Migrate JSON config to YAML (#173)

This commit is contained in:
Franck Nijhof 2021-11-11 15:15:48 +01:00 committed by GitHub
parent 1be6321eab
commit f87f61fba4
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
4 changed files with 77 additions and 77 deletions

View file

@ -1,9 +0,0 @@
{
"build_from": {
"aarch64": "ghcr.io/hassio-addons/base/aarch64:10.0.1",
"amd64": "ghcr.io/hassio-addons/base/amd64:10.0.1",
"armhf": "ghcr.io/hassio-addons/base/armhf:10.0.1",
"armv7": "ghcr.io/hassio-addons/base/armv7:10.0.1",
"i386": "ghcr.io/hassio-addons/base/i386:10.0.1"
}
}

7
wireguard/build.yaml Normal file
View file

@ -0,0 +1,7 @@
---
build_from:
aarch64: ghcr.io/hassio-addons/base/aarch64:10.0.1
amd64: ghcr.io/hassio-addons/base/amd64:10.0.1
armhf: ghcr.io/hassio-addons/base/armhf:10.0.1
armv7: ghcr.io/hassio-addons/base/armv7:10.0.1
i386: ghcr.io/hassio-addons/base/i386:10.0.1

View file

@ -1,68 +0,0 @@
{
"name": "WireGuard",
"version": "dev",
"slug": "wireguard",
"description": "Fast, modern, secure VPN tunnel",
"url": "https://github.com/hassio-addons/addon-wireguard",
"arch": ["aarch64", "amd64", "armhf", "armv7", "i386"],
"init": false,
"ports": {
"80/tcp": null,
"51820/udp": 51820
},
"ports_description": {
"80/tcp": "WireGuard peers status API",
"51820/udp": "WireGuard: forward this port in your router"
},
"hassio_api": true,
"privileged": ["NET_ADMIN"],
"devices": ["/dev/net/tun"],
"map": ["ssl:rw"],
"options": {
"server": {
"host": "myautomatedhome.duckdns.org",
"addresses": ["172.27.66.1"],
"dns": []
},
"peers": [
{
"name": "hassio",
"addresses": ["172.27.66.2"],
"allowed_ips": [],
"client_allowed_ips": []
}
]
},
"schema": {
"log_level": "list(trace|debug|info|notice|warning|error|fatal)?",
"server": {
"host": "str",
"interface": "match(^wg([0-9])+$)?",
"addresses": ["str"],
"dns": ["str"],
"private_key": "password?",
"public_key": "str?",
"fwmark": "str?",
"table": "str?",
"pre_up": "str?",
"pre_down": "str?",
"post_up": "str?",
"post_down": "str?",
"mtu": "int?"
},
"peers": [
{
"name": "match(^[a-zA-Z0-9\\d](?:[a-zA-Z0-9\\d]|-(?=[a-zA-Z0-9\\d])){0,32}$)",
"private_key": "str?",
"public_key": "str?",
"addresses": ["str"],
"allowed_ips": ["str"],
"client_allowed_ips": ["str"],
"persistent_keep_alive": "int?",
"endpoint": "str?",
"pre_shared_key": "str?",
"fwmark": "str?"
}
]
}
}

70
wireguard/config.yaml Normal file
View file

@ -0,0 +1,70 @@
---
name: WireGuard
version: dev
slug: wireguard
description: Fast, modern, secure VPN tunnel
url: https://github.com/hassio-addons/addon-wireguard
arch:
- aarch64
- amd64
- armhf
- armv7
- i386
init: false
ports:
80/tcp: null
51820/udp: 51820
ports_description:
80/tcp: WireGuard peers status API
51820/udp: "WireGuard: forward this port in your router"
hassio_api: true
privileged:
- NET_ADMIN
devices:
- /dev/net/tun
map:
- ssl:rw
options:
server:
host: myautomatedhome.duckdns.org
addresses:
- 172.27.66.1
dns: []
peers:
- name: hassio
addresses:
- 172.27.66.2
allowed_ips: []
client_allowed_ips: []
schema:
log_level: list(trace|debug|info|notice|warning|error|fatal)?
server:
host: str
interface: match(^wg([0-9])+$)?
addresses:
- str
dns:
- str
private_key: password?
public_key: str?
fwmark: str?
table: str?
pre_up: str?
pre_down: str?
post_up: str?
post_down: str?
mtu: int?
peers:
- name: match(^[a-zA-Z0-9\d](?:[a-zA-Z0-9\d]|-(?=[a-zA-Z0-9\d])){0,32}$)
private_key: str?
public_key: str?
addresses:
- str
allowed_ips:
- str
client_allowed_ips:
- str
persistent_keep_alive: int?
endpoint: str?
pre_shared_key: str?
fwmark: str?