mirror of
https://github.com/community-scripts/ProxmoxVE.git
synced 2026-05-23 17:04:58 +02:00
Compare commits
2 Commits
github-act
...
arm64-gith
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
5161a74dca | ||
|
|
e82d290c31 |
24
CHANGELOG.md
24
CHANGELOG.md
@@ -464,25 +464,6 @@ Exercise vigilance regarding copycat or coat-tailing sites that seek to exploit
|
|||||||
|
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
## 2026-05-23
|
|
||||||
|
|
||||||
### 🚀 Updated Scripts
|
|
||||||
|
|
||||||
- #### 🐞 Bug Fixes
|
|
||||||
|
|
||||||
- IronClaw: Extra configuration during install to ensure Web Gateway can run [@SystemIdleProcess](https://github.com/SystemIdleProcess) ([#14635](https://github.com/community-scripts/ProxmoxVE/pull/14635))
|
|
||||||
- Tunarr: fix path to backup during update [@SystemIdleProcess](https://github.com/SystemIdleProcess) ([#14655](https://github.com/community-scripts/ProxmoxVE/pull/14655))
|
|
||||||
|
|
||||||
- #### ✨ New Features
|
|
||||||
|
|
||||||
- wealthfolio: add: prebuild [@CrazyWolf13](https://github.com/CrazyWolf13) ([#14658](https://github.com/community-scripts/ProxmoxVE/pull/14658))
|
|
||||||
|
|
||||||
### 🧰 Tools
|
|
||||||
|
|
||||||
- #### ✨ New Features
|
|
||||||
|
|
||||||
- kernel-clean: support range syntax in selection prompt [@djhojd](https://github.com/djhojd) ([#14656](https://github.com/community-scripts/ProxmoxVE/pull/14656))
|
|
||||||
|
|
||||||
## 2026-05-22
|
## 2026-05-22
|
||||||
|
|
||||||
### 🆕 New Scripts
|
### 🆕 New Scripts
|
||||||
@@ -497,17 +478,12 @@ Exercise vigilance regarding copycat or coat-tailing sites that seek to exploit
|
|||||||
- Docmost: Fix duplicate STORAGE_DRIVER [@MickLesk](https://github.com/MickLesk) ([#14645](https://github.com/community-scripts/ProxmoxVE/pull/14645))
|
- Docmost: Fix duplicate STORAGE_DRIVER [@MickLesk](https://github.com/MickLesk) ([#14645](https://github.com/community-scripts/ProxmoxVE/pull/14645))
|
||||||
- Profilarr: pin Deno version to v2.7.5 [@MickLesk](https://github.com/MickLesk) ([#14632](https://github.com/community-scripts/ProxmoxVE/pull/14632))
|
- Profilarr: pin Deno version to v2.7.5 [@MickLesk](https://github.com/MickLesk) ([#14632](https://github.com/community-scripts/ProxmoxVE/pull/14632))
|
||||||
|
|
||||||
- #### ✨ New Features
|
|
||||||
|
|
||||||
- add: karakeep cli wrapper [@CrazyWolf13](https://github.com/CrazyWolf13) ([#14618](https://github.com/community-scripts/ProxmoxVE/pull/14618))
|
|
||||||
|
|
||||||
- #### 💥 Breaking Changes
|
- #### 💥 Breaking Changes
|
||||||
|
|
||||||
- OpenCloud: v7.0.0 changes [@vhsdream](https://github.com/vhsdream) ([#14650](https://github.com/community-scripts/ProxmoxVE/pull/14650))
|
- OpenCloud: v7.0.0 changes [@vhsdream](https://github.com/vhsdream) ([#14650](https://github.com/community-scripts/ProxmoxVE/pull/14650))
|
||||||
|
|
||||||
- #### 🔧 Refactor
|
- #### 🔧 Refactor
|
||||||
|
|
||||||
- workflows: update workflows, templates to support arm64. [@asylumexp](https://github.com/asylumexp) ([#14653](https://github.com/community-scripts/ProxmoxVE/pull/14653))
|
|
||||||
- SoulSync: setup Node v22 and build WebUI [@MickLesk](https://github.com/MickLesk) ([#14639](https://github.com/community-scripts/ProxmoxVE/pull/14639))
|
- SoulSync: setup Node v22 and build WebUI [@MickLesk](https://github.com/MickLesk) ([#14639](https://github.com/community-scripts/ProxmoxVE/pull/14639))
|
||||||
- Refactor: Dispatcharr [@MickLesk](https://github.com/MickLesk) ([#14313](https://github.com/community-scripts/ProxmoxVE/pull/14313))
|
- Refactor: Dispatcharr [@MickLesk](https://github.com/MickLesk) ([#14313](https://github.com/community-scripts/ProxmoxVE/pull/14313))
|
||||||
|
|
||||||
|
|||||||
@@ -60,12 +60,11 @@ description
|
|||||||
|
|
||||||
msg_ok "Completed Successfully!\n"
|
msg_ok "Completed Successfully!\n"
|
||||||
echo -e "${CREATING}${GN}${APP} setup has been successfully initialized!${CL}"
|
echo -e "${CREATING}${GN}${APP} setup has been successfully initialized!${CL}"
|
||||||
echo -e "${INFO}${YW} Next Steps:${CL}"
|
echo -e "${INFO}${YW} Complete setup by running:${CL}"
|
||||||
echo -e "${TAB}1. Complete setup by running:${CL}"
|
echo -e "${TAB}${BGN}ironclaw onboard${CL}"
|
||||||
echo -e "${TAB}${TAB}${BGN}/usr/local/bin/ironclaw onboard${CL}"
|
echo -e "${INFO}${YW} Then start the service:${CL}"
|
||||||
echo -e "${TAB}2. Start the service:${CL}"
|
echo -e "${TAB}${BGN}rc-service ironclaw start${CL}"
|
||||||
echo -e "${TAB}${TAB}${BGN}rc-service ironclaw start${CL}"
|
echo -e "${INFO}${YW} Access the Web UI at:${CL}"
|
||||||
echo -e "${TAB}3. Access the Web UI at:${CL}"
|
|
||||||
echo -e "${TAB}${GATEWAY}${BGN}http://${IP}:3000${CL}"
|
echo -e "${TAB}${GATEWAY}${BGN}http://${IP}:3000${CL}"
|
||||||
echo -e "${INFO}${YW} Use Gateway Authentication Token to login:${CL}"
|
echo -e "${INFO}${YW} Auth token and database credentials:${CL}"
|
||||||
echo -e "${TAB}${TAB}${BGN}cat /root/.ironclaw/gateway.creds${CL}"
|
echo -e "${TAB}${BGN}cat /root/.ironclaw/.env${CL}"
|
||||||
|
|||||||
@@ -40,7 +40,7 @@ function update_script() {
|
|||||||
msg_ok "Backed up Configuration"
|
msg_ok "Backed up Configuration"
|
||||||
|
|
||||||
fetch_and_deploy_gh_release "ironclaw-bin" "nearai/ironclaw" "prebuild" "latest" "/usr/local/bin" \
|
fetch_and_deploy_gh_release "ironclaw-bin" "nearai/ironclaw" "prebuild" "latest" "/usr/local/bin" \
|
||||||
"ironclaw-$(uname -m)-unknown-linux-gnu.tar.gz"
|
"ironclaw-$(uname -m)-unknown-linux-$([[ -f /etc/alpine-release ]] && echo "musl" || echo "gnu").tar.gz"
|
||||||
chmod +x /usr/local/bin/ironclaw
|
chmod +x /usr/local/bin/ironclaw
|
||||||
|
|
||||||
msg_info "Restoring Configuration"
|
msg_info "Restoring Configuration"
|
||||||
@@ -62,12 +62,11 @@ description
|
|||||||
|
|
||||||
msg_ok "Completed Successfully!\n"
|
msg_ok "Completed Successfully!\n"
|
||||||
echo -e "${CREATING}${GN}${APP} setup has been successfully initialized!${CL}"
|
echo -e "${CREATING}${GN}${APP} setup has been successfully initialized!${CL}"
|
||||||
echo -e "${INFO}${YW} Next Steps:${CL}"
|
echo -e "${INFO}${YW} Complete setup by running:${CL}"
|
||||||
echo -e "${TAB}1. Configure remaining settings:${CL}"
|
echo -e "${TAB}${BGN}ironclaw onboard${CL}"
|
||||||
echo -e "${TAB}${TAB}${BGN}/usr/local/bin/ironclaw onboard${CL}"
|
echo -e "${INFO}${YW} Then start the service:${CL}"
|
||||||
echo -e "${TAB}2. Start the service:${CL}"
|
echo -e "${TAB}${BGN}systemctl start ironclaw${CL}"
|
||||||
echo -e "${TAB}${TAB}${BGN}systemctl start ironclaw${CL}"
|
echo -e "${INFO}${YW} Access the Web UI at:${CL}"
|
||||||
echo -e "${TAB}3. Access the Web UI at:${CL}"
|
|
||||||
echo -e "${TAB}${GATEWAY}${BGN}http://${IP}:3000${CL}"
|
echo -e "${TAB}${GATEWAY}${BGN}http://${IP}:3000${CL}"
|
||||||
echo -e "${INFO}${YW} Use Gateway Authentication Token to login:${CL}"
|
echo -e "${INFO}${YW} Auth token and database credentials:${CL}"
|
||||||
echo -e "${TAB}${TAB}${BGN}cat /root/.ironclaw/gateway.creds${CL}"
|
echo -e "${TAB}${BGN}cat /root/.ironclaw/.env${CL}"
|
||||||
|
|||||||
@@ -54,25 +54,6 @@ function update_script() {
|
|||||||
if grep -q '^ExecStart=/usr/bin/node\s\+dist/index\.mjs$' /etc/systemd/system/karakeep-workers.service; then
|
if grep -q '^ExecStart=/usr/bin/node\s\+dist/index\.mjs$' /etc/systemd/system/karakeep-workers.service; then
|
||||||
sed -i -E 's#^(ExecStart=/usr/bin/node\s+dist/)index\.mjs$#\1index.js#' /etc/systemd/system/karakeep-workers.service
|
sed -i -E 's#^(ExecStart=/usr/bin/node\s+dist/)index\.mjs$#\1index.js#' /etc/systemd/system/karakeep-workers.service
|
||||||
systemctl daemon-reload
|
systemctl daemon-reload
|
||||||
fi
|
|
||||||
|
|
||||||
if [ ! -f /usr/bin/karakeep ]; then
|
|
||||||
cat <<'EOF' >/usr/bin/karakeep
|
|
||||||
#!/usr/bin/env node
|
|
||||||
import('/opt/karakeep/apps/cli/dist/index.mjs')
|
|
||||||
EOF
|
|
||||||
chmod +x /usr/bin/karakeep
|
|
||||||
fi
|
|
||||||
|
|
||||||
if ! command -v pip >/dev/null 2>&1 || ! pip show yt-dlp-ejs >/dev/null 2>&1; then
|
|
||||||
msg_info "Installing external JavaScript Extension for yt-dlp"
|
|
||||||
ensure_dependencies python3-pip
|
|
||||||
$STD pip install -U yt-dlp-ejs
|
|
||||||
msg_ok "Installed external JavaScript Extension for yt-dlp"
|
|
||||||
fi
|
|
||||||
|
|
||||||
if ! command -v deno &>/dev/null; then
|
|
||||||
fetch_and_deploy_gh_release "deno" "denoland/deno" "prebuild" "latest" "/usr/local/bin" "deno-$(uname -m)-unknown-linux-gnu.zip"
|
|
||||||
fi
|
fi
|
||||||
|
|
||||||
CLEAN_INSTALL=1 fetch_and_deploy_gh_release "karakeep" "karakeep-app/karakeep" "tarball"
|
CLEAN_INSTALL=1 fetch_and_deploy_gh_release "karakeep" "karakeep-app/karakeep" "tarball"
|
||||||
|
|||||||
@@ -34,11 +34,11 @@ function update_script() {
|
|||||||
msg_ok "Stopped Service"
|
msg_ok "Stopped Service"
|
||||||
|
|
||||||
msg_info "Creating Backup"
|
msg_info "Creating Backup"
|
||||||
if [ -d "/root/.local/share/tunarr" ]; then
|
if [ -d "/usr/local/share/tunarr" ]; then
|
||||||
tar -czf "/opt/${APP}_backup_$(date +%F).tar.gz" /root/.local/share/tunarr $STD
|
tar -czf "/opt/${APP}_backup_$(date +%F).tar.gz" /usr/local/share/tunarr $STD
|
||||||
msg_ok "Backup Created"
|
msg_ok "Backup Created"
|
||||||
else
|
else
|
||||||
msg_error "Backup failed: /root/.local/share/tunarr does not exist"
|
msg_error "Backup failed: /usr/local/share/tunarr does not exist"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
CLEAN_INSTALL=1 fetch_and_deploy_gh_release "tunarr" "chrisbenincasa/tunarr" "prebuild" "latest" "/opt/tunarr" "*linux-x64.tar.gz"
|
CLEAN_INSTALL=1 fetch_and_deploy_gh_release "tunarr" "chrisbenincasa/tunarr" "prebuild" "latest" "/opt/tunarr" "*linux-x64.tar.gz"
|
||||||
|
|||||||
@@ -3,13 +3,13 @@ source <(curl -fsSL https://raw.githubusercontent.com/community-scripts/ProxmoxV
|
|||||||
# Copyright (c) 2021-2026 community-scripts ORG
|
# Copyright (c) 2021-2026 community-scripts ORG
|
||||||
# Author: CrazyWolf13
|
# Author: CrazyWolf13
|
||||||
# License: MIT | https://github.com/community-scripts/ProxmoxVE/raw/main/LICENSE
|
# License: MIT | https://github.com/community-scripts/ProxmoxVE/raw/main/LICENSE
|
||||||
# Source: https://wealthfolio.app/ | Github: https://github.com/wealthfolio/wealthfolio
|
# Source: https://wealthfolio.app/ | Github: https://github.com/afadil/wealthfolio
|
||||||
|
|
||||||
APP="Wealthfolio"
|
APP="Wealthfolio"
|
||||||
var_tags="${var_tags:-finance;portfolio}"
|
var_tags="${var_tags:-finance;portfolio}"
|
||||||
var_cpu="${var_cpu:-1}"
|
var_cpu="${var_cpu:-4}"
|
||||||
var_ram="${var_ram:-512}"
|
var_ram="${var_ram:-4096}"
|
||||||
var_disk="${var_disk:-4}"
|
var_disk="${var_disk:-10}"
|
||||||
var_os="${var_os:-debian}"
|
var_os="${var_os:-debian}"
|
||||||
var_version="${var_version:-13}"
|
var_version="${var_version:-13}"
|
||||||
var_arm64="${var_arm64:-no}"
|
var_arm64="${var_arm64:-no}"
|
||||||
@@ -30,11 +30,13 @@ function update_script() {
|
|||||||
exit
|
exit
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
NODE_VERSION="24" NODE_MODULE="pnpm" setup_nodejs
|
||||||
|
|
||||||
if grep -q '^WF_CORS_ALLOW_ORIGINS=\*$' /opt/wealthfolio/.env; then
|
if grep -q '^WF_CORS_ALLOW_ORIGINS=\*$' /opt/wealthfolio/.env; then
|
||||||
sed -i "s|^WF_CORS_ALLOW_ORIGINS=\*$|WF_CORS_ALLOW_ORIGINS=http://${LOCAL_IP}:8080|" /opt/wealthfolio/.env
|
sed -i "s|^WF_CORS_ALLOW_ORIGINS=\*$|WF_CORS_ALLOW_ORIGINS=http://${LOCAL_IP}:8080|" /opt/wealthfolio/.env
|
||||||
fi
|
fi
|
||||||
|
|
||||||
if check_for_gh_release "wealthfolio" "wealthfolio/wealthfolio"; then
|
if check_for_gh_release "wealthfolio" "afadil/wealthfolio"; then
|
||||||
msg_info "Stopping Service"
|
msg_info "Stopping Service"
|
||||||
systemctl stop wealthfolio
|
systemctl stop wealthfolio
|
||||||
msg_ok "Stopped Service"
|
msg_ok "Stopped Service"
|
||||||
@@ -44,8 +46,21 @@ function update_script() {
|
|||||||
cp /opt/wealthfolio/.env /opt/wealthfolio_env_backup
|
cp /opt/wealthfolio/.env /opt/wealthfolio_env_backup
|
||||||
msg_ok "Backed up Data"
|
msg_ok "Backed up Data"
|
||||||
|
|
||||||
CLEAN_INSTALL=1 fetch_and_deploy_gh_release "wealthfolio" "wealthfolio/wealthfolio" "prebuild" "latest" "/opt/wealthfolio" "wealthfolio-server-*-linux-amd64.tar.gz"
|
CLEAN_INSTALL=1 fetch_and_deploy_gh_release "wealthfolio" "afadil/wealthfolio" "tarball"
|
||||||
install -m 755 /opt/wealthfolio/wealthfolio-server /usr/local/bin/wealthfolio-server
|
|
||||||
|
msg_info "Building Frontend (patience)"
|
||||||
|
cd /opt/wealthfolio
|
||||||
|
export BUILD_TARGET=web
|
||||||
|
$STD pnpm install --frozen-lockfile
|
||||||
|
$STD pnpm --filter frontend... build
|
||||||
|
msg_ok "Built Frontend"
|
||||||
|
|
||||||
|
msg_info "Building Backend (patience)"
|
||||||
|
source ~/.cargo/env
|
||||||
|
$STD cargo build --release --manifest-path apps/server/Cargo.toml
|
||||||
|
cp /opt/wealthfolio/target/release/wealthfolio-server /usr/local/bin/wealthfolio-server
|
||||||
|
chmod +x /usr/local/bin/wealthfolio-server
|
||||||
|
msg_ok "Built Backend"
|
||||||
|
|
||||||
msg_info "Restoring Data"
|
msg_info "Restoring Data"
|
||||||
cp -r /opt/wealthfolio_data_backup/. /opt/wealthfolio_data
|
cp -r /opt/wealthfolio_data_backup/. /opt/wealthfolio_data
|
||||||
@@ -53,6 +68,12 @@ function update_script() {
|
|||||||
rm -rf /opt/wealthfolio_data_backup /opt/wealthfolio_env_backup
|
rm -rf /opt/wealthfolio_data_backup /opt/wealthfolio_env_backup
|
||||||
msg_ok "Restored Data"
|
msg_ok "Restored Data"
|
||||||
|
|
||||||
|
msg_info "Cleaning Up"
|
||||||
|
rm -rf /opt/wealthfolio/target
|
||||||
|
rm -rf /root/.cargo/registry
|
||||||
|
rm -rf /opt/wealthfolio/node_modules
|
||||||
|
msg_ok "Cleaned Up"
|
||||||
|
|
||||||
msg_info "Starting Service"
|
msg_info "Starting Service"
|
||||||
systemctl start wealthfolio
|
systemctl start wealthfolio
|
||||||
msg_ok "Started Service"
|
msg_ok "Started Service"
|
||||||
|
|||||||
@@ -35,41 +35,20 @@ fetch_and_deploy_gh_release "ironclaw-bin" "nearai/ironclaw" "prebuild" "latest"
|
|||||||
"ironclaw-$(uname -m)-unknown-linux-musl.tar.gz"
|
"ironclaw-$(uname -m)-unknown-linux-musl.tar.gz"
|
||||||
chmod +x /usr/local/bin/ironclaw
|
chmod +x /usr/local/bin/ironclaw
|
||||||
|
|
||||||
msg_info "Configuring Environment"
|
msg_info "Configuring IronClaw"
|
||||||
|
mkdir -p /root/.ironclaw
|
||||||
GATEWAY_TOKEN=$(openssl rand -hex 32)
|
GATEWAY_TOKEN=$(openssl rand -hex 32)
|
||||||
mkdir -p /root/.ironclaw
|
|
||||||
{
|
|
||||||
echo "Gateway-Token"
|
|
||||||
echo "Token: $GATEWAY_TOKEN"
|
|
||||||
} >> /root/.ironclaw/gateway.creds
|
|
||||||
|
|
||||||
mkdir -p /root/.ironclaw
|
|
||||||
cat <<EOF >/root/.ironclaw/.env
|
cat <<EOF >/root/.ironclaw/.env
|
||||||
DATABASE_BACKEND=postgres
|
|
||||||
DATABASE_URL=postgresql://ironclaw:${PG_PASS}@localhost:5432/ironclaw?sslmode=disable
|
DATABASE_URL=postgresql://ironclaw:${PG_PASS}@localhost:5432/ironclaw?sslmode=disable
|
||||||
GATEWAY_ENABLED=true
|
GATEWAY_ENABLED=true
|
||||||
GATEWAY_HOST=0.0.0.0
|
GATEWAY_HOST=0.0.0.0
|
||||||
GATEWAY_PORT=3000
|
GATEWAY_PORT=3000
|
||||||
GATEWAY_AUTH_TOKEN=${GATEWAY_TOKEN}
|
GATEWAY_AUTH_TOKEN=${GATEWAY_TOKEN}
|
||||||
CLI_ENABLED=false
|
CLI_ENABLED=false
|
||||||
|
AGENT_NAME=ironclaw
|
||||||
RUST_LOG=ironclaw=info,tower_http=info
|
RUST_LOG=ironclaw=info,tower_http=info
|
||||||
EOF
|
EOF
|
||||||
chmod 600 /root/.ironclaw/.env
|
chmod 600 /root/.ironclaw/.env
|
||||||
msg_ok "Configured Environment"
|
|
||||||
|
|
||||||
msg_info "Configuring IronClaw"
|
|
||||||
# Set values in the database since it is typically the true source of truth and ensures values are set correctly on first run before the service starts.
|
|
||||||
/usr/local/bin/ironclaw --no-onboard config set database_backend postgres >/dev/null
|
|
||||||
/usr/local/bin/ironclaw --no-onboard config set database_url "postgresql://ironclaw:${PG_PASS}@localhost:5432/ironclaw?sslmode=disable" >/dev/null
|
|
||||||
/usr/local/bin/ironclaw --no-onboard config set channels.gateway_enabled true >/dev/null
|
|
||||||
/usr/local/bin/ironclaw --no-onboard config set channels.gateway_host 0.0.0.0 >/dev/null
|
|
||||||
/usr/local/bin/ironclaw --no-onboard config set channels.gateway_port 3000 >/dev/null
|
|
||||||
/usr/local/bin/ironclaw --no-onboard config set channels.gateway_auth_token "${GATEWAY_TOKEN}" >/dev/null
|
|
||||||
/usr/local/bin/ironclaw --no-onboard config set channels.cli_enabled false >/dev/null
|
|
||||||
/usr/local/bin/ironclaw --no-onboard config set secrets_master_key_source none >/dev/null
|
|
||||||
# Running ironclaw defaults to use env for secrets and creates this entry, but we want to set that during onboard.
|
|
||||||
sleep 5
|
|
||||||
sed -i '/SECRETS_MASTER_KEY/d' /root/.ironclaw/.env
|
|
||||||
msg_ok "Configured IronClaw"
|
msg_ok "Configured IronClaw"
|
||||||
|
|
||||||
msg_info "Creating Service"
|
msg_info "Creating Service"
|
||||||
|
|||||||
@@ -24,44 +24,23 @@ PG_VERSION="17" PG_MODULES="pgvector" setup_postgresql
|
|||||||
PG_DB_NAME="ironclaw" PG_DB_USER="ironclaw" PG_DB_EXTENSIONS="vector" setup_postgresql_db
|
PG_DB_NAME="ironclaw" PG_DB_USER="ironclaw" PG_DB_EXTENSIONS="vector" setup_postgresql_db
|
||||||
|
|
||||||
fetch_and_deploy_gh_release "ironclaw-bin" "nearai/ironclaw" "prebuild" "latest" "/usr/local/bin" \
|
fetch_and_deploy_gh_release "ironclaw-bin" "nearai/ironclaw" "prebuild" "latest" "/usr/local/bin" \
|
||||||
"ironclaw-$(uname -m)-unknown-linux-gnu.tar.gz"
|
"ironclaw-$(uname -m)-unknown-linux-$([[ -f /etc/alpine-release ]] && echo "musl" || echo "gnu").tar.gz"
|
||||||
chmod +x /usr/local/bin/ironclaw
|
chmod +x /usr/local/bin/ironclaw
|
||||||
|
|
||||||
msg_info "Configuring Environment"
|
msg_info "Configuring IronClaw"
|
||||||
|
mkdir -p /root/.ironclaw
|
||||||
GATEWAY_TOKEN=$(openssl rand -hex 32)
|
GATEWAY_TOKEN=$(openssl rand -hex 32)
|
||||||
mkdir -p /root/.ironclaw
|
|
||||||
{
|
|
||||||
echo "Gateway-Token"
|
|
||||||
echo "Token: $GATEWAY_TOKEN"
|
|
||||||
} >> /root/.ironclaw/gateway.creds
|
|
||||||
|
|
||||||
mkdir -p /root/.ironclaw
|
|
||||||
cat <<EOF >/root/.ironclaw/.env
|
cat <<EOF >/root/.ironclaw/.env
|
||||||
DATABASE_BACKEND=postgres
|
|
||||||
DATABASE_URL=postgresql://${PG_DB_USER}:${PG_DB_PASS}@localhost:5432/${PG_DB_NAME}?sslmode=disable
|
DATABASE_URL=postgresql://${PG_DB_USER}:${PG_DB_PASS}@localhost:5432/${PG_DB_NAME}?sslmode=disable
|
||||||
GATEWAY_ENABLED=true
|
GATEWAY_ENABLED=true
|
||||||
GATEWAY_HOST=0.0.0.0
|
GATEWAY_HOST=0.0.0.0
|
||||||
GATEWAY_PORT=3000
|
GATEWAY_PORT=3000
|
||||||
GATEWAY_AUTH_TOKEN=${GATEWAY_TOKEN}
|
GATEWAY_AUTH_TOKEN=${GATEWAY_TOKEN}
|
||||||
CLI_ENABLED=false
|
CLI_ENABLED=false
|
||||||
|
AGENT_NAME=ironclaw
|
||||||
RUST_LOG=ironclaw=info,tower_http=info
|
RUST_LOG=ironclaw=info,tower_http=info
|
||||||
EOF
|
EOF
|
||||||
chmod 600 /root/.ironclaw/.env
|
chmod 600 /root/.ironclaw/.env
|
||||||
msg_ok "Configured Environment"
|
|
||||||
|
|
||||||
msg_info "Configuring IronClaw"
|
|
||||||
# Set values in the database since it is typically the true source of truth and ensures values are set correctly on first run before the service starts.
|
|
||||||
/usr/local/bin/ironclaw --no-onboard config set database_backend postgres >/dev/null
|
|
||||||
/usr/local/bin/ironclaw --no-onboard config set database_url "postgresql://${PG_DB_USER}:${PG_DB_PASS}@localhost:5432/${PG_DB_NAME}?sslmode=disable" >/dev/null
|
|
||||||
/usr/local/bin/ironclaw --no-onboard config set channels.gateway_enabled true >/dev/null
|
|
||||||
/usr/local/bin/ironclaw --no-onboard config set channels.gateway_host 0.0.0.0 >/dev/null
|
|
||||||
/usr/local/bin/ironclaw --no-onboard config set channels.gateway_port 3000 >/dev/null
|
|
||||||
/usr/local/bin/ironclaw --no-onboard config set channels.gateway_auth_token "${GATEWAY_TOKEN}" >/dev/null
|
|
||||||
/usr/local/bin/ironclaw --no-onboard config set channels.cli_enabled false >/dev/null
|
|
||||||
/usr/local/bin/ironclaw --no-onboard config set secrets_master_key_source none >/dev/null
|
|
||||||
# Running ironclaw defaults to use env for secrets and creates this entry, but we want to set that during onboard.
|
|
||||||
sleep 5
|
|
||||||
sed -i '/SECRETS_MASTER_KEY/d' /root/.ironclaw/.env
|
|
||||||
msg_ok "Configured IronClaw"
|
msg_ok "Configured IronClaw"
|
||||||
|
|
||||||
msg_info "Creating Service"
|
msg_info "Creating Service"
|
||||||
@@ -72,7 +51,10 @@ After=network.target postgresql.service
|
|||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Type=simple
|
Type=simple
|
||||||
ExecStart=/usr/bin/dbus-run-session /usr/local/bin/ironclaw run
|
User=root
|
||||||
|
WorkingDirectory=/root
|
||||||
|
EnvironmentFile=/root/.ironclaw/.env
|
||||||
|
ExecStart=/usr/bin/dbus-run-session /usr/local/bin/ironclaw
|
||||||
Restart=on-failure
|
Restart=on-failure
|
||||||
RestartSec=5
|
RestartSec=5
|
||||||
|
|
||||||
|
|||||||
@@ -20,13 +20,11 @@ $STD apt install -y \
|
|||||||
chromium \
|
chromium \
|
||||||
graphicsmagick \
|
graphicsmagick \
|
||||||
ghostscript \
|
ghostscript \
|
||||||
python3-pip \
|
|
||||||
ffmpeg
|
ffmpeg
|
||||||
msg_ok "Installed Dependencies"
|
msg_ok "Installed Dependencies"
|
||||||
|
|
||||||
fetch_and_deploy_gh_release "monolith" "Y2Z/monolith" "singlefile" "latest" "/usr/bin" "monolith-gnu-linux-x86_64"
|
fetch_and_deploy_gh_release "monolith" "Y2Z/monolith" "singlefile" "latest" "/usr/bin" "monolith-gnu-linux-x86_64"
|
||||||
fetch_and_deploy_gh_release "yt-dlp" "yt-dlp/yt-dlp-nightly-builds" "singlefile" "latest" "/usr/bin" "yt-dlp_linux"
|
fetch_and_deploy_gh_release "yt-dlp" "yt-dlp/yt-dlp-nightly-builds" "singlefile" "latest" "/usr/bin" "yt-dlp_linux"
|
||||||
fetch_and_deploy_gh_release "deno" "denoland/deno" "prebuild" "latest" "/usr/local/bin" "deno-$(uname -m)-unknown-linux-gnu.zip"
|
|
||||||
setup_meilisearch
|
setup_meilisearch
|
||||||
|
|
||||||
fetch_and_deploy_gh_release "karakeep" "karakeep-app/karakeep" "tarball"
|
fetch_and_deploy_gh_release "karakeep" "karakeep-app/karakeep" "tarball"
|
||||||
@@ -34,10 +32,6 @@ cd /opt/karakeep
|
|||||||
MODULE_VERSION="$(jq -r '.packageManager | split("@")[1]' /opt/karakeep/package.json)"
|
MODULE_VERSION="$(jq -r '.packageManager | split("@")[1]' /opt/karakeep/package.json)"
|
||||||
NODE_VERSION="24" NODE_MODULE="pnpm@${MODULE_VERSION}" setup_nodejs
|
NODE_VERSION="24" NODE_MODULE="pnpm@${MODULE_VERSION}" setup_nodejs
|
||||||
|
|
||||||
msg_info "Installing external JavaScript Extension for yt-dlp"
|
|
||||||
$STD pip install -U yt-dlp-ejs
|
|
||||||
msg_ok "Installed external JavaScript Extension for yt-dlp"
|
|
||||||
|
|
||||||
msg_info "Installing karakeep"
|
msg_info "Installing karakeep"
|
||||||
export PUPPETEER_SKIP_DOWNLOAD="true"
|
export PUPPETEER_SKIP_DOWNLOAD="true"
|
||||||
export PLAYWRIGHT_SKIP_BROWSER_DOWNLOAD="true"
|
export PLAYWRIGHT_SKIP_BROWSER_DOWNLOAD="true"
|
||||||
@@ -53,11 +47,6 @@ cd /opt/karakeep/apps/cli
|
|||||||
$STD pnpm install --frozen-lockfile
|
$STD pnpm install --frozen-lockfile
|
||||||
$STD pnpm build
|
$STD pnpm build
|
||||||
$STD pnpm store prune
|
$STD pnpm store prune
|
||||||
cat <<'EOF' >/usr/bin/karakeep
|
|
||||||
#!/usr/bin/env node
|
|
||||||
import('/opt/karakeep/apps/cli/dist/index.mjs')
|
|
||||||
EOF
|
|
||||||
chmod +x /usr/bin/karakeep
|
|
||||||
|
|
||||||
export DATA_DIR=/opt/karakeep_data
|
export DATA_DIR=/opt/karakeep_data
|
||||||
karakeep_SECRET=$(openssl rand -base64 36 | cut -c1-24)
|
karakeep_SECRET=$(openssl rand -base64 36 | cut -c1-24)
|
||||||
|
|||||||
@@ -3,7 +3,7 @@
|
|||||||
# Copyright (c) 2021-2026 community-scripts ORG
|
# Copyright (c) 2021-2026 community-scripts ORG
|
||||||
# Author: CrazyWolf13
|
# Author: CrazyWolf13
|
||||||
# License: MIT | https://github.com/community-scripts/ProxmoxVE/raw/main/LICENSE
|
# License: MIT | https://github.com/community-scripts/ProxmoxVE/raw/main/LICENSE
|
||||||
# Source: https://wealthfolio.app/ | Github: https://github.com/wealthfolio/wealthfolio
|
# Source: https://wealthfolio.app/ | Github: https://github.com/afadil/wealthfolio
|
||||||
|
|
||||||
source /dev/stdin <<<"$FUNCTIONS_FILE_PATH"
|
source /dev/stdin <<<"$FUNCTIONS_FILE_PATH"
|
||||||
color
|
color
|
||||||
@@ -14,14 +14,31 @@ network_check
|
|||||||
update_os
|
update_os
|
||||||
|
|
||||||
msg_info "Installing Dependencies"
|
msg_info "Installing Dependencies"
|
||||||
$STD apt install -y argon2
|
$STD apt install -y \
|
||||||
|
pkg-config \
|
||||||
|
libssl-dev \
|
||||||
|
build-essential \
|
||||||
|
libsqlite3-dev \
|
||||||
|
argon2
|
||||||
msg_ok "Installed Dependencies"
|
msg_ok "Installed Dependencies"
|
||||||
|
|
||||||
fetch_and_deploy_gh_release "wealthfolio" "wealthfolio/wealthfolio" "prebuild" "latest" "/opt/wealthfolio" "wealthfolio-server-*-linux-amd64.tar.gz"
|
setup_rust
|
||||||
|
NODE_VERSION="24" NODE_MODULE="pnpm" setup_nodejs
|
||||||
|
fetch_and_deploy_gh_release "wealthfolio" "afadil/wealthfolio" "tarball"
|
||||||
|
|
||||||
msg_info "Installing Wealthfolio"
|
msg_info "Building Frontend (patience)"
|
||||||
install -m 755 /opt/wealthfolio/wealthfolio-server /usr/local/bin/wealthfolio-server
|
cd /opt/wealthfolio
|
||||||
msg_ok "Installed Wealthfolio"
|
export BUILD_TARGET=web
|
||||||
|
$STD pnpm install --frozen-lockfile
|
||||||
|
$STD pnpm --filter frontend... build
|
||||||
|
msg_ok "Built Frontend"
|
||||||
|
|
||||||
|
msg_info "Building Backend (patience)"
|
||||||
|
source ~/.cargo/env
|
||||||
|
$STD cargo build --release --manifest-path apps/server/Cargo.toml
|
||||||
|
cp /opt/wealthfolio/target/release/wealthfolio-server /usr/local/bin/wealthfolio-server
|
||||||
|
chmod +x /usr/local/bin/wealthfolio-server
|
||||||
|
msg_ok "Built Backend"
|
||||||
|
|
||||||
msg_info "Configuring Wealthfolio"
|
msg_info "Configuring Wealthfolio"
|
||||||
mkdir -p /opt/wealthfolio_data
|
mkdir -p /opt/wealthfolio_data
|
||||||
@@ -40,6 +57,12 @@ EOF
|
|||||||
echo "WF_PASSWORD=${WF_PASSWORD}" >~/wealthfolio.creds
|
echo "WF_PASSWORD=${WF_PASSWORD}" >~/wealthfolio.creds
|
||||||
msg_ok "Configured Wealthfolio"
|
msg_ok "Configured Wealthfolio"
|
||||||
|
|
||||||
|
msg_info "Cleaning Up"
|
||||||
|
rm -rf /opt/wealthfolio/target
|
||||||
|
rm -rf /root/.cargo/registry
|
||||||
|
rm -rf /opt/wealthfolio/node_modules
|
||||||
|
msg_ok "Cleaned Up"
|
||||||
|
|
||||||
msg_info "Creating Service"
|
msg_info "Creating Service"
|
||||||
cat <<EOF >/etc/systemd/system/wealthfolio.service
|
cat <<EOF >/etc/systemd/system/wealthfolio.service
|
||||||
[Unit]
|
[Unit]
|
||||||
|
|||||||
@@ -41,23 +41,13 @@ echo -e "${GN}Currently running kernel: ${current_kernel}${CL}"
|
|||||||
echo -e "${YW}Available kernels for removal:${CL}"
|
echo -e "${YW}Available kernels for removal:${CL}"
|
||||||
echo "$available_kernels" | nl -w 2 -s '. '
|
echo "$available_kernels" | nl -w 2 -s '. '
|
||||||
|
|
||||||
echo -e "\n${YW}Select kernels to remove (e.g. 1,3 or 1-5 or 1-3,7):${CL}"
|
echo -e "\n${YW}Select kernels to remove (comma-separated, e.g., 1,2):${CL}"
|
||||||
read -r selected
|
read -r selected
|
||||||
|
|
||||||
# Parse selection: supports single indices, ranges (e.g., 1-5), and combinations (e.g., 1,3-5,7)
|
# Parse selection
|
||||||
selected_indices=()
|
IFS=',' read -r -a selected_indices <<<"$selected"
|
||||||
IFS=',' read -r -a tokens <<<"$selected"
|
|
||||||
for token in "${tokens[@]}"; do
|
|
||||||
if [[ "$token" =~ ^([0-9]+)-([0-9]+)$ ]]; then
|
|
||||||
for ((i = BASH_REMATCH[1]; i <= BASH_REMATCH[2]; i++)); do
|
|
||||||
selected_indices+=("$i")
|
|
||||||
done
|
|
||||||
else
|
|
||||||
selected_indices+=("$token")
|
|
||||||
fi
|
|
||||||
done
|
|
||||||
|
|
||||||
kernels_to_remove=()
|
kernels_to_remove=()
|
||||||
|
|
||||||
for index in "${selected_indices[@]}"; do
|
for index in "${selected_indices[@]}"; do
|
||||||
kernel=$(echo "$available_kernels" | sed -n "${index}p")
|
kernel=$(echo "$available_kernels" | sed -n "${index}p")
|
||||||
if [ -n "$kernel" ]; then
|
if [ -n "$kernel" ]; then
|
||||||
|
|||||||
Reference in New Issue
Block a user