opt/wealthfolio_data
|
||||
@@ -57,12 +40,6 @@ EOF
|
||||
echo "WF_PASSWORD=${WF_PASSWORD}" >~/wealthfolio.creds
|
||||
msg_ok "Configured Wealthfolio"
|
||||
|
||||
msg_info "Cleaning Up"
|
||||
rm -rf /opt/wealthfolio/target
|
||||
rm -rf /root/.cargo/registry
|
||||
rm -rf /opt/wealthfolio/node_modules
|
||||
msg_ok "Cleaned Up"
|
||||
|
||||
msg_info "Creating Service"
|
||||
cat <<EOF >/etc/systemd/system/wealthfolio.service
|
||||
[Unit]
|
||||
|
||||
@@ -41,13 +41,23 @@ echo -e "${GN}Currently running kernel: ${current_kernel}${CL}"
|
||||
echo -e "${YW}Available kernels for removal:${CL}"
|
||||
echo "$available_kernels" | nl -w 2 -s '. '
|
||||
|
||||
echo -e "\n${YW}Select kernels to remove (comma-separated, e.g., 1,2):${CL}"
|
||||
echo -e "\n${YW}Select kernels to remove (e.g. 1,3 or 1-5 or 1-3,7):${CL}"
|
||||
read -r selected
|
||||
|
||||
# Parse selection
|
||||
IFS=',' read -r -a selected_indices <<<"$selected"
|
||||
kernels_to_remove=()
|
||||
# Parse selection: supports single indices, ranges (e.g., 1-5), and combinations (e.g., 1,3-5,7)
|
||||
selected_indices=()
|
||||
IFS=',' read -r -a tokens <<<"$selected"
|
||||
for token in "${tokens[@]}"; do
|
||||
if [[ "$token" =~ ^([0-9]+)-([0-9]+)$ ]]; then
|
||||
for ((i = BASH_REMATCH[1]; i <= BASH_REMATCH[2]; i++)); do
|
||||
selected_indices+=("$i")
|
||||
done
|
||||
else
|
||||
selected_indices+=("$token")
|
||||
fi
|
||||
done
|
||||
|
||||
kernels_to_remove=()
|
||||
for index in "${selected_indices[@]}"; do
|
||||
kernel=$(echo "$available_kernels" | sed -n "${index}p")
|
||||
if [ -n "$kernel" ]; then
|
||||
|
||||
Reference in New Issue
Block a user