mirror of
https://github.com/community-scripts/ProxmoxVE.git
synced 2026-05-24 17:34:57 +02:00
Compare commits
9 Commits
2026-05-22
...
patch_kern
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
435835b210 | ||
|
|
77a4322623 | ||
|
|
6c7e7ae1af | ||
|
|
a73aefa8fd | ||
|
|
599e841e1a | ||
|
|
cf5db6b687 | ||
|
|
26b1adfbcc | ||
|
|
b97f8b9236 | ||
|
|
de2806ca54 |
19
CHANGELOG.md
19
CHANGELOG.md
@@ -464,6 +464,25 @@ Exercise vigilance regarding copycat or coat-tailing sites that seek to exploit
|
|||||||
|
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
|
## 2026-05-23
|
||||||
|
|
||||||
|
### 🚀 Updated Scripts
|
||||||
|
|
||||||
|
- #### 🐞 Bug Fixes
|
||||||
|
|
||||||
|
- IronClaw: Extra configuration during install to ensure Web Gateway can run [@SystemIdleProcess](https://github.com/SystemIdleProcess) ([#14635](https://github.com/community-scripts/ProxmoxVE/pull/14635))
|
||||||
|
- Tunarr: fix path to backup during update [@SystemIdleProcess](https://github.com/SystemIdleProcess) ([#14655](https://github.com/community-scripts/ProxmoxVE/pull/14655))
|
||||||
|
|
||||||
|
- #### ✨ New Features
|
||||||
|
|
||||||
|
- wealthfolio: add: prebuild [@CrazyWolf13](https://github.com/CrazyWolf13) ([#14658](https://github.com/community-scripts/ProxmoxVE/pull/14658))
|
||||||
|
|
||||||
|
### 🧰 Tools
|
||||||
|
|
||||||
|
- #### ✨ New Features
|
||||||
|
|
||||||
|
- kernel-clean: support range syntax in selection prompt [@djhojd](https://github.com/djhojd) ([#14656](https://github.com/community-scripts/ProxmoxVE/pull/14656))
|
||||||
|
|
||||||
## 2026-05-22
|
## 2026-05-22
|
||||||
|
|
||||||
### 🆕 New Scripts
|
### 🆕 New Scripts
|
||||||
|
|||||||
@@ -60,11 +60,12 @@ description
|
|||||||
|
|
||||||
msg_ok "Completed Successfully!\n"
|
msg_ok "Completed Successfully!\n"
|
||||||
echo -e "${CREATING}${GN}${APP} setup has been successfully initialized!${CL}"
|
echo -e "${CREATING}${GN}${APP} setup has been successfully initialized!${CL}"
|
||||||
echo -e "${INFO}${YW} Complete setup by running:${CL}"
|
echo -e "${INFO}${YW} Next Steps:${CL}"
|
||||||
echo -e "${TAB}${BGN}ironclaw onboard${CL}"
|
echo -e "${TAB}1. Complete setup by running:${CL}"
|
||||||
echo -e "${INFO}${YW} Then start the service:${CL}"
|
echo -e "${TAB}${TAB}${BGN}/usr/local/bin/ironclaw onboard${CL}"
|
||||||
echo -e "${TAB}${BGN}rc-service ironclaw start${CL}"
|
echo -e "${TAB}2. Start the service:${CL}"
|
||||||
echo -e "${INFO}${YW} Access the Web UI at:${CL}"
|
echo -e "${TAB}${TAB}${BGN}rc-service ironclaw start${CL}"
|
||||||
|
echo -e "${TAB}3. Access the Web UI at:${CL}"
|
||||||
echo -e "${TAB}${GATEWAY}${BGN}http://${IP}:3000${CL}"
|
echo -e "${TAB}${GATEWAY}${BGN}http://${IP}:3000${CL}"
|
||||||
echo -e "${INFO}${YW} Auth token and database credentials:${CL}"
|
echo -e "${INFO}${YW} Use Gateway Authentication Token to login:${CL}"
|
||||||
echo -e "${TAB}${BGN}cat /root/.ironclaw/.env${CL}"
|
echo -e "${TAB}${TAB}${BGN}cat /root/.ironclaw/gateway.creds${CL}"
|
||||||
|
|||||||
@@ -40,7 +40,7 @@ function update_script() {
|
|||||||
msg_ok "Backed up Configuration"
|
msg_ok "Backed up Configuration"
|
||||||
|
|
||||||
fetch_and_deploy_gh_release "ironclaw-bin" "nearai/ironclaw" "prebuild" "latest" "/usr/local/bin" \
|
fetch_and_deploy_gh_release "ironclaw-bin" "nearai/ironclaw" "prebuild" "latest" "/usr/local/bin" \
|
||||||
"ironclaw-$(uname -m)-unknown-linux-$([[ -f /etc/alpine-release ]] && echo "musl" || echo "gnu").tar.gz"
|
"ironclaw-$(uname -m)-unknown-linux-gnu.tar.gz"
|
||||||
chmod +x /usr/local/bin/ironclaw
|
chmod +x /usr/local/bin/ironclaw
|
||||||
|
|
||||||
msg_info "Restoring Configuration"
|
msg_info "Restoring Configuration"
|
||||||
@@ -62,11 +62,12 @@ description
|
|||||||
|
|
||||||
msg_ok "Completed Successfully!\n"
|
msg_ok "Completed Successfully!\n"
|
||||||
echo -e "${CREATING}${GN}${APP} setup has been successfully initialized!${CL}"
|
echo -e "${CREATING}${GN}${APP} setup has been successfully initialized!${CL}"
|
||||||
echo -e "${INFO}${YW} Complete setup by running:${CL}"
|
echo -e "${INFO}${YW} Next Steps:${CL}"
|
||||||
echo -e "${TAB}${BGN}ironclaw onboard${CL}"
|
echo -e "${TAB}1. Configure remaining settings:${CL}"
|
||||||
echo -e "${INFO}${YW} Then start the service:${CL}"
|
echo -e "${TAB}${TAB}${BGN}/usr/local/bin/ironclaw onboard${CL}"
|
||||||
echo -e "${TAB}${BGN}systemctl start ironclaw${CL}"
|
echo -e "${TAB}2. Start the service:${CL}"
|
||||||
echo -e "${INFO}${YW} Access the Web UI at:${CL}"
|
echo -e "${TAB}${TAB}${BGN}systemctl start ironclaw${CL}"
|
||||||
|
echo -e "${TAB}3. Access the Web UI at:${CL}"
|
||||||
echo -e "${TAB}${GATEWAY}${BGN}http://${IP}:3000${CL}"
|
echo -e "${TAB}${GATEWAY}${BGN}http://${IP}:3000${CL}"
|
||||||
echo -e "${INFO}${YW} Auth token and database credentials:${CL}"
|
echo -e "${INFO}${YW} Use Gateway Authentication Token to login:${CL}"
|
||||||
echo -e "${TAB}${BGN}cat /root/.ironclaw/.env${CL}"
|
echo -e "${TAB}${TAB}${BGN}cat /root/.ironclaw/gateway.creds${CL}"
|
||||||
|
|||||||
@@ -34,11 +34,11 @@ function update_script() {
|
|||||||
msg_ok "Stopped Service"
|
msg_ok "Stopped Service"
|
||||||
|
|
||||||
msg_info "Creating Backup"
|
msg_info "Creating Backup"
|
||||||
if [ -d "/usr/local/share/tunarr" ]; then
|
if [ -d "/root/.local/share/tunarr" ]; then
|
||||||
tar -czf "/opt/${APP}_backup_$(date +%F).tar.gz" /usr/local/share/tunarr $STD
|
tar -czf "/opt/${APP}_backup_$(date +%F).tar.gz" /root/.local/share/tunarr $STD
|
||||||
msg_ok "Backup Created"
|
msg_ok "Backup Created"
|
||||||
else
|
else
|
||||||
msg_error "Backup failed: /usr/local/share/tunarr does not exist"
|
msg_error "Backup failed: /root/.local/share/tunarr does not exist"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
CLEAN_INSTALL=1 fetch_and_deploy_gh_release "tunarr" "chrisbenincasa/tunarr" "prebuild" "latest" "/opt/tunarr" "*linux-x64.tar.gz"
|
CLEAN_INSTALL=1 fetch_and_deploy_gh_release "tunarr" "chrisbenincasa/tunarr" "prebuild" "latest" "/opt/tunarr" "*linux-x64.tar.gz"
|
||||||
|
|||||||
@@ -3,13 +3,13 @@ source <(curl -fsSL https://raw.githubusercontent.com/community-scripts/ProxmoxV
|
|||||||
# Copyright (c) 2021-2026 community-scripts ORG
|
# Copyright (c) 2021-2026 community-scripts ORG
|
||||||
# Author: CrazyWolf13
|
# Author: CrazyWolf13
|
||||||
# License: MIT | https://github.com/community-scripts/ProxmoxVE/raw/main/LICENSE
|
# License: MIT | https://github.com/community-scripts/ProxmoxVE/raw/main/LICENSE
|
||||||
# Source: https://wealthfolio.app/ | Github: https://github.com/afadil/wealthfolio
|
# Source: https://wealthfolio.app/ | Github: https://github.com/wealthfolio/wealthfolio
|
||||||
|
|
||||||
APP="Wealthfolio"
|
APP="Wealthfolio"
|
||||||
var_tags="${var_tags:-finance;portfolio}"
|
var_tags="${var_tags:-finance;portfolio}"
|
||||||
var_cpu="${var_cpu:-4}"
|
var_cpu="${var_cpu:-1}"
|
||||||
var_ram="${var_ram:-4096}"
|
var_ram="${var_ram:-512}"
|
||||||
var_disk="${var_disk:-10}"
|
var_disk="${var_disk:-4}"
|
||||||
var_os="${var_os:-debian}"
|
var_os="${var_os:-debian}"
|
||||||
var_version="${var_version:-13}"
|
var_version="${var_version:-13}"
|
||||||
var_arm64="${var_arm64:-no}"
|
var_arm64="${var_arm64:-no}"
|
||||||
@@ -30,13 +30,11 @@ function update_script() {
|
|||||||
exit
|
exit
|
||||||
fi
|
fi
|
||||||
|
|
||||||
NODE_VERSION="24" NODE_MODULE="pnpm" setup_nodejs
|
|
||||||
|
|
||||||
if grep -q '^WF_CORS_ALLOW_ORIGINS=\*$' /opt/wealthfolio/.env; then
|
if grep -q '^WF_CORS_ALLOW_ORIGINS=\*$' /opt/wealthfolio/.env; then
|
||||||
sed -i "s|^WF_CORS_ALLOW_ORIGINS=\*$|WF_CORS_ALLOW_ORIGINS=http://${LOCAL_IP}:8080|" /opt/wealthfolio/.env
|
sed -i "s|^WF_CORS_ALLOW_ORIGINS=\*$|WF_CORS_ALLOW_ORIGINS=http://${LOCAL_IP}:8080|" /opt/wealthfolio/.env
|
||||||
fi
|
fi
|
||||||
|
|
||||||
if check_for_gh_release "wealthfolio" "afadil/wealthfolio"; then
|
if check_for_gh_release "wealthfolio" "wealthfolio/wealthfolio"; then
|
||||||
msg_info "Stopping Service"
|
msg_info "Stopping Service"
|
||||||
systemctl stop wealthfolio
|
systemctl stop wealthfolio
|
||||||
msg_ok "Stopped Service"
|
msg_ok "Stopped Service"
|
||||||
@@ -46,21 +44,8 @@ function update_script() {
|
|||||||
cp /opt/wealthfolio/.env /opt/wealthfolio_env_backup
|
cp /opt/wealthfolio/.env /opt/wealthfolio_env_backup
|
||||||
msg_ok "Backed up Data"
|
msg_ok "Backed up Data"
|
||||||
|
|
||||||
CLEAN_INSTALL=1 fetch_and_deploy_gh_release "wealthfolio" "afadil/wealthfolio" "tarball"
|
CLEAN_INSTALL=1 fetch_and_deploy_gh_release "wealthfolio" "wealthfolio/wealthfolio" "prebuild" "latest" "/opt/wealthfolio" "wealthfolio-server-*-linux-amd64.tar.gz"
|
||||||
|
install -m 755 /opt/wealthfolio/wealthfolio-server /usr/local/bin/wealthfolio-server
|
||||||
msg_info "Building Frontend (patience)"
|
|
||||||
cd /opt/wealthfolio
|
|
||||||
export BUILD_TARGET=web
|
|
||||||
$STD pnpm install --frozen-lockfile
|
|
||||||
$STD pnpm --filter frontend... build
|
|
||||||
msg_ok "Built Frontend"
|
|
||||||
|
|
||||||
msg_info "Building Backend (patience)"
|
|
||||||
source ~/.cargo/env
|
|
||||||
$STD cargo build --release --manifest-path apps/server/Cargo.toml
|
|
||||||
cp /opt/wealthfolio/target/release/wealthfolio-server /usr/local/bin/wealthfolio-server
|
|
||||||
chmod +x /usr/local/bin/wealthfolio-server
|
|
||||||
msg_ok "Built Backend"
|
|
||||||
|
|
||||||
msg_info "Restoring Data"
|
msg_info "Restoring Data"
|
||||||
cp -r /opt/wealthfolio_data_backup/. /opt/wealthfolio_data
|
cp -r /opt/wealthfolio_data_backup/. /opt/wealthfolio_data
|
||||||
@@ -68,12 +53,6 @@ function update_script() {
|
|||||||
rm -rf /opt/wealthfolio_data_backup /opt/wealthfolio_env_backup
|
rm -rf /opt/wealthfolio_data_backup /opt/wealthfolio_env_backup
|
||||||
msg_ok "Restored Data"
|
msg_ok "Restored Data"
|
||||||
|
|
||||||
msg_info "Cleaning Up"
|
|
||||||
rm -rf /opt/wealthfolio/target
|
|
||||||
rm -rf /root/.cargo/registry
|
|
||||||
rm -rf /opt/wealthfolio/node_modules
|
|
||||||
msg_ok "Cleaned Up"
|
|
||||||
|
|
||||||
msg_info "Starting Service"
|
msg_info "Starting Service"
|
||||||
systemctl start wealthfolio
|
systemctl start wealthfolio
|
||||||
msg_ok "Started Service"
|
msg_ok "Started Service"
|
||||||
|
|||||||
@@ -35,20 +35,41 @@ fetch_and_deploy_gh_release "ironclaw-bin" "nearai/ironclaw" "prebuild" "latest"
|
|||||||
"ironclaw-$(uname -m)-unknown-linux-musl.tar.gz"
|
"ironclaw-$(uname -m)-unknown-linux-musl.tar.gz"
|
||||||
chmod +x /usr/local/bin/ironclaw
|
chmod +x /usr/local/bin/ironclaw
|
||||||
|
|
||||||
msg_info "Configuring IronClaw"
|
msg_info "Configuring Environment"
|
||||||
mkdir -p /root/.ironclaw
|
|
||||||
GATEWAY_TOKEN=$(openssl rand -hex 32)
|
GATEWAY_TOKEN=$(openssl rand -hex 32)
|
||||||
|
mkdir -p /root/.ironclaw
|
||||||
|
{
|
||||||
|
echo "Gateway-Token"
|
||||||
|
echo "Token: $GATEWAY_TOKEN"
|
||||||
|
} >> /root/.ironclaw/gateway.creds
|
||||||
|
|
||||||
|
mkdir -p /root/.ironclaw
|
||||||
cat <<EOF >/root/.ironclaw/.env
|
cat <<EOF >/root/.ironclaw/.env
|
||||||
|
DATABASE_BACKEND=postgres
|
||||||
DATABASE_URL=postgresql://ironclaw:${PG_PASS}@localhost:5432/ironclaw?sslmode=disable
|
DATABASE_URL=postgresql://ironclaw:${PG_PASS}@localhost:5432/ironclaw?sslmode=disable
|
||||||
GATEWAY_ENABLED=true
|
GATEWAY_ENABLED=true
|
||||||
GATEWAY_HOST=0.0.0.0
|
GATEWAY_HOST=0.0.0.0
|
||||||
GATEWAY_PORT=3000
|
GATEWAY_PORT=3000
|
||||||
GATEWAY_AUTH_TOKEN=${GATEWAY_TOKEN}
|
GATEWAY_AUTH_TOKEN=${GATEWAY_TOKEN}
|
||||||
CLI_ENABLED=false
|
CLI_ENABLED=false
|
||||||
AGENT_NAME=ironclaw
|
|
||||||
RUST_LOG=ironclaw=info,tower_http=info
|
RUST_LOG=ironclaw=info,tower_http=info
|
||||||
EOF
|
EOF
|
||||||
chmod 600 /root/.ironclaw/.env
|
chmod 600 /root/.ironclaw/.env
|
||||||
|
msg_ok "Configured Environment"
|
||||||
|
|
||||||
|
msg_info "Configuring IronClaw"
|
||||||
|
# Set values in the database since it is typically the true source of truth and ensures values are set correctly on first run before the service starts.
|
||||||
|
/usr/local/bin/ironclaw --no-onboard config set database_backend postgres >/dev/null
|
||||||
|
/usr/local/bin/ironclaw --no-onboard config set database_url "postgresql://ironclaw:${PG_PASS}@localhost:5432/ironclaw?sslmode=disable" >/dev/null
|
||||||
|
/usr/local/bin/ironclaw --no-onboard config set channels.gateway_enabled true >/dev/null
|
||||||
|
/usr/local/bin/ironclaw --no-onboard config set channels.gateway_host 0.0.0.0 >/dev/null
|
||||||
|
/usr/local/bin/ironclaw --no-onboard config set channels.gateway_port 3000 >/dev/null
|
||||||
|
/usr/local/bin/ironclaw --no-onboard config set channels.gateway_auth_token "${GATEWAY_TOKEN}" >/dev/null
|
||||||
|
/usr/local/bin/ironclaw --no-onboard config set channels.cli_enabled false >/dev/null
|
||||||
|
/usr/local/bin/ironclaw --no-onboard config set secrets_master_key_source none >/dev/null
|
||||||
|
# Running ironclaw defaults to use env for secrets and creates this entry, but we want to set that during onboard.
|
||||||
|
sleep 5
|
||||||
|
sed -i '/SECRETS_MASTER_KEY/d' /root/.ironclaw/.env
|
||||||
msg_ok "Configured IronClaw"
|
msg_ok "Configured IronClaw"
|
||||||
|
|
||||||
msg_info "Creating Service"
|
msg_info "Creating Service"
|
||||||
|
|||||||
@@ -24,23 +24,44 @@ PG_VERSION="17" PG_MODULES="pgvector" setup_postgresql
|
|||||||
PG_DB_NAME="ironclaw" PG_DB_USER="ironclaw" PG_DB_EXTENSIONS="vector" setup_postgresql_db
|
PG_DB_NAME="ironclaw" PG_DB_USER="ironclaw" PG_DB_EXTENSIONS="vector" setup_postgresql_db
|
||||||
|
|
||||||
fetch_and_deploy_gh_release "ironclaw-bin" "nearai/ironclaw" "prebuild" "latest" "/usr/local/bin" \
|
fetch_and_deploy_gh_release "ironclaw-bin" "nearai/ironclaw" "prebuild" "latest" "/usr/local/bin" \
|
||||||
"ironclaw-$(uname -m)-unknown-linux-$([[ -f /etc/alpine-release ]] && echo "musl" || echo "gnu").tar.gz"
|
"ironclaw-$(uname -m)-unknown-linux-gnu.tar.gz"
|
||||||
chmod +x /usr/local/bin/ironclaw
|
chmod +x /usr/local/bin/ironclaw
|
||||||
|
|
||||||
msg_info "Configuring IronClaw"
|
msg_info "Configuring Environment"
|
||||||
mkdir -p /root/.ironclaw
|
|
||||||
GATEWAY_TOKEN=$(openssl rand -hex 32)
|
GATEWAY_TOKEN=$(openssl rand -hex 32)
|
||||||
|
mkdir -p /root/.ironclaw
|
||||||
|
{
|
||||||
|
echo "Gateway-Token"
|
||||||
|
echo "Token: $GATEWAY_TOKEN"
|
||||||
|
} >> /root/.ironclaw/gateway.creds
|
||||||
|
|
||||||
|
mkdir -p /root/.ironclaw
|
||||||
cat <<EOF >/root/.ironclaw/.env
|
cat <<EOF >/root/.ironclaw/.env
|
||||||
|
DATABASE_BACKEND=postgres
|
||||||
DATABASE_URL=postgresql://${PG_DB_USER}:${PG_DB_PASS}@localhost:5432/${PG_DB_NAME}?sslmode=disable
|
DATABASE_URL=postgresql://${PG_DB_USER}:${PG_DB_PASS}@localhost:5432/${PG_DB_NAME}?sslmode=disable
|
||||||
GATEWAY_ENABLED=true
|
GATEWAY_ENABLED=true
|
||||||
GATEWAY_HOST=0.0.0.0
|
GATEWAY_HOST=0.0.0.0
|
||||||
GATEWAY_PORT=3000
|
GATEWAY_PORT=3000
|
||||||
GATEWAY_AUTH_TOKEN=${GATEWAY_TOKEN}
|
GATEWAY_AUTH_TOKEN=${GATEWAY_TOKEN}
|
||||||
CLI_ENABLED=false
|
CLI_ENABLED=false
|
||||||
AGENT_NAME=ironclaw
|
|
||||||
RUST_LOG=ironclaw=info,tower_http=info
|
RUST_LOG=ironclaw=info,tower_http=info
|
||||||
EOF
|
EOF
|
||||||
chmod 600 /root/.ironclaw/.env
|
chmod 600 /root/.ironclaw/.env
|
||||||
|
msg_ok "Configured Environment"
|
||||||
|
|
||||||
|
msg_info "Configuring IronClaw"
|
||||||
|
# Set values in the database since it is typically the true source of truth and ensures values are set correctly on first run before the service starts.
|
||||||
|
/usr/local/bin/ironclaw --no-onboard config set database_backend postgres >/dev/null
|
||||||
|
/usr/local/bin/ironclaw --no-onboard config set database_url "postgresql://${PG_DB_USER}:${PG_DB_PASS}@localhost:5432/${PG_DB_NAME}?sslmode=disable" >/dev/null
|
||||||
|
/usr/local/bin/ironclaw --no-onboard config set channels.gateway_enabled true >/dev/null
|
||||||
|
/usr/local/bin/ironclaw --no-onboard config set channels.gateway_host 0.0.0.0 >/dev/null
|
||||||
|
/usr/local/bin/ironclaw --no-onboard config set channels.gateway_port 3000 >/dev/null
|
||||||
|
/usr/local/bin/ironclaw --no-onboard config set channels.gateway_auth_token "${GATEWAY_TOKEN}" >/dev/null
|
||||||
|
/usr/local/bin/ironclaw --no-onboard config set channels.cli_enabled false >/dev/null
|
||||||
|
/usr/local/bin/ironclaw --no-onboard config set secrets_master_key_source none >/dev/null
|
||||||
|
# Running ironclaw defaults to use env for secrets and creates this entry, but we want to set that during onboard.
|
||||||
|
sleep 5
|
||||||
|
sed -i '/SECRETS_MASTER_KEY/d' /root/.ironclaw/.env
|
||||||
msg_ok "Configured IronClaw"
|
msg_ok "Configured IronClaw"
|
||||||
|
|
||||||
msg_info "Creating Service"
|
msg_info "Creating Service"
|
||||||
@@ -51,10 +72,7 @@ After=network.target postgresql.service
|
|||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Type=simple
|
Type=simple
|
||||||
User=root
|
ExecStart=/usr/bin/dbus-run-session /usr/local/bin/ironclaw run
|
||||||
WorkingDirectory=/root
|
|
||||||
EnvironmentFile=/root/.ironclaw/.env
|
|
||||||
ExecStart=/usr/bin/dbus-run-session /usr/local/bin/ironclaw
|
|
||||||
Restart=on-failure
|
Restart=on-failure
|
||||||
RestartSec=5
|
RestartSec=5
|
||||||
|
|
||||||
|
|||||||
@@ -3,7 +3,7 @@
|
|||||||
# Copyright (c) 2021-2026 community-scripts ORG
|
# Copyright (c) 2021-2026 community-scripts ORG
|
||||||
# Author: CrazyWolf13
|
# Author: CrazyWolf13
|
||||||
# License: MIT | https://github.com/community-scripts/ProxmoxVE/raw/main/LICENSE
|
# License: MIT | https://github.com/community-scripts/ProxmoxVE/raw/main/LICENSE
|
||||||
# Source: https://wealthfolio.app/ | Github: https://github.com/afadil/wealthfolio
|
# Source: https://wealthfolio.app/ | Github: https://github.com/wealthfolio/wealthfolio
|
||||||
|
|
||||||
source /dev/stdin <<<"$FUNCTIONS_FILE_PATH"
|
source /dev/stdin <<<"$FUNCTIONS_FILE_PATH"
|
||||||
color
|
color
|
||||||
@@ -14,31 +14,14 @@ network_check
|
|||||||
update_os
|
update_os
|
||||||
|
|
||||||
msg_info "Installing Dependencies"
|
msg_info "Installing Dependencies"
|
||||||
$STD apt install -y \
|
$STD apt install -y argon2
|
||||||
pkg-config \
|
|
||||||
libssl-dev \
|
|
||||||
build-essential \
|
|
||||||
libsqlite3-dev \
|
|
||||||
argon2
|
|
||||||
msg_ok "Installed Dependencies"
|
msg_ok "Installed Dependencies"
|
||||||
|
|
||||||
setup_rust
|
fetch_and_deploy_gh_release "wealthfolio" "wealthfolio/wealthfolio" "prebuild" "latest" "/opt/wealthfolio" "wealthfolio-server-*-linux-amd64.tar.gz"
|
||||||
NODE_VERSION="24" NODE_MODULE="pnpm" setup_nodejs
|
|
||||||
fetch_and_deploy_gh_release "wealthfolio" "afadil/wealthfolio" "tarball"
|
|
||||||
|
|
||||||
msg_info "Building Frontend (patience)"
|
msg_info "Installing Wealthfolio"
|
||||||
cd /opt/wealthfolio
|
install -m 755 /opt/wealthfolio/wealthfolio-server /usr/local/bin/wealthfolio-server
|
||||||
export BUILD_TARGET=web
|
msg_ok "Installed Wealthfolio"
|
||||||
$STD pnpm install --frozen-lockfile
|
|
||||||
$STD pnpm --filter frontend... build
|
|
||||||
msg_ok "Built Frontend"
|
|
||||||
|
|
||||||
msg_info "Building Backend (patience)"
|
|
||||||
source ~/.cargo/env
|
|
||||||
$STD cargo build --release --manifest-path apps/server/Cargo.toml
|
|
||||||
cp /opt/wealthfolio/target/release/wealthfolio-server /usr/local/bin/wealthfolio-server
|
|
||||||
chmod +x /usr/local/bin/wealthfolio-server
|
|
||||||
msg_ok "Built Backend"
|
|
||||||
|
|
||||||
msg_info "Configuring Wealthfolio"
|
msg_info "Configuring Wealthfolio"
|
||||||
mkdir -p /opt/wealthfolio_data
|
mkdir -p /opt/wealthfolio_data
|
||||||
@@ -57,12 +40,6 @@ EOF
|
|||||||
echo "WF_PASSWORD=${WF_PASSWORD}" >~/wealthfolio.creds
|
echo "WF_PASSWORD=${WF_PASSWORD}" >~/wealthfolio.creds
|
||||||
msg_ok "Configured Wealthfolio"
|
msg_ok "Configured Wealthfolio"
|
||||||
|
|
||||||
msg_info "Cleaning Up"
|
|
||||||
rm -rf /opt/wealthfolio/target
|
|
||||||
rm -rf /root/.cargo/registry
|
|
||||||
rm -rf /opt/wealthfolio/node_modules
|
|
||||||
msg_ok "Cleaned Up"
|
|
||||||
|
|
||||||
msg_info "Creating Service"
|
msg_info "Creating Service"
|
||||||
cat <<EOF >/etc/systemd/system/wealthfolio.service
|
cat <<EOF >/etc/systemd/system/wealthfolio.service
|
||||||
[Unit]
|
[Unit]
|
||||||
|
|||||||
@@ -28,7 +28,14 @@ declare -f init_tool_telemetry &>/dev/null && init_tool_telemetry "kernel-clean"
|
|||||||
|
|
||||||
# Detect current kernel
|
# Detect current kernel
|
||||||
current_kernel=$(uname -r)
|
current_kernel=$(uname -r)
|
||||||
available_kernels=$(dpkg --list | grep 'kernel-.*-pve' | awk '{print $2}' | grep -v "$current_kernel" | sort -V)
|
# Only list fully-installed (ii) versioned kernel packages; the pattern
|
||||||
|
# proxmox-kernel-X.Y.Z matches versioned kernels while excluding the
|
||||||
|
# two-segment meta-packages (proxmox-kernel-X.Y) and proxmox-kernel-helper.
|
||||||
|
available_kernels=$(dpkg --list |
|
||||||
|
awk '/^ii/ {print $2}' |
|
||||||
|
grep -E '^proxmox-kernel-[0-9]+\.[0-9]+\.[0-9]' |
|
||||||
|
grep -v "$current_kernel" |
|
||||||
|
sort -V)
|
||||||
|
|
||||||
header_info
|
header_info
|
||||||
|
|
||||||
@@ -41,13 +48,23 @@ echo -e "${GN}Currently running kernel: ${current_kernel}${CL}"
|
|||||||
echo -e "${YW}Available kernels for removal:${CL}"
|
echo -e "${YW}Available kernels for removal:${CL}"
|
||||||
echo "$available_kernels" | nl -w 2 -s '. '
|
echo "$available_kernels" | nl -w 2 -s '. '
|
||||||
|
|
||||||
echo -e "\n${YW}Select kernels to remove (comma-separated, e.g., 1,2):${CL}"
|
echo -e "\n${YW}Select kernels to remove (e.g. 1,3 or 1-5 or 1-3,7):${CL}"
|
||||||
read -r selected
|
read -r selected
|
||||||
|
|
||||||
# Parse selection
|
# Parse selection: supports single indices, ranges (e.g., 1-5), and combinations (e.g., 1,3-5,7)
|
||||||
IFS=',' read -r -a selected_indices <<<"$selected"
|
selected_indices=()
|
||||||
kernels_to_remove=()
|
IFS=',' read -r -a tokens <<<"$selected"
|
||||||
|
for token in "${tokens[@]}"; do
|
||||||
|
if [[ "$token" =~ ^([0-9]+)-([0-9]+)$ ]]; then
|
||||||
|
for ((i = BASH_REMATCH[1]; i <= BASH_REMATCH[2]; i++)); do
|
||||||
|
selected_indices+=("$i")
|
||||||
|
done
|
||||||
|
else
|
||||||
|
selected_indices+=("$token")
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
|
||||||
|
kernels_to_remove=()
|
||||||
for index in "${selected_indices[@]}"; do
|
for index in "${selected_indices[@]}"; do
|
||||||
kernel=$(echo "$available_kernels" | sed -n "${index}p")
|
kernel=$(echo "$available_kernels" | sed -n "${index}p")
|
||||||
if [ -n "$kernel" ]; then
|
if [ -n "$kernel" ]; then
|
||||||
@@ -72,10 +89,28 @@ fi
|
|||||||
# Remove kernels
|
# Remove kernels
|
||||||
for kernel in "${kernels_to_remove[@]}"; do
|
for kernel in "${kernels_to_remove[@]}"; do
|
||||||
echo -e "${YW}Removing $kernel...${CL}"
|
echo -e "${YW}Removing $kernel...${CL}"
|
||||||
if apt-get purge -y "$kernel" >/dev/null 2>&1; then
|
# Derive the major.minor meta-package name (e.g. proxmox-kernel-6.14)
|
||||||
echo -e "${GN}Successfully removed: $kernel${CL}"
|
# from a versioned name like proxmox-kernel-6.14.11-9-pve-signed.
|
||||||
|
minor_version=$(echo "$kernel" | sed -E 's/^proxmox-kernel-([0-9]+\.[0-9]+)\..*/\1/')
|
||||||
|
meta="proxmox-kernel-${minor_version}"
|
||||||
|
pkgs_to_remove=("$kernel")
|
||||||
|
# Include the meta-package in the purge when it is installed and when
|
||||||
|
# no other versioned kernel of the same minor version will remain
|
||||||
|
# (the running kernel keeps it alive if it shares the same minor).
|
||||||
|
if dpkg -l "$meta" 2>/dev/null | grep -q '^ii'; then
|
||||||
|
remaining=$(dpkg --list |
|
||||||
|
awk '/^ii/ {print $2}' |
|
||||||
|
grep -E "^proxmox-kernel-${minor_version}\." |
|
||||||
|
grep -v "^${kernel}$" |
|
||||||
|
wc -l)
|
||||||
|
if [ "$remaining" -eq 0 ]; then
|
||||||
|
pkgs_to_remove+=("$meta")
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
if apt-get purge -y "${pkgs_to_remove[@]}" >/dev/null 2>&1; then
|
||||||
|
echo -e "${GN}Successfully removed: ${pkgs_to_remove[*]}${CL}"
|
||||||
else
|
else
|
||||||
echo -e "${RD}Failed to remove: $kernel. Check dependencies.${CL}"
|
echo -e "${RD}Failed to remove: ${pkgs_to_remove[*]}. Check dependencies.${CL}"
|
||||||
fi
|
fi
|
||||||
done
|
done
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user