mirror of
https://github.com/alexbelgium/hassio-addons.git
synced 2026-01-09 17:31:03 +01:00
fix: auto-fix linting issues
This commit is contained in:
committed by
github-actions[bot]
parent
205a7e9b84
commit
0d3c7619b4
44
.templates/bashio-standalone.sh
Normal file → Executable file
44
.templates/bashio-standalone.sh
Normal file → Executable file
@@ -29,9 +29,12 @@ _bashio_color() {
|
|||||||
|
|
||||||
_bashio_log() {
|
_bashio_log() {
|
||||||
# $1=color name, $2...=msg
|
# $1=color name, $2...=msg
|
||||||
local c="$1"; shift
|
local c="$1"
|
||||||
local pre; pre="$(_bashio_color "$c")"
|
shift
|
||||||
local rst; rst="$(_bashio_color reset)"
|
local pre
|
||||||
|
pre="$(_bashio_color "$c")"
|
||||||
|
local rst
|
||||||
|
rst="$(_bashio_color reset)"
|
||||||
printf '%s%s%s\n' "$pre" "$*" "$rst"
|
printf '%s%s%s\n' "$pre" "$*" "$rst"
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -143,7 +146,8 @@ bashio::addon.version() { printf '%s' "${BUILD_VERSION:-1.0}"; }
|
|||||||
bashio::addon.version_latest() { printf '%s' "${ADDON_VERSION_LATEST:-${BUILD_VERSION:-1.0}}"; }
|
bashio::addon.version_latest() { printf '%s' "${ADDON_VERSION_LATEST:-${BUILD_VERSION:-1.0}}"; }
|
||||||
bashio::addon.update_available() {
|
bashio::addon.update_available() {
|
||||||
if [ "${ADDON_VERSION_LATEST:-}" != "" ] && [ "${ADDON_VERSION_LATEST:-}" != "${BUILD_VERSION:-}" ]; then
|
if [ "${ADDON_VERSION_LATEST:-}" != "" ] && [ "${ADDON_VERSION_LATEST:-}" != "${BUILD_VERSION:-}" ]; then
|
||||||
printf '%s' "true"; return 0
|
printf '%s' "true"
|
||||||
|
return 0
|
||||||
fi
|
fi
|
||||||
printf '%s' "false"
|
printf '%s' "false"
|
||||||
}
|
}
|
||||||
@@ -196,8 +200,14 @@ bashio::config() {
|
|||||||
printf '%s' "${v:-}"
|
printf '%s' "${v:-}"
|
||||||
}
|
}
|
||||||
|
|
||||||
bashio::config.has_value() { local k="$1"; [ -n "$(bashio::config "$k")" ]; }
|
bashio::config.has_value() {
|
||||||
bashio::config.true() { local k="$1"; _bashio_is_true "$(bashio::config "$k")"; }
|
local k="$1"
|
||||||
|
[ -n "$(bashio::config "$k")" ]
|
||||||
|
}
|
||||||
|
bashio::config.true() {
|
||||||
|
local k="$1"
|
||||||
|
_bashio_is_true "$(bashio::config "$k")"
|
||||||
|
}
|
||||||
|
|
||||||
# Some add-ons call "require.ssl" (noop by default)
|
# Some add-ons call "require.ssl" (noop by default)
|
||||||
bashio::config.require.ssl() { printf '%s' "${REQUIRE_SSL:-true}"; }
|
bashio::config.require.ssl() { printf '%s' "${REQUIRE_SSL:-true}"; }
|
||||||
@@ -259,12 +269,18 @@ mkdir -p "$_BASHIO_CACHE_DIR"
|
|||||||
|
|
||||||
bashio::cache.exists() { [ -f "$_BASHIO_CACHE_DIR/${1}.cache" ]; }
|
bashio::cache.exists() { [ -f "$_BASHIO_CACHE_DIR/${1}.cache" ]; }
|
||||||
bashio::cache.get() { [ -f "$_BASHIO_CACHE_DIR/${1}.cache" ] && cat "$_BASHIO_CACHE_DIR/${1}.cache"; }
|
bashio::cache.get() { [ -f "$_BASHIO_CACHE_DIR/${1}.cache" ] && cat "$_BASHIO_CACHE_DIR/${1}.cache"; }
|
||||||
bashio::cache.set() { mkdir -p "$_BASHIO_CACHE_DIR"; printf '%s' "${2:-}" > "$_BASHIO_CACHE_DIR/${1}.cache"; }
|
bashio::cache.set() {
|
||||||
|
mkdir -p "$_BASHIO_CACHE_DIR"
|
||||||
|
printf '%s' "${2:-}" > "$_BASHIO_CACHE_DIR/${1}.cache"
|
||||||
|
}
|
||||||
|
|
||||||
# Filesystem helpers frequently used
|
# Filesystem helpers frequently used
|
||||||
bashio::fs.file_exists() { [ -f "$1" ]; }
|
bashio::fs.file_exists() { [ -f "$1" ]; }
|
||||||
bashio::fs.directory_exists() { [ -d "$1" ]; } # already defined earlier; keep if present
|
bashio::fs.directory_exists() { [ -d "$1" ]; } # already defined earlier; keep if present
|
||||||
bashio::fs.file_contains() { local f="$1" p="$2"; [ -f "$f" ] && grep -q -- "$p" "$f"; }
|
bashio::fs.file_contains() {
|
||||||
|
local f="$1" p="$2"
|
||||||
|
[ -f "$f" ] && grep -q -- "$p" "$f"
|
||||||
|
}
|
||||||
|
|
||||||
# jq wrapper (some add-ons call bashio::jq)
|
# jq wrapper (some add-ons call bashio::jq)
|
||||||
bashio::jq() { command -v jq > /dev/null 2>&1 && jq "$@"; }
|
bashio::jq() { command -v jq > /dev/null 2>&1 && jq "$@"; }
|
||||||
@@ -306,7 +322,8 @@ bashio::config.exists() {
|
|||||||
bashio::addon.option() {
|
bashio::addon.option() {
|
||||||
local key="$1" value="${2-__BASHIO_UNSET__}" file="${STANDALONE_OPTIONS_JSON:-}"
|
local key="$1" value="${2-__BASHIO_UNSET__}" file="${STANDALONE_OPTIONS_JSON:-}"
|
||||||
if [ -n "$file" ] && command -v jq > /dev/null 2>&1; then
|
if [ -n "$file" ] && command -v jq > /dev/null 2>&1; then
|
||||||
local tmp; tmp="$(mktemp)"
|
local tmp
|
||||||
|
tmp="$(mktemp)"
|
||||||
if [ "$value" = "__BASHIO_UNSET__" ]; then
|
if [ "$value" = "__BASHIO_UNSET__" ]; then
|
||||||
jq --arg k "$key" 'delpath(($k|split(".")))' "$file" > "$tmp" && mv "$tmp" "$file"
|
jq --arg k "$key" 'delpath(($k|split(".")))' "$file" > "$tmp" && mv "$tmp" "$file"
|
||||||
else
|
else
|
||||||
@@ -322,7 +339,8 @@ bashio::addon.option() {
|
|||||||
|
|
||||||
# services.available : check if we can resolve at least a host for the service
|
# services.available : check if we can resolve at least a host for the service
|
||||||
bashio::services.available() {
|
bashio::services.available() {
|
||||||
local svc="$1" host; host="$(bashio::services "$svc" "host")"
|
local svc="$1" host
|
||||||
|
host="$(bashio::services "$svc" "host")"
|
||||||
[ -n "$host" ]
|
[ -n "$host" ]
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -332,7 +350,11 @@ bashio::var.has_value() { [ -n "${1:-}" ]; } # already present; keep if defined
|
|||||||
|
|
||||||
# exits used by many add-ons
|
# exits used by many add-ons
|
||||||
bashio::exit.ok() { exit 0; }
|
bashio::exit.ok() { exit 0; }
|
||||||
bashio::exit.nok() { local m="${1:-}"; [ -n "$m" ] && bashio::log.red "$m"; exit 1; }
|
bashio::exit.nok() {
|
||||||
|
local m="${1:-}"
|
||||||
|
[ -n "$m" ] && bashio::log.red "$m"
|
||||||
|
exit 1
|
||||||
|
}
|
||||||
|
|
||||||
# core.check : Supervisor does a config check; allow an overridable command
|
# core.check : Supervisor does a config check; allow an overridable command
|
||||||
# Set STANDALONE_CORE_CHECK_CMD="hass --script check_config -c /config" to enable
|
# Set STANDALONE_CORE_CHECK_CMD="hass --script check_config -c /config" to enable
|
||||||
|
|||||||
@@ -3,7 +3,6 @@
|
|||||||
|
|
||||||
set -e # Exit immediately if a command exits with a non-zero status
|
set -e # Exit immediately if a command exits with a non-zero status
|
||||||
|
|
||||||
|
|
||||||
# Detect if this is PID1 (main container process) — do this once at the start
|
# Detect if this is PID1 (main container process) — do this once at the start
|
||||||
PID1=false
|
PID1=false
|
||||||
if [ "$$" -eq 1 ]; then
|
if [ "$$" -eq 1 ]; then
|
||||||
@@ -103,7 +102,8 @@ if $PID1; then
|
|||||||
sed -i -E 's|s6-svwait[[:space:]]+-d[[:space:]]+([^[:space:]]+)|bash -c '\''while [ -f \1/supervise/pid ]; do sleep 0.5; done'\''|g' "$runfile"
|
sed -i -E 's|s6-svwait[[:space:]]+-d[[:space:]]+([^[:space:]]+)|bash -c '\''while [ -f \1/supervise/pid ]; do sleep 0.5; done'\''|g' "$runfile"
|
||||||
sed -i -E 's|s6-svwait[[:space:]]+-u[[:space:]]+([^[:space:]]+)|bash -c '\''until [ -f \1/supervise/pid ]; do sleep 0.5; done'\''|g' "$runfile"
|
sed -i -E 's|s6-svwait[[:space:]]+-u[[:space:]]+([^[:space:]]+)|bash -c '\''until [ -f \1/supervise/pid ]; do sleep 0.5; done'\''|g' "$runfile"
|
||||||
chmod +x "$runfile"
|
chmod +x "$runfile"
|
||||||
( exec "$runfile" ) & true
|
(exec "$runfile") &
|
||||||
|
true
|
||||||
done
|
done
|
||||||
shopt -u nullglob
|
shopt -u nullglob
|
||||||
fi
|
fi
|
||||||
|
|||||||
@@ -73,9 +73,9 @@ if [ -n "${ALSA_CARD:-}" ]; then
|
|||||||
fi
|
fi
|
||||||
|
|
||||||
# Define permissions for audio
|
# Define permissions for audio
|
||||||
AUDIO_GID=$(stat -c %g /dev/snd/* | head -n1) && \
|
AUDIO_GID=$(stat -c %g /dev/snd/* | head -n1) \
|
||||||
( groupmod -o -g "$AUDIO_GID" audio 2>/dev/null || groupadd -o -g "$AUDIO_GID" audio || true ) && \
|
&& (groupmod -o -g "$AUDIO_GID" audio 2> /dev/null || groupadd -o -g "$AUDIO_GID" audio || true) \
|
||||||
usermod -aG audio "${USER:-pi}" || true
|
&& usermod -aG audio "${USER:-pi}" || true
|
||||||
|
|
||||||
# Fix timezone as per installer
|
# Fix timezone as per installer
|
||||||
CURRENT_TIMEZONE="$(timedatectl show --value --property=Timezone)"
|
CURRENT_TIMEZONE="$(timedatectl show --value --property=Timezone)"
|
||||||
|
|||||||
@@ -16,12 +16,12 @@
|
|||||||
],
|
],
|
||||||
"name": "WIP - Collabora",
|
"name": "WIP - Collabora",
|
||||||
"options": {
|
"options": {
|
||||||
"domain": "",
|
|
||||||
"username": "",
|
|
||||||
"password": "",
|
|
||||||
"aliasgroup1": "",
|
"aliasgroup1": "",
|
||||||
"dictionaries": "",
|
"dictionaries": "",
|
||||||
"extra_params": ""
|
"domain": "",
|
||||||
|
"extra_params": "",
|
||||||
|
"password": "",
|
||||||
|
"username": ""
|
||||||
},
|
},
|
||||||
"ports": {
|
"ports": {
|
||||||
"9980/tcp": 9980
|
"9980/tcp": 9980
|
||||||
@@ -30,13 +30,13 @@
|
|||||||
"9980/tcp": "Web interface"
|
"9980/tcp": "Web interface"
|
||||||
},
|
},
|
||||||
"schema": {
|
"schema": {
|
||||||
"domain": "str?",
|
"TZ": "str?",
|
||||||
"username": "str?",
|
|
||||||
"password": "password?",
|
|
||||||
"aliasgroup1": "str?",
|
"aliasgroup1": "str?",
|
||||||
"dictionaries": "str?",
|
"dictionaries": "str?",
|
||||||
|
"domain": "str?",
|
||||||
"extra_params": "str?",
|
"extra_params": "str?",
|
||||||
"TZ": "str?"
|
"password": "password?",
|
||||||
|
"username": "str?"
|
||||||
},
|
},
|
||||||
"slug": "collabora",
|
"slug": "collabora",
|
||||||
"url": "https://github.com/alexbelgium/hassio-addons",
|
"url": "https://github.com/alexbelgium/hassio-addons",
|
||||||
|
|||||||
0
emby/rootfs/etc/services.d/nginx/run
Normal file → Executable file
0
emby/rootfs/etc/services.d/nginx/run
Normal file → Executable file
0
emby_beta/rootfs/etc/services.d/nginx/run
Normal file → Executable file
0
emby_beta/rootfs/etc/services.d/nginx/run
Normal file → Executable file
@@ -57,12 +57,12 @@ The web UI can be found at `<your-ip>:8071` or through the Home Assistant sideba
|
|||||||
| `keyfile` | str | `privkey.pem` | SSL private key file (in `/ssl/`) |
|
| `keyfile` | str | `privkey.pem` | SSL private key file (in `/ssl/`) |
|
||||||
| `NoAuth` | bool | `true` | Disable authentication (resets database when changed) |
|
| `NoAuth` | bool | `true` | Disable authentication (resets database when changed) |
|
||||||
| `disable_thumbnails` | bool | `true` | Disable thumbnail generation for improved performance |
|
| `disable_thumbnails` | bool | `true` | Disable thumbnail generation for improved performance |
|
||||||
| `base_folder` | str | *(optional)* | Root folder for file browser (defaults to all mapped folders) |
|
| `base_folder` | str | _(optional)_ | Root folder for file browser (defaults to all mapped folders) |
|
||||||
| `localdisks` | str | *(optional)* | Local drives to mount (e.g., `sda1,sdb1,MYNAS`) |
|
| `localdisks` | str | _(optional)_ | Local drives to mount (e.g., `sda1,sdb1,MYNAS`) |
|
||||||
| `networkdisks` | str | *(optional)* | SMB shares to mount (e.g., `//SERVER/SHARE`) |
|
| `networkdisks` | str | _(optional)_ | SMB shares to mount (e.g., `//SERVER/SHARE`) |
|
||||||
| `cifsusername` | str | *(optional)* | SMB username for network shares |
|
| `cifsusername` | str | _(optional)_ | SMB username for network shares |
|
||||||
| `cifspassword` | str | *(optional)* | SMB password for network shares |
|
| `cifspassword` | str | _(optional)_ | SMB password for network shares |
|
||||||
| `cifsdomain` | str | *(optional)* | SMB domain for network shares |
|
| `cifsdomain` | str | _(optional)_ | SMB domain for network shares |
|
||||||
|
|
||||||
### Example Configuration
|
### Example Configuration
|
||||||
|
|
||||||
|
|||||||
@@ -78,12 +78,13 @@ environment:
|
|||||||
}
|
}
|
||||||
image: ghcr.io/alexbelgium/grampsweb-{arch}
|
image: ghcr.io/alexbelgium/grampsweb-{arch}
|
||||||
init: false
|
init: false
|
||||||
options: {
|
options:
|
||||||
|
{
|
||||||
"CELERY_NUM_WORKERS": 2,
|
"CELERY_NUM_WORKERS": 2,
|
||||||
"GUNICORN_NUM_WORKERS": 8,
|
"GUNICORN_NUM_WORKERS": 8,
|
||||||
"certfile": "fullchain.pem",
|
"certfile": "fullchain.pem",
|
||||||
"keyfile": "privkey.pem",
|
"keyfile": "privkey.pem",
|
||||||
"ssl": false
|
"ssl": false,
|
||||||
}
|
}
|
||||||
map:
|
map:
|
||||||
- type: addon_config
|
- type: addon_config
|
||||||
|
|||||||
0
nextcloud/rootfs/etc/services.d/cron/run
Normal file → Executable file
0
nextcloud/rootfs/etc/services.d/cron/run
Normal file → Executable file
0
nzbget/rootfs/etc/services.d/nginx/run
Normal file → Executable file
0
nzbget/rootfs/etc/services.d/nginx/run
Normal file → Executable file
@@ -170,10 +170,10 @@
|
|||||||
"cifspassword": "str?",
|
"cifspassword": "str?",
|
||||||
"cifsusername": "str?",
|
"cifsusername": "str?",
|
||||||
"claim": "str",
|
"claim": "str",
|
||||||
|
"clear_codecs_folder": "bool?",
|
||||||
"localdisks": "str?",
|
"localdisks": "str?",
|
||||||
"networkdisks": "str?",
|
"networkdisks": "str?",
|
||||||
"skip_permissions_check": "bool?",
|
"skip_permissions_check": "bool?",
|
||||||
"clear_codecs_folder": "bool?",
|
|
||||||
"smbv1": "bool?"
|
"smbv1": "bool?"
|
||||||
},
|
},
|
||||||
"slug": "plex_nas",
|
"slug": "plex_nas",
|
||||||
|
|||||||
0
qbittorrent/rootfs/etc/s6-overlay/s6-rc.d/svc-qbittorrent/run
Normal file → Executable file
0
qbittorrent/rootfs/etc/s6-overlay/s6-rc.d/svc-qbittorrent/run
Normal file → Executable file
0
qbittorrent/rootfs/etc/services.d/nginx/run
Normal file → Executable file
0
qbittorrent/rootfs/etc/services.d/nginx/run
Normal file → Executable file
0
qbittorrent/rootfs/etc/services.d/timer/run
Normal file → Executable file
0
qbittorrent/rootfs/etc/services.d/timer/run
Normal file → Executable file
0
scrutiny/rootfs/etc/services.d/nginx/run
Normal file → Executable file
0
scrutiny/rootfs/etc/services.d/nginx/run
Normal file → Executable file
0
sonarr/rootfs/etc/services.d/nginx/run
Normal file → Executable file
0
sonarr/rootfs/etc/services.d/nginx/run
Normal file → Executable file
@@ -98,6 +98,9 @@
|
|||||||
"80/tcp": "Web interface"
|
"80/tcp": "Web interface"
|
||||||
},
|
},
|
||||||
"schema": {
|
"schema": {
|
||||||
|
"AI_API_KEY": "str?",
|
||||||
|
"AI_MODEL_NAME": "str?",
|
||||||
|
"AI_RATELIMIT": "str?",
|
||||||
"ALLOWED_HOSTS": "str?",
|
"ALLOWED_HOSTS": "str?",
|
||||||
"DB_TYPE": "list(sqlite|postgresql_external)",
|
"DB_TYPE": "list(sqlite|postgresql_external)",
|
||||||
"DEBUG": "list(1|0)",
|
"DEBUG": "list(1|0)",
|
||||||
@@ -107,9 +110,6 @@
|
|||||||
"POSTGRES_PORT": "str?",
|
"POSTGRES_PORT": "str?",
|
||||||
"POSTGRES_USER": "str?",
|
"POSTGRES_USER": "str?",
|
||||||
"SECRET_KEY": "str",
|
"SECRET_KEY": "str",
|
||||||
"AI_MODEL_NAME": "str?",
|
|
||||||
"AI_API_KEY": "str?",
|
|
||||||
"AI_RATELIMIT": "str?",
|
|
||||||
"externalfiles_folder": "str?"
|
"externalfiles_folder": "str?"
|
||||||
},
|
},
|
||||||
"services": [
|
"services": [
|
||||||
|
|||||||
0
zzz_archived_bitwarden/rootfs/etc/services.d/bitwarden/run
Normal file → Executable file
0
zzz_archived_bitwarden/rootfs/etc/services.d/bitwarden/run
Normal file → Executable file
0
zzz_archived_bitwarden/rootfs/etc/services.d/nginx/run
Normal file → Executable file
0
zzz_archived_bitwarden/rootfs/etc/services.d/nginx/run
Normal file → Executable file
Reference in New Issue
Block a user