226 lines
7.2 KiB
YAML
226 lines
7.2 KiB
YAML
# Include{groups}
|
|
portals:
|
|
open:
|
|
# Include{portalLink}
|
|
questions:
|
|
# Include{global}
|
|
- variable: imageSelector
|
|
group: "Container Image"
|
|
label: "Select Image"
|
|
schema:
|
|
type: string
|
|
default: "image"
|
|
enum:
|
|
- value: "image"
|
|
description: "Firefox"
|
|
- value: "braveImage"
|
|
description: "Brave"
|
|
- value: "chromeImage"
|
|
description: "Chrome"
|
|
- value: "chromiumImage"
|
|
description: "Chromium"
|
|
- value: "edgeImage"
|
|
description: "Edge"
|
|
- value: "remminaImage"
|
|
description: "Remmina"
|
|
- value: "torImage"
|
|
description: "Tor"
|
|
- value: "vivaldiImage"
|
|
description: "Vivaldi"
|
|
- value: "vlcImage"
|
|
description: "Vlc"
|
|
- value: "vncviewerImage"
|
|
description: "Vncviewer"
|
|
- value: "xfceImage"
|
|
description: "Xfce"
|
|
# Include{workload}
|
|
# Include{workloadDeployment}
|
|
|
|
# Include{replicas1}
|
|
# Include{podSpec}
|
|
# Include{containerMain}
|
|
# Include{containerBasic}
|
|
# Include{containerAdvanced}
|
|
|
|
- variable: secretEnv
|
|
group: "App Configuration"
|
|
label: "Image Secrets"
|
|
schema:
|
|
additional_attrs: true
|
|
type: dict
|
|
attrs:
|
|
- variable: NEKO_PASSWORD
|
|
label: "NEKO_PASSWORD"
|
|
schema:
|
|
type: string
|
|
default: ""
|
|
private: true
|
|
- variable: NEKO_PASSWORD_ADMIN
|
|
label: "NEKO_PASSWORD_ADMIN"
|
|
schema:
|
|
type: string
|
|
default: ""
|
|
private: true
|
|
- variable: env
|
|
group: "App Configuration"
|
|
label: "Image Environment"
|
|
schema:
|
|
additional_attrs: true
|
|
type: dict
|
|
attrs:
|
|
- variable: NEKO_SCREEN
|
|
label: "NEKO_SCREEN"
|
|
description: "Resolution after startup. Only Admins can change this later."
|
|
schema:
|
|
type: string
|
|
default: "1920x1080@30"
|
|
- variable: NEKO_CONTROL_PROTECTION
|
|
label: "NEKO_CONTROL_PROTECTION"
|
|
description: "Control protection means, users can gain control only if at least one admin is in the room."
|
|
schema:
|
|
type: boolean
|
|
default: false
|
|
- variable: NEKO_IMPLICIT_CONTROL
|
|
label: "NEKO_IMPLICIT_CONTROL"
|
|
description: "If enabled members can gain control implicitly, they don't need to request control."
|
|
schema:
|
|
type: boolean
|
|
default: false
|
|
- variable: NEKO_PROXY
|
|
label: "NEKO_PROXY"
|
|
description: "Enable reverse proxy mode, so that neko trusts X-Forwarded-For headers."
|
|
schema:
|
|
type: boolean
|
|
default: false
|
|
- variable: NEKO_LOCKS
|
|
label: "NEKO_LOCKS"
|
|
description: "Resources, that will be locked when starting, separated by whitespace."
|
|
schema:
|
|
type: string
|
|
default: "192.168.1.x"
|
|
- variable: NEKO_NAT1TO1
|
|
label: "NEKO_NAT1TO1"
|
|
description: "Enter the IP of your TrueNAS-Server"
|
|
schema:
|
|
type: string
|
|
default: "192.168.1.x"
|
|
- variable: NEKO_IPFETCH
|
|
label: "NEKO_IPFETCH"
|
|
description: "Automatically fetch IP address from given URL when NEKO_NAT1TO1 is not specified."
|
|
schema:
|
|
type: string
|
|
default: "http://checkip.amazonaws.com"
|
|
# Include{containerConfig}
|
|
# Include{serviceRoot}
|
|
- variable: main
|
|
label: "Main Service"
|
|
description: "The Primary service on which the healthcheck runs, often the webUI"
|
|
schema:
|
|
additional_attrs: true
|
|
type: dict
|
|
attrs:
|
|
# Include{serviceSelectorLoadBalancer}
|
|
# Include{serviceSelectorExtras}
|
|
- variable: main
|
|
label: "Main Service Port Configuration"
|
|
schema:
|
|
additional_attrs: true
|
|
type: dict
|
|
attrs:
|
|
- variable: port
|
|
label: "Port"
|
|
description: "This port exposes the container port on the service"
|
|
schema:
|
|
type: int
|
|
default: 10294
|
|
required: true
|
|
- variable: mux-udp
|
|
label: "mux-udp service"
|
|
schema:
|
|
additional_attrs: true
|
|
type: dict
|
|
attrs:
|
|
# Include{serviceSelectorLoadBalancer}
|
|
# Include{serviceSelectorExtras}
|
|
- variable: mux-udp
|
|
label: "mux-udp Service Port Configuration"
|
|
schema:
|
|
additional_attrs: true
|
|
type: dict
|
|
attrs:
|
|
- variable: port
|
|
label: "Port"
|
|
description: "This port exposes the container port on the service"
|
|
schema:
|
|
type: int
|
|
default: 52100
|
|
required: true
|
|
- variable: mux-tcp
|
|
label: "mux-tcp service"
|
|
schema:
|
|
additional_attrs: true
|
|
type: dict
|
|
attrs:
|
|
# Include{serviceSelectorLoadBalancer}
|
|
# Include{serviceSelectorExtras}
|
|
- variable: mux-tcp
|
|
label: "mux-tcp Service Port Configuration"
|
|
schema:
|
|
additional_attrs: true
|
|
type: dict
|
|
attrs:
|
|
- variable: port
|
|
label: "Port"
|
|
description: "This port exposes the container port on the service"
|
|
schema:
|
|
type: int
|
|
default: 52100
|
|
required: true
|
|
# Include{serviceExpertRoot}
|
|
default: false
|
|
# Include{serviceExpert}
|
|
# Include{serviceList}
|
|
# Include{persistenceList}
|
|
# Include{ingressRoot}
|
|
- variable: main
|
|
label: "Main Ingress"
|
|
schema:
|
|
additional_attrs: true
|
|
type: dict
|
|
attrs:
|
|
# Include{ingressDefault}
|
|
# Include{ingressTLS}
|
|
# Include{ingressTraefik}
|
|
# Include{ingressList}
|
|
# Include{securityContextRoot}
|
|
|
|
- variable: runAsUser
|
|
label: "runAsUser"
|
|
description: "The UserID of the user running the application"
|
|
schema:
|
|
type: int
|
|
default: 0
|
|
- variable: runAsGroup
|
|
label: "runAsGroup"
|
|
description: "The groupID of the user running the application"
|
|
schema:
|
|
type: int
|
|
default: 0
|
|
# Include{securityContextContainer}
|
|
# Include{securityContextAdvanced}
|
|
# Include{securityContextPod}
|
|
- variable: fsGroup
|
|
label: "fsGroup"
|
|
description: "The group that should own ALL storage."
|
|
schema:
|
|
type: int
|
|
default: 568
|
|
|
|
# Include{resources}
|
|
# Include{advanced}
|
|
# Include{addons}
|
|
# Include{codeserver}
|
|
# Include{netshoot}
|
|
# Include{vpn}
|
|
# Include{documentation}
|