263 lines
9.0 KiB
YAML
263 lines
9.0 KiB
YAML
# Include{groups}
|
|
portals:
|
|
open:
|
|
# Include{portalLink}
|
|
questions:
|
|
# Include{global}
|
|
- variable: imageSelector
|
|
group: "Container Image"
|
|
label: "Select Image"
|
|
schema:
|
|
type: string
|
|
default: "image"
|
|
enum:
|
|
- value: "image"
|
|
description: "Firefox"
|
|
- value: "imageBrave"
|
|
description: "Brave"
|
|
- value: "imageChrome"
|
|
description: "Chrome"
|
|
- value: "imageChromium"
|
|
description: "Chromium"
|
|
- value: "imageEdge"
|
|
description: "Edge"
|
|
- value: "imageRemmina"
|
|
description: "Remmina"
|
|
- value: "imageTor"
|
|
description: "Tor"
|
|
- value: "imageVivaldi"
|
|
description: "Vivaldi"
|
|
- value: "imageVlc"
|
|
description: "Vlc"
|
|
- value: "imageVncviewer"
|
|
description: "Vncviewer"
|
|
- value: "imageXfce"
|
|
description: "Xfce"
|
|
# Include{controller}
|
|
# Include{controllerDeployment}
|
|
# Include{replicas}
|
|
# Include{replica1}
|
|
# Include{strategy}
|
|
# Include{recreate}
|
|
# Include{controllerExpert}
|
|
# Include{controllerExpertExtraArgs}
|
|
- variable: secretEnv
|
|
group: "Container Configuration"
|
|
label: "Image Secrets"
|
|
schema:
|
|
additional_attrs: true
|
|
type: dict
|
|
attrs:
|
|
- variable: NEKO_PASSWORD
|
|
label: "NEKO_PASSWORD"
|
|
schema:
|
|
type: string
|
|
default: ""
|
|
private: true
|
|
- variable: NEKO_PASSWORD_ADMIN
|
|
label: "NEKO_PASSWORD_ADMIN"
|
|
schema:
|
|
type: string
|
|
default: ""
|
|
private: true
|
|
- variable: env
|
|
group: "Container Configuration"
|
|
label: "Image Environment"
|
|
schema:
|
|
additional_attrs: true
|
|
type: dict
|
|
attrs:
|
|
- variable: NEKO_SCREEN
|
|
label: "NEKO_SCREEN"
|
|
description: "Resolution after startup. Only Admins can change this later."
|
|
schema:
|
|
type: string
|
|
default: "1920x1080@30"
|
|
- variable: NEKO_CONTROL_PROTECTION
|
|
label: "NEKO_CONTROL_PROTECTION"
|
|
description: "Control protection means, users can gain control only if at least one admin is in the room."
|
|
schema:
|
|
type: boolean
|
|
default: false
|
|
- variable: NEKO_IMPLICIT_CONTROL
|
|
label: "NEKO_IMPLICIT_CONTROL"
|
|
description: "If enabled members can gain control implicitly, they don't need to request control."
|
|
schema:
|
|
type: boolean
|
|
default: false
|
|
- variable: NEKO_PROXY
|
|
label: "NEKO_PROXY"
|
|
description: "Enable reverse proxy mode, so that neko trusts X-Forwarded-For headers."
|
|
schema:
|
|
type: boolean
|
|
default: false
|
|
- variable: NEKO_LOCKS
|
|
label: "NEKO_LOCKS"
|
|
description: "Resources, that will be locked when starting, separated by whitespace."
|
|
schema:
|
|
type: string
|
|
default: "192.168.1.x"
|
|
- variable: NEKO_NAT1TO1
|
|
label: "NEKO_NAT1TO1"
|
|
description: "Enter the IP of your TrueNAS-Server"
|
|
schema:
|
|
type: string
|
|
default: "192.168.1.x"
|
|
- variable: NEKO_IPFETCH
|
|
label: "NEKO_IPFETCH"
|
|
description: "Automatically fetch IP address from given URL when NEKO_NAT1TO1 is not specified."
|
|
schema:
|
|
type: string
|
|
default: "http://checkip.amazonaws.com"
|
|
# Include{containerConfig}
|
|
# Include{serviceRoot}
|
|
- variable: main
|
|
label: "Main Service"
|
|
description: "The Primary service on which the healthcheck runs, often the webUI"
|
|
schema:
|
|
additional_attrs: true
|
|
type: dict
|
|
attrs:
|
|
# Include{serviceSelectorSimple}
|
|
# Include{serviceSelectorExtras}
|
|
- variable: main
|
|
label: "Main Service Port Configuration"
|
|
schema:
|
|
additional_attrs: true
|
|
type: dict
|
|
attrs:
|
|
- variable: port
|
|
label: "Port"
|
|
description: "This port exposes the container port on the service"
|
|
schema:
|
|
type: int
|
|
default: 10294
|
|
required: true
|
|
# Include{advancedPortHTTP}
|
|
- variable: targetPort
|
|
label: "Target Port"
|
|
description: "The internal(!) port on the container the Application runs on"
|
|
schema:
|
|
type: int
|
|
default: 8080
|
|
- variable: mux-udp
|
|
label: "mux-udp service"
|
|
schema:
|
|
additional_attrs: true
|
|
type: dict
|
|
attrs:
|
|
# Include{serviceSelectorSimple}
|
|
# Include{serviceSelectorExtras}
|
|
- variable: mux-udp
|
|
label: "mux-udp Service Port Configuration"
|
|
schema:
|
|
additional_attrs: true
|
|
type: dict
|
|
attrs:
|
|
- variable: port
|
|
label: "Port"
|
|
description: "This port exposes the container port on the service"
|
|
schema:
|
|
type: int
|
|
default: 52100
|
|
required: true
|
|
# Include{advancedPortUDP}
|
|
- variable: targetPort
|
|
label: "Target Port"
|
|
description: "The internal(!) port on the container the Application runs on"
|
|
schema:
|
|
type: int
|
|
default: 52100
|
|
- variable: mux-tcp
|
|
label: "mux-tcp service"
|
|
schema:
|
|
additional_attrs: true
|
|
type: dict
|
|
attrs:
|
|
# Include{serviceSelectorSimple}
|
|
# Include{serviceSelectorExtras}
|
|
- variable: mux-tcp
|
|
label: "mux-tcp Service Port Configuration"
|
|
schema:
|
|
additional_attrs: true
|
|
type: dict
|
|
attrs:
|
|
- variable: port
|
|
label: "Port"
|
|
description: "This port exposes the container port on the service"
|
|
schema:
|
|
type: int
|
|
default: 52100
|
|
required: true
|
|
# Include{advancedPortTCP}
|
|
- variable: targetPort
|
|
label: "Target Port"
|
|
description: "The internal(!) port on the container the Application runs on"
|
|
schema:
|
|
type: int
|
|
default: 52100
|
|
# Include{serviceExpertRoot}
|
|
default: false
|
|
# Include{serviceExpert}
|
|
# Include{serviceList}
|
|
# Include{persistenceList}
|
|
# Include{ingressRoot}
|
|
- variable: main
|
|
label: "Main Ingress"
|
|
schema:
|
|
additional_attrs: true
|
|
type: dict
|
|
attrs:
|
|
# Include{ingressDefault}
|
|
# Include{ingressTLS}
|
|
# Include{ingressTraefik}
|
|
# Include{ingressExpert}
|
|
# Include{ingressList}
|
|
# Include{security}
|
|
# Include{securityContextAdvancedRoot}
|
|
- variable: privileged
|
|
label: "Privileged mode"
|
|
schema:
|
|
type: boolean
|
|
default: false
|
|
- variable: readOnlyRootFilesystem
|
|
label: "ReadOnly Root Filesystem"
|
|
schema:
|
|
type: boolean
|
|
default: false
|
|
- variable: allowPrivilegeEscalation
|
|
label: "Allow Privilege Escalation"
|
|
schema:
|
|
type: boolean
|
|
default: false
|
|
- variable: runAsNonRoot
|
|
label: "runAsNonRoot"
|
|
schema:
|
|
type: boolean
|
|
default: false
|
|
# Include{securityContextAdvanced}
|
|
# Include{podSecurityContextRoot}
|
|
- variable: runAsUser
|
|
label: "runAsUser"
|
|
description: "The UserID of the user running the application"
|
|
schema:
|
|
type: int
|
|
default: 0
|
|
- variable: runAsGroup
|
|
label: "runAsGroup"
|
|
description: The groupID this App of the user running the application"
|
|
schema:
|
|
type: int
|
|
default: 0
|
|
- variable: fsGroup
|
|
label: "fsGroup"
|
|
description: "The group that should own ALL storage."
|
|
schema:
|
|
type: int
|
|
default: 568
|
|
# Include{podSecurityContextAdvanced}
|
|
# Include{resources}
|
|
# Include{advanced}
|
|
# Include{addons}
|
|
# Include{documentation}
|