From 8e3492e5337706c06d797a6f0360cec505b530ba Mon Sep 17 00:00:00 2001 From: Linnea Date: Thu, 26 Feb 2026 22:00:21 -0800 Subject: [PATCH 1/6] add draupnir recipe --- .../draupnir.resisttechmonopolies.online.env | 31 +++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 abra/servers/resisttechmonopolies.online/draupnir.resisttechmonopolies.online.env diff --git a/abra/servers/resisttechmonopolies.online/draupnir.resisttechmonopolies.online.env b/abra/servers/resisttechmonopolies.online/draupnir.resisttechmonopolies.online.env new file mode 100644 index 0000000..31d835a --- /dev/null +++ b/abra/servers/resisttechmonopolies.online/draupnir.resisttechmonopolies.online.env @@ -0,0 +1,31 @@ +TYPE=draupnir:785815dd+U + +DOMAIN=draupnir.resisttechmonopolies.online + +## Domain aliases +#EXTRA_DOMAINS=', `www.draupnir.resisttechmonopolies.online`' + +LETS_ENCRYPT_ENV=production + +HOME_SERVER_URL="https://matrix.resisttechmonopolies.online" +RAW_HOMESERVER_URL="https://matrix.resisttechmonopolies.online" +DRAUPNIR_LOG_LEVEL="DEBUG" + +# The room ID (or room alias) of the management room, anyone in this room can issue commands to Draupnir. +# +# Draupnir has no more granular access controls other than this, be sure you trust everyone in this room - secure it! +# +# This should be a room alias or room ID - not a matrix.to URL. +# +# Note: By default, Draupnir is fairly verbose - expect a lot of messages in this room. +# (see verboseLogging to adjust this a bit.) +MANAGEMENT_ROOM="!KTOGIJKnLqziezPzuO:matrix.org" + +# If true (the default), Draupnir will only accept invites from users present in managementRoom. +AUTO_JOIN_ONLY_IF_MANAGER=true + +# If `autojoinOnlyIfManager` is false, only the members in this space can invite +# the bot to new rooms. +# ACCEPT_INVITES_FROM_SPACE="!example:example.org" + +ACCESS_TOKEN_VERSION=v1 \ No newline at end of file -- 2.49.0 From 04921c8e4491f2e05820ba195a28f84cdfd45023 Mon Sep 17 00:00:00 2001 From: Linnea Date: Thu, 26 Feb 2026 22:17:26 -0800 Subject: [PATCH 2/6] maubot and gitignore --- .gitignore | 5 ++++- .../maubot.resisttechmonopolies.online.env | 18 ++++++++++++++++++ 2 files changed, 22 insertions(+), 1 deletion(-) create mode 100644 abra/servers/resisttechmonopolies.online/maubot.resisttechmonopolies.online.env diff --git a/.gitignore b/.gitignore index 8a72087..e96319a 100644 --- a/.gitignore +++ b/.gitignore @@ -1 +1,4 @@ -.*~ \ No newline at end of file +.*~ +abra/catalogue +abra/recipes +abra/logs diff --git a/abra/servers/resisttechmonopolies.online/maubot.resisttechmonopolies.online.env b/abra/servers/resisttechmonopolies.online/maubot.resisttechmonopolies.online.env new file mode 100644 index 0000000..e1221e2 --- /dev/null +++ b/abra/servers/resisttechmonopolies.online/maubot.resisttechmonopolies.online.env @@ -0,0 +1,18 @@ +TYPE=maubot:f5b93759+U + +DOMAIN=maubot.resisttechmonopolies.online + +## Domain aliases +#EXTRA_DOMAINS=', `www.maubot.resisttechmonopolies.online`' + +LETS_ENCRYPT_ENV=production + +HOMESERVER_HOST=matrix.resisttechmonopolies.online +# Client-server API URL +HOMESERVER_URL=https://matrix.resisttechmonopolies.online + +ADMIN_USER_NAME=charlie + +## Secrets +SECRET_ADMIN_PASSWORD_VERSION=v1 +SECRET_HOMESERVER_REGISTRATION_VERSION=v1 \ No newline at end of file -- 2.49.0 From 87b78d99aff099ff5ba1aeebfa00edabfe94ffc6 Mon Sep 17 00:00:00 2001 From: Linnea Date: Thu, 26 Feb 2026 22:22:44 -0800 Subject: [PATCH 3/6] bad merge --- .gitignore | 7 ------- 1 file changed, 7 deletions(-) diff --git a/.gitignore b/.gitignore index 4687843..5c54467 100644 --- a/.gitignore +++ b/.gitignore @@ -1,11 +1,4 @@ -<<<<<<< HEAD -.*~ -abra/catalogue -abra/recipes -abra/logs -======= *~ abra/catalogue abra/recipes abra/logs ->>>>>>> origin/main -- 2.49.0 From 9b87eededabf2100a4d5de82eef304c62776f6cd Mon Sep 17 00:00:00 2001 From: Zigzagill Date: Thu, 12 Mar 2026 21:15:51 -0700 Subject: [PATCH 4/6] Add hedgedoc config --- .../hedgedoc.resisttechmonopolies.online.env | 59 +++++++++++++++++++ 1 file changed, 59 insertions(+) create mode 100644 abra/servers/resisttechmonopolies.online/hedgedoc.resisttechmonopolies.online.env diff --git a/abra/servers/resisttechmonopolies.online/hedgedoc.resisttechmonopolies.online.env b/abra/servers/resisttechmonopolies.online/hedgedoc.resisttechmonopolies.online.env new file mode 100644 index 0000000..b94ccda --- /dev/null +++ b/abra/servers/resisttechmonopolies.online/hedgedoc.resisttechmonopolies.online.env @@ -0,0 +1,59 @@ +TYPE=hedgedoc:3.0.8+1.10.7 +TIMEOUT=300 +ENABLE_AUTO_UPDATE=true +ENABLE_BACKUPS=true + +DOMAIN=hedgedoc.resisttechmonopolies.online +## Domain aliases +#EXTRA_DOMAINS=', `www.hedgedoc.resisttechmonopolies.online`' +LETS_ENCRYPT_ENV=production + +SECRET_SESSION_SECRET_VERSION=v1 + +COMPOSE_FILE="compose.yml" + +# Anubis +#COMPOSE_FILE="$COMPOSE_FILE:compose.anubis.yml" + +# PostgreSQL + +#COMPOSE_FILE="$COMPOSE_FILE:compose.postgresql.yml" +#SECRET_DB_PASSWORD_VERSION=v1 + +# OAuth, see https://docs.hedgedoc.org/guides/auth/keycloak/ + +#COMPOSE_FILE="$COMPOSE_FILE:compose.oauth.yml" +#CMD_OAUTH2_PROVIDERNAME="Keycloak" +#CMD_OAUTH2_CLIENT_ID="hedgedoc" +#CMD_OAUTH2_AUTHORIZATION_URL="https://keycloak.example.com/auth/realms/realmname/protocol/openid-connect/auth" +#CMD_OAUTH2_TOKEN_URL="https://keycloak.example.com/auth/realms/realmname/protocol/openid-connect/token" +#CMD_OAUTH2_USER_PROFILE_URL="https://keycloak.example.com/auth/realms/realmname/protocol/openid-connect/userinfo" +#CMD_OAUTH2_USER_PROFILE_USERNAME_ATTR=ocs.data.id +#CMD_OAUTH2_USER_PROFILE_ID_ATTR= +#CMD_OAUTH2_USER_PROFILE_DISPLAY_NAME_ATTR=ocs.data.display-name +#CMD_OAUTH2_USER_PROFILE_EMAIL_ATTR=ocs.data.email +#CMD_OAUTH2_PROVIDERNAME=Keycloak +#CMD_OAUTH2_SCOPE="openid email profile" +# +#SECRET_OAUTH_KEY_VERSION=v1 + +# Options, see https://docs.hedgedoc.org/configuration/ + +# CMD_ALLOW_ANONYMOUS=true +# CMD_ALLOW_ANONYMOUS_EDITS=false +# CMD_ALLOW_EMAIL_REGISTER=true +# CMD_ALLOW_FREEURL=false +# CMD_REQUIRE_FREEURL_AUTHENTICATION=true +# CMD_ALLOW_GRAVATAR=true +# CMD_ALLOW_ORIGIN=localhost +# CMD_COOKIE_POLICY=lax +# CMD_CSP_ADD_DISQUS=false +# CMD_CSP_ADD_GOOGLE_ANALYTICS=false +# CMD_CSP_ENABLE=true +# CMD_CSP_REPORTURI=undefined +# CMD_DEFAULT_PERMISSION=editable +# CMD_EMAIL=true +# CMD_SESSION_LIFE=1209600000 +# Only present in config.json (no equivalent env var): +# DOCUMENT_MAX_LENGTH=100000 +# CMD_ENABLE_UPLOADS=registered \ No newline at end of file -- 2.49.0 From 38b80c14701ccd85fab788957a38fc4f5ef82d19 Mon Sep 17 00:00:00 2001 From: Linnea Date: Thu, 7 May 2026 21:19:12 -0700 Subject: [PATCH 5/6] cleanup, got radicale and hedgedoc running --- .../calibre.resisttechmonopolies.online.env | 13 -- .../collabora.resisttechmonopolies.online.env | 7 - ...focalboard.resisttechmonopolies.online.env | 7 - .../nextcloud.resisttechmonopolies.online.occ | 21 --- .../radicale.resisttechmonopolies.online.env | 4 +- .../traefik.resisttechmonopolies.online.env | 148 ------------------ 6 files changed, 2 insertions(+), 198 deletions(-) delete mode 100644 abra/servers/sootie.resisttechmonopolies.online/calibre.resisttechmonopolies.online.env delete mode 100644 abra/servers/sootie.resisttechmonopolies.online/collabora.resisttechmonopolies.online.env delete mode 100644 abra/servers/sootie.resisttechmonopolies.online/focalboard.resisttechmonopolies.online.env delete mode 100644 abra/servers/sootie.resisttechmonopolies.online/nextcloud.resisttechmonopolies.online.occ delete mode 100644 abra/servers/sootie.resisttechmonopolies.online/traefik.resisttechmonopolies.online.env diff --git a/abra/servers/sootie.resisttechmonopolies.online/calibre.resisttechmonopolies.online.env b/abra/servers/sootie.resisttechmonopolies.online/calibre.resisttechmonopolies.online.env deleted file mode 100644 index fbcd86f..0000000 --- a/abra/servers/sootie.resisttechmonopolies.online/calibre.resisttechmonopolies.online.env +++ /dev/null @@ -1,13 +0,0 @@ -TYPE=calibre-web - -DOMAIN=calibre.resisttechmonopolies.online -LETS_ENCRYPT_ENV=production - -DOCKER_MODS="linuxserver/calibre-web:calibre" -OAUTHLIB_RELAX_TOKEN_SCOPE=1 -TZ="America/Los_Angeles" - -DEBUG=False - -# oauth2 support -COMPOSE_FILE="compose.yml:compose.oauth2.yml" diff --git a/abra/servers/sootie.resisttechmonopolies.online/collabora.resisttechmonopolies.online.env b/abra/servers/sootie.resisttechmonopolies.online/collabora.resisttechmonopolies.online.env deleted file mode 100644 index ce76fe1..0000000 --- a/abra/servers/sootie.resisttechmonopolies.online/collabora.resisttechmonopolies.online.env +++ /dev/null @@ -1,7 +0,0 @@ -TYPE=collabora -DOMAIN=collabora.resisttechmonopolies.online -LETS_ENCRYPT_ENV=production -NEXTCLOUD_DOMAIN=nextcloud.resisttechmonopolies.online -ADMIN_USERNAME=admin -SECRET_ADMIN_PASSWORD_VERSION=v1 -FRAME_ANCESTORS= diff --git a/abra/servers/sootie.resisttechmonopolies.online/focalboard.resisttechmonopolies.online.env b/abra/servers/sootie.resisttechmonopolies.online/focalboard.resisttechmonopolies.online.env deleted file mode 100644 index 5432e61..0000000 --- a/abra/servers/sootie.resisttechmonopolies.online/focalboard.resisttechmonopolies.online.env +++ /dev/null @@ -1,7 +0,0 @@ -TYPE=focalboard - -DOMAIN=focalboard.resisttechmonopolies.online - -## Domain aliases -#EXTRA_DOMAINS=', `www.focalboard.resisttechmonopolies.online`' -LETS_ENCRYPT_ENV=production diff --git a/abra/servers/sootie.resisttechmonopolies.online/nextcloud.resisttechmonopolies.online.occ b/abra/servers/sootie.resisttechmonopolies.online/nextcloud.resisttechmonopolies.online.occ deleted file mode 100644 index 647002f..0000000 --- a/abra/servers/sootie.resisttechmonopolies.online/nextcloud.resisttechmonopolies.online.occ +++ /dev/null @@ -1,21 +0,0 @@ -#!/bin/bash -# This is a script to run after a clean installation to restore all settings done over time. -# The script is not supposed to be needed since a fresh installation is unlikely (even if migrating, -# a backup will be used and should maintain it's configs). -# This script is more of a living documentation of configuration and what commands has been used to set them. - -# See: https://docs.nextcloud.com/server/30/admin_manual/configuration_server/background_jobs_configuration.html -abra app command nextcloud.resisttechmonopolies.online app run_occ "'config:system:set maintenance_window_start --type=integer --value=1'" - -# The paragraph below shows as a warning to an admin user sometimes. -# "One or more mimetype migrations are available. Occasionally new mimetypes are added to better handle certain file types. -# Migrating the mimetypes take a long time on larger instances so this is not done automatically during upgrades. -# Use the command `occ maintenance:repair --include-expensive` to perform the migrations." -abra app command nextcloud.resisttechmonopolies.online app run_occ "'maintenance:repair --include-expensive'" - -# Detected some missing optional indices. Occasionally new indices are added (by Nextcloud or installed applications) to improve database performance. Adding indices can sometimes take awhile and temporarily hurt performance so this is not done automatically during upgrades. Once the indices are added, queries to those tables should be faster. Use the command `occ db:add-missing-indices` to add them. -abra app command nextcloud.resisttechmonopolies.online app run_occ "'db:add-missing-indices'" - -# Your installation has no default phone region set. This is required to validate phone numbers in the profile settings without a country code. To allow numbers without a country code, please add "default_phone_region" with the respective ISO 3166-1 code of the region to your config file. -# Solution found at: https://help.nextcloud.com/t/your-installation-has-no-default-phone-region-set/153632/3 -abra app command nextcloud.resisttechmonopolies.online app run_occ "'config:system:set default_phone_region --value=\"us\"'" diff --git a/abra/servers/sootie.resisttechmonopolies.online/radicale.resisttechmonopolies.online.env b/abra/servers/sootie.resisttechmonopolies.online/radicale.resisttechmonopolies.online.env index 73d4f31..0cc3dea 100644 --- a/abra/servers/sootie.resisttechmonopolies.online/radicale.resisttechmonopolies.online.env +++ b/abra/servers/sootie.resisttechmonopolies.online/radicale.resisttechmonopolies.online.env @@ -1,6 +1,6 @@ -TYPE=radicale +TYPE=radicale:0.1.0+3.0.6.0 DOMAIN=radicale.resisttechmonopolies.online ## Domain aliases #EXTRA_DOMAINS=', `www.radicale.resisttechmonopolies.online`' -LETS_ENCRYPT_ENV=production +LETS_ENCRYPT_ENV=production \ No newline at end of file diff --git a/abra/servers/sootie.resisttechmonopolies.online/traefik.resisttechmonopolies.online.env b/abra/servers/sootie.resisttechmonopolies.online/traefik.resisttechmonopolies.online.env deleted file mode 100644 index 14ef6e6..0000000 --- a/abra/servers/sootie.resisttechmonopolies.online/traefik.resisttechmonopolies.online.env +++ /dev/null @@ -1,148 +0,0 @@ -TYPE=traefik:3.7.0+v3.6.2 -TIMEOUT=300 -ENABLE_AUTO_UPDATE=true -ENABLE_BACKUPS=true - -DOMAIN=traefik.resisttechmonopolies.online -LETS_ENCRYPT_ENV=production -LETS_ENCRYPT_EMAIL=linnealovespie@proton.me -DASHBOARD_ENABLED=false -# WARN, INFO etc. -LOG_LEVEL=WARN - -# This is here so later lines can extend it; you likely don't wanna edit -COMPOSE_FILE="compose.yml" - -##################################################################### -# General settings # -##################################################################### - -## Host-mode networking -COMPOSE_FILE="$COMPOSE_FILE:compose.host.yml" - -## "Headless mode" (no domain configured) -#COMPOSE_FILE="$COMPOSE_FILE:compose.headless.yml" - -##################################################################### -# Automatic DNS set-up for Letsencrypt # -##################################################################### - -## Enable dns challenge (for wildcard domains) -## https://doc.traefik.io/traefik/https/acme/#dnschallenge -#LETS_ENCRYPT_DNS_CHALLENGE_ENABLED=1 -#LETS_ENCRYPT_DNS_CHALLENGE_PROVIDER=ovh - -## OVH, https://ovh.com -#COMPOSE_FILE="$COMPOSE_FILE:compose.ovh.yml" -#OVH_ENABLED=1 -#OVH_APPLICATION_KEY= -#OVH_ENDPOINT= -#SECRET_OVH_APP_SECRET_VERSION=v1 -#SECRET_OVH_CONSUMER_KEY=v1 - -## Gandi, https://gandi.net -## note(3wc): only "V5" (new) API is supported, so far -#COMPOSE_FILE="$COMPOSE_FILE:compose.gandi-api-key.yml" -#GANDI_API_KEY_ENABLED=1 -#SECRET_GANDIV5_API_KEY_VERSION=v1 - -## Gandi, https://gandi.net -## note: uses GandiV5 Personal Access Token -#COMPOSE_FILE="$COMPOSE_FILE:compose.gandi-personal-access-token.yml" -#GANDI_PERSONAL_ACCESS_TOKEN_ENABLED=1 -#SECRET_GANDIV5_PERSONAL_ACCESS_TOKEN_VERSION=v1 - -## DigitalOcean, https://digitalocean.com -#COMPOSE_FILE="$COMPOSE_FILE:compose.digitalocean.yml" -#DIGITALOCEAN_ENABLED=1 -#SECRET_DIGITALOCEAN_AUTH_TOKEN_VERSION=v1 - -##################################################################### -# Manual wildcard certificate insertion # -##################################################################### - -# Set wildcards = 1, and uncomment compose_file to enable. -# Create your certs elsewhere and add them like: -# abra app secret insert {myapp.example.coop} ssl_cert v1 "$(cat /path/to/fullchain.pem)" -# abra app secret insert {myapp.example.coop} ssl_key v1 "$(cat /path/to/privkey.pem)" -#WILDCARDS_ENABLED=1 -#SECRET_WILDCARD_CERT_VERSION=v1 -#SECRET_WILDCARD_KEY_VERSION=v1 -#COMPOSE_FILE="$COMPOSE_FILE:compose.wildcard.yml" - -##################################################################### -# Authentication # -##################################################################### - -## Enable Keycloak -#COMPOSE_FILE="$COMPOSE_FILE:compose.keycloak.yml" -#KEYCLOAK_MIDDLEWARE_ENABLED=1 -#KEYCLOAK_TFA_SERVICE=traefik-forward-auth_app -#KEYCLOAK_MIDDLEWARE_2_ENABLED=1 -#KEYCLOAK_TFA_SERVICE_2=traefik-forward-auth_app - -## BASIC_AUTH -## Use httpasswd to generate the secret -#COMPOSE_FILE="$COMPOSE_FILE:compose.basicauth.yml" -#BASIC_AUTH=1 -#SECRET_USERSFILE_VERSION=v1 - -##################################################################### -# Prometheus metrics # -##################################################################### - -## Enable prometheus metrics collection -## used used by the coop-cloud monitoring stack -#COMPOSE_FILE="$COMPOSE_FILE:compose.metrics.yml" -#METRICS_ENABLED=1 - -##################################################################### -# File provider directory configuration # -# (Route bare metal and non-docker services on the machine!) # -##################################################################### -FILE_PROVIDER_DIRECTORY_ENABLED=1 - -##################################################################### -# Additional services # -##################################################################### - -## SMTP port 587 -#COMPOSE_FILE="$COMPOSE_FILE:compose.smtp.yml" -#SMTP_ENABLED=1 - -## Compy -#COMPOSE_FILE="$COMPOSE_FILE:compose.compy.yml" -#COMPY_ENABLED=1 - -## Gitea SSH -# COMPOSE_FILE="$COMPOSE_FILE:compose.gitea.yml" -# GITEA_SSH_ENABLED=1 - -## Foodsoft SMTP -# COMPOSE_FILE="$COMPOSE_FILE:compose.foodsoft.yml" -# FOODSOFT_SMTP_ENABLED=1 - -## Peertube RTMP -#COMPOSE_FILE="$COMPOSE_FILE:compose.peertube.yml" -#PEERTUBE_RTMP_ENABLED=1 - -## Secure Scuttlebutt MUXRPC -#COMPOSE_FILE="$COMPOSE_FILE:compose.ssb.yml" -#SSB_MUXRPC_ENABLED=1 - -## MSSQL -#COMPOSE_FILE="$COMPOSE_FILE:compose.mssql.yml" -#MSSQL_ENABLED=1 - -## Mumble -#COMPOSE_FILE="$COMPOSE_FILE:compose.mumble.yml" -#MUMBLE_ENABLED=1 - -## Matrix -#COMPOSE_FILE="$COMPOSE_FILE:compose.matrix.yml" -#MATRIX_FEDERATION_ENABLED=1 - -## "Web alt", an alternative web port -# NOTE(3wc): as of 2024-04-01 only the `icecast` recipe uses this -#COMPOSE_FILE="$COMPOSE_FILE:compose.web-alt.yml" -#WEB_ALT_ENABLED=1 \ No newline at end of file -- 2.49.0 From 3271ff1009e4b3b8787fd9b363f7f0cc70364f58 Mon Sep 17 00:00:00 2001 From: Linnea Date: Thu, 14 May 2026 14:27:41 -0700 Subject: [PATCH 6/6] whoops gitignore --- .gitignore | 4 ---- 1 file changed, 4 deletions(-) diff --git a/.gitignore b/.gitignore index 143c62e..4968b2c 100644 --- a/.gitignore +++ b/.gitignore @@ -1,9 +1,5 @@ *~ abra/catalogue -<<<<<<< HEAD abra/recipes/* !abra/recipes/rtm-astro-recipe -======= -abra/recipes ->>>>>>> origin/linnealovespie/maubot abra/logs -- 2.49.0