mirror of
https://github.com/alexbelgium/hassio-addons.git
synced 2026-01-09 09:21:03 +01:00
fix: auto-fix linting issues
This commit is contained in:
committed by
github-actions[bot]
parent
205a7e9b84
commit
0d3c7619b4
44
.templates/bashio-standalone.sh
Normal file → Executable file
44
.templates/bashio-standalone.sh
Normal file → Executable file
@@ -29,9 +29,12 @@ _bashio_color() {
|
||||
|
||||
_bashio_log() {
|
||||
# $1=color name, $2...=msg
|
||||
local c="$1"; shift
|
||||
local pre; pre="$(_bashio_color "$c")"
|
||||
local rst; rst="$(_bashio_color reset)"
|
||||
local c="$1"
|
||||
shift
|
||||
local pre
|
||||
pre="$(_bashio_color "$c")"
|
||||
local rst
|
||||
rst="$(_bashio_color reset)"
|
||||
printf '%s%s%s\n' "$pre" "$*" "$rst"
|
||||
}
|
||||
|
||||
@@ -143,7 +146,8 @@ bashio::addon.version() { printf '%s' "${BUILD_VERSION:-1.0}"; }
|
||||
bashio::addon.version_latest() { printf '%s' "${ADDON_VERSION_LATEST:-${BUILD_VERSION:-1.0}}"; }
|
||||
bashio::addon.update_available() {
|
||||
if [ "${ADDON_VERSION_LATEST:-}" != "" ] && [ "${ADDON_VERSION_LATEST:-}" != "${BUILD_VERSION:-}" ]; then
|
||||
printf '%s' "true"; return 0
|
||||
printf '%s' "true"
|
||||
return 0
|
||||
fi
|
||||
printf '%s' "false"
|
||||
}
|
||||
@@ -196,8 +200,14 @@ bashio::config() {
|
||||
printf '%s' "${v:-}"
|
||||
}
|
||||
|
||||
bashio::config.has_value() { local k="$1"; [ -n "$(bashio::config "$k")" ]; }
|
||||
bashio::config.true() { local k="$1"; _bashio_is_true "$(bashio::config "$k")"; }
|
||||
bashio::config.has_value() {
|
||||
local k="$1"
|
||||
[ -n "$(bashio::config "$k")" ]
|
||||
}
|
||||
bashio::config.true() {
|
||||
local k="$1"
|
||||
_bashio_is_true "$(bashio::config "$k")"
|
||||
}
|
||||
|
||||
# Some add-ons call "require.ssl" (noop by default)
|
||||
bashio::config.require.ssl() { printf '%s' "${REQUIRE_SSL:-true}"; }
|
||||
@@ -259,12 +269,18 @@ mkdir -p "$_BASHIO_CACHE_DIR"
|
||||
|
||||
bashio::cache.exists() { [ -f "$_BASHIO_CACHE_DIR/${1}.cache" ]; }
|
||||
bashio::cache.get() { [ -f "$_BASHIO_CACHE_DIR/${1}.cache" ] && cat "$_BASHIO_CACHE_DIR/${1}.cache"; }
|
||||
bashio::cache.set() { mkdir -p "$_BASHIO_CACHE_DIR"; printf '%s' "${2:-}" > "$_BASHIO_CACHE_DIR/${1}.cache"; }
|
||||
bashio::cache.set() {
|
||||
mkdir -p "$_BASHIO_CACHE_DIR"
|
||||
printf '%s' "${2:-}" > "$_BASHIO_CACHE_DIR/${1}.cache"
|
||||
}
|
||||
|
||||
# Filesystem helpers frequently used
|
||||
bashio::fs.file_exists() { [ -f "$1" ]; }
|
||||
bashio::fs.directory_exists() { [ -d "$1" ]; } # already defined earlier; keep if present
|
||||
bashio::fs.file_contains() { local f="$1" p="$2"; [ -f "$f" ] && grep -q -- "$p" "$f"; }
|
||||
bashio::fs.file_contains() {
|
||||
local f="$1" p="$2"
|
||||
[ -f "$f" ] && grep -q -- "$p" "$f"
|
||||
}
|
||||
|
||||
# jq wrapper (some add-ons call bashio::jq)
|
||||
bashio::jq() { command -v jq > /dev/null 2>&1 && jq "$@"; }
|
||||
@@ -306,7 +322,8 @@ bashio::config.exists() {
|
||||
bashio::addon.option() {
|
||||
local key="$1" value="${2-__BASHIO_UNSET__}" file="${STANDALONE_OPTIONS_JSON:-}"
|
||||
if [ -n "$file" ] && command -v jq > /dev/null 2>&1; then
|
||||
local tmp; tmp="$(mktemp)"
|
||||
local tmp
|
||||
tmp="$(mktemp)"
|
||||
if [ "$value" = "__BASHIO_UNSET__" ]; then
|
||||
jq --arg k "$key" 'delpath(($k|split(".")))' "$file" > "$tmp" && mv "$tmp" "$file"
|
||||
else
|
||||
@@ -322,7 +339,8 @@ bashio::addon.option() {
|
||||
|
||||
# services.available : check if we can resolve at least a host for the service
|
||||
bashio::services.available() {
|
||||
local svc="$1" host; host="$(bashio::services "$svc" "host")"
|
||||
local svc="$1" host
|
||||
host="$(bashio::services "$svc" "host")"
|
||||
[ -n "$host" ]
|
||||
}
|
||||
|
||||
@@ -332,7 +350,11 @@ bashio::var.has_value() { [ -n "${1:-}" ]; } # already present; keep if defined
|
||||
|
||||
# exits used by many add-ons
|
||||
bashio::exit.ok() { exit 0; }
|
||||
bashio::exit.nok() { local m="${1:-}"; [ -n "$m" ] && bashio::log.red "$m"; exit 1; }
|
||||
bashio::exit.nok() {
|
||||
local m="${1:-}"
|
||||
[ -n "$m" ] && bashio::log.red "$m"
|
||||
exit 1
|
||||
}
|
||||
|
||||
# core.check : Supervisor does a config check; allow an overridable command
|
||||
# Set STANDALONE_CORE_CHECK_CMD="hass --script check_config -c /config" to enable
|
||||
|
||||
@@ -3,7 +3,6 @@
|
||||
|
||||
set -e # Exit immediately if a command exits with a non-zero status
|
||||
|
||||
|
||||
# Detect if this is PID1 (main container process) — do this once at the start
|
||||
PID1=false
|
||||
if [ "$$" -eq 1 ]; then
|
||||
@@ -103,7 +102,8 @@ if $PID1; then
|
||||
sed -i -E 's|s6-svwait[[:space:]]+-d[[:space:]]+([^[:space:]]+)|bash -c '\''while [ -f \1/supervise/pid ]; do sleep 0.5; done'\''|g' "$runfile"
|
||||
sed -i -E 's|s6-svwait[[:space:]]+-u[[:space:]]+([^[:space:]]+)|bash -c '\''until [ -f \1/supervise/pid ]; do sleep 0.5; done'\''|g' "$runfile"
|
||||
chmod +x "$runfile"
|
||||
( exec "$runfile" ) & true
|
||||
(exec "$runfile") &
|
||||
true
|
||||
done
|
||||
shopt -u nullglob
|
||||
fi
|
||||
|
||||
@@ -73,9 +73,9 @@ if [ -n "${ALSA_CARD:-}" ]; then
|
||||
fi
|
||||
|
||||
# Define permissions for audio
|
||||
AUDIO_GID=$(stat -c %g /dev/snd/* | head -n1) && \
|
||||
( groupmod -o -g "$AUDIO_GID" audio 2>/dev/null || groupadd -o -g "$AUDIO_GID" audio || true ) && \
|
||||
usermod -aG audio "${USER:-pi}" || true
|
||||
AUDIO_GID=$(stat -c %g /dev/snd/* | head -n1) \
|
||||
&& (groupmod -o -g "$AUDIO_GID" audio 2> /dev/null || groupadd -o -g "$AUDIO_GID" audio || true) \
|
||||
&& usermod -aG audio "${USER:-pi}" || true
|
||||
|
||||
# Fix timezone as per installer
|
||||
CURRENT_TIMEZONE="$(timedatectl show --value --property=Timezone)"
|
||||
|
||||
@@ -16,12 +16,12 @@
|
||||
],
|
||||
"name": "WIP - Collabora",
|
||||
"options": {
|
||||
"domain": "",
|
||||
"username": "",
|
||||
"password": "",
|
||||
"aliasgroup1": "",
|
||||
"dictionaries": "",
|
||||
"extra_params": ""
|
||||
"domain": "",
|
||||
"extra_params": "",
|
||||
"password": "",
|
||||
"username": ""
|
||||
},
|
||||
"ports": {
|
||||
"9980/tcp": 9980
|
||||
@@ -30,13 +30,13 @@
|
||||
"9980/tcp": "Web interface"
|
||||
},
|
||||
"schema": {
|
||||
"domain": "str?",
|
||||
"username": "str?",
|
||||
"password": "password?",
|
||||
"TZ": "str?",
|
||||
"aliasgroup1": "str?",
|
||||
"dictionaries": "str?",
|
||||
"domain": "str?",
|
||||
"extra_params": "str?",
|
||||
"TZ": "str?"
|
||||
"password": "password?",
|
||||
"username": "str?"
|
||||
},
|
||||
"slug": "collabora",
|
||||
"url": "https://github.com/alexbelgium/hassio-addons",
|
||||
|
||||
0
emby/rootfs/etc/services.d/nginx/run
Normal file → Executable file
0
emby/rootfs/etc/services.d/nginx/run
Normal file → Executable file
0
emby_beta/rootfs/etc/services.d/nginx/run
Normal file → Executable file
0
emby_beta/rootfs/etc/services.d/nginx/run
Normal file → Executable file
@@ -57,12 +57,12 @@ The web UI can be found at `<your-ip>:8071` or through the Home Assistant sideba
|
||||
| `keyfile` | str | `privkey.pem` | SSL private key file (in `/ssl/`) |
|
||||
| `NoAuth` | bool | `true` | Disable authentication (resets database when changed) |
|
||||
| `disable_thumbnails` | bool | `true` | Disable thumbnail generation for improved performance |
|
||||
| `base_folder` | str | *(optional)* | Root folder for file browser (defaults to all mapped folders) |
|
||||
| `localdisks` | str | *(optional)* | Local drives to mount (e.g., `sda1,sdb1,MYNAS`) |
|
||||
| `networkdisks` | str | *(optional)* | SMB shares to mount (e.g., `//SERVER/SHARE`) |
|
||||
| `cifsusername` | str | *(optional)* | SMB username for network shares |
|
||||
| `cifspassword` | str | *(optional)* | SMB password for network shares |
|
||||
| `cifsdomain` | str | *(optional)* | SMB domain for network shares |
|
||||
| `base_folder` | str | _(optional)_ | Root folder for file browser (defaults to all mapped folders) |
|
||||
| `localdisks` | str | _(optional)_ | Local drives to mount (e.g., `sda1,sdb1,MYNAS`) |
|
||||
| `networkdisks` | str | _(optional)_ | SMB shares to mount (e.g., `//SERVER/SHARE`) |
|
||||
| `cifsusername` | str | _(optional)_ | SMB username for network shares |
|
||||
| `cifspassword` | str | _(optional)_ | SMB password for network shares |
|
||||
| `cifsdomain` | str | _(optional)_ | SMB domain for network shares |
|
||||
|
||||
### Example Configuration
|
||||
|
||||
|
||||
@@ -78,12 +78,13 @@ environment:
|
||||
}
|
||||
image: ghcr.io/alexbelgium/grampsweb-{arch}
|
||||
init: false
|
||||
options: {
|
||||
options:
|
||||
{
|
||||
"CELERY_NUM_WORKERS": 2,
|
||||
"GUNICORN_NUM_WORKERS": 8,
|
||||
"certfile": "fullchain.pem",
|
||||
"keyfile": "privkey.pem",
|
||||
"ssl": false
|
||||
"ssl": false,
|
||||
}
|
||||
map:
|
||||
- type: addon_config
|
||||
|
||||
0
nextcloud/rootfs/etc/services.d/cron/run
Normal file → Executable file
0
nextcloud/rootfs/etc/services.d/cron/run
Normal file → Executable file
0
nzbget/rootfs/etc/services.d/nginx/run
Normal file → Executable file
0
nzbget/rootfs/etc/services.d/nginx/run
Normal file → Executable file
@@ -170,10 +170,10 @@
|
||||
"cifspassword": "str?",
|
||||
"cifsusername": "str?",
|
||||
"claim": "str",
|
||||
"clear_codecs_folder": "bool?",
|
||||
"localdisks": "str?",
|
||||
"networkdisks": "str?",
|
||||
"skip_permissions_check": "bool?",
|
||||
"clear_codecs_folder": "bool?",
|
||||
"smbv1": "bool?"
|
||||
},
|
||||
"slug": "plex_nas",
|
||||
|
||||
0
qbittorrent/rootfs/etc/s6-overlay/s6-rc.d/svc-qbittorrent/run
Normal file → Executable file
0
qbittorrent/rootfs/etc/s6-overlay/s6-rc.d/svc-qbittorrent/run
Normal file → Executable file
0
qbittorrent/rootfs/etc/services.d/nginx/run
Normal file → Executable file
0
qbittorrent/rootfs/etc/services.d/nginx/run
Normal file → Executable file
0
qbittorrent/rootfs/etc/services.d/timer/run
Normal file → Executable file
0
qbittorrent/rootfs/etc/services.d/timer/run
Normal file → Executable file
0
scrutiny/rootfs/etc/services.d/nginx/run
Normal file → Executable file
0
scrutiny/rootfs/etc/services.d/nginx/run
Normal file → Executable file
0
sonarr/rootfs/etc/services.d/nginx/run
Normal file → Executable file
0
sonarr/rootfs/etc/services.d/nginx/run
Normal file → Executable file
@@ -98,6 +98,9 @@
|
||||
"80/tcp": "Web interface"
|
||||
},
|
||||
"schema": {
|
||||
"AI_API_KEY": "str?",
|
||||
"AI_MODEL_NAME": "str?",
|
||||
"AI_RATELIMIT": "str?",
|
||||
"ALLOWED_HOSTS": "str?",
|
||||
"DB_TYPE": "list(sqlite|postgresql_external)",
|
||||
"DEBUG": "list(1|0)",
|
||||
@@ -107,9 +110,6 @@
|
||||
"POSTGRES_PORT": "str?",
|
||||
"POSTGRES_USER": "str?",
|
||||
"SECRET_KEY": "str",
|
||||
"AI_MODEL_NAME": "str?",
|
||||
"AI_API_KEY": "str?",
|
||||
"AI_RATELIMIT": "str?",
|
||||
"externalfiles_folder": "str?"
|
||||
},
|
||||
"services": [
|
||||
|
||||
0
zzz_archived_bitwarden/rootfs/etc/services.d/bitwarden/run
Normal file → Executable file
0
zzz_archived_bitwarden/rootfs/etc/services.d/bitwarden/run
Normal file → Executable file
0
zzz_archived_bitwarden/rootfs/etc/services.d/nginx/run
Normal file → Executable file
0
zzz_archived_bitwarden/rootfs/etc/services.d/nginx/run
Normal file → Executable file
Reference in New Issue
Block a user