Compare commits

...

35 Commits
dayz ... master

Author SHA1 Message Date
48cd3f8930 tailscale.sh aktualisiert 2025-03-27 08:08:34 +01:00
34bb159529 scripts/start.sh aktualisiert 2025-03-15 18:18:06 +01:00
70e233326a tailscale.sh aktualisiert 2024-09-23 19:17:08 +02:00
c15fdfd3b8 tailscale.sh aktualisiert 2024-09-23 19:16:11 +02:00
9fe9b4daef Add TAILSCALE_SERVE_PORT 2024-09-23 11:12:30 +02:00
f9ddd1ba06 tailscale.sh aktualisiert 2024-09-16 09:57:43 +02:00
157071b334 tailscale.sh aktualisiert 2024-09-14 16:37:50 +02:00
f0840de307 tailscale.sh aktualisiert 2024-09-14 09:38:40 +02:00
b2e4d7e997 tailscale.sh aktualisiert 2024-09-14 09:15:51 +02:00
1ca26dcd59 tailscale.sh aktualisiert 2024-09-13 19:29:57 +02:00
7ad98fffa7 tailscale.sh aktualisiert 2024-09-11 12:51:53 +02:00
7e8c3be508 tailscale.sh aktualisiert 2024-09-11 12:41:45 +02:00
0468e72007 tailscale.sh aktualisiert 2024-09-11 12:27:17 +02:00
2a10d8a506 tailscale.sh hinzugefügt 2024-09-08 09:09:26 +02:00
d3ac6481c9 config/ServerConfig_.ini gelöscht 2023-10-24 17:02:29 +02:00
d8445bcc49 Dateien nach "config" hochladen 2023-10-24 17:02:19 +02:00
713a899b2c Update scripts/start-server.sh 2023-07-13 08:29:20 +02:00
05f20eac1e Update scripts/start-server.sh 2023-07-13 08:09:00 +02:00
dcd70dd299 Update Dockerfile 2023-06-14 13:28:06 +02:00
a295ac337d „scripts/start.sh“ ändern 2022-10-25 10:59:28 +02:00
e712070a37 „Dockerfile“ ändern 2022-09-08 08:36:13 +02:00
fc31e10b7c „Dockerfile“ ändern 2022-05-06 09:05:58 +02:00
1cb7ab5f8b „README.md“ ändern 2022-04-18 13:07:46 +02:00
82b45708e5 Merge pull request #19 from Ornias1993/patch-1
ensure group is linked correctly
2022-04-07 16:58:05 +02:00
Kjeld Schouten-Lebbing
27f2c6ee47 Update start.sh 2022-04-07 14:36:32 +02:00
Kjeld Schouten-Lebbing
0fb3b33466 Update scripts/start.sh 2022-04-07 13:45:57 +02:00
Kjeld Schouten-Lebbing
2bcce9f74e Apply suggestions from code review
Co-authored-by: Christoph <christophhummer@gmail.com>
2022-04-07 13:17:32 +02:00
Kjeld Schouten-Lebbing
4f2d323874 shrink code and add clearer logging 2022-04-07 12:31:54 +02:00
Kjeld Schouten-Lebbing
638550d65d Update start.sh 2022-04-07 12:26:18 +02:00
Kjeld Schouten-Lebbing
58135e9a43 Update scripts/start.sh 2022-04-07 00:44:32 +02:00
Kjeld Schouten-Lebbing
5bc5d45ffb Update Dockerfile 2022-04-07 00:43:57 +02:00
Kjeld Schouten-Lebbing
8a1b43d82d Update Dockerfile 2022-04-07 00:43:50 +02:00
Kjeld Schouten-Lebbing
d8faf8d04e Support read-only user-scripts 2022-04-06 21:04:50 +02:00
Kjeld Schouten-Lebbing
6cb4fd6f96 Ensure the GID is actually dynamically assigned to a group as well. 2022-04-06 09:48:52 +02:00
Kjeld Schouten-Lebbing
25688e6709 ensure group is created in Dockerfile
This ensures a group is created inside the container before the entrypoint is triggered, as some container engines might trigger a "group not found" error assigning the GID to said group
2022-04-06 09:44:46 +02:00
4 changed files with 259 additions and 26 deletions

View File

@@ -1,9 +1,10 @@
FROM ich777/debian-baseimage
FROM ich777/debian-baseimage:bullseye_amd64
LABEL maintainer="admin@minenet.at"
LABEL org.opencontainers.image.authors="admin@minenet.at"
LABEL org.opencontainers.image.source="https://github.com/ich777/docker-steamcmd-server"
RUN apt-get update && \
apt-get -y install --no-install-recommends lib32gcc-s1 lib32stdc++6 && \
apt-get -y install --no-install-recommends lib32gcc-s1 lib32stdc++6 lib32z1 && \
rm -rf /var/lib/apt/lists/*
ENV DATA_DIR="/serverdata"
@@ -33,4 +34,4 @@ ADD /scripts/ /opt/scripts/
RUN chmod -R 770 /opt/scripts/
#Server Start
ENTRYPOINT ["/opt/scripts/start.sh"]
ENTRYPOINT ["/opt/scripts/start.sh"]

View File

@@ -14,16 +14,10 @@ This Docker will download and install SteamCMD and the according game that is pu
| UID | User Identifier | 99 |
| GID | Group Identifier | 100 |
| GAME_PORT | Port the server will be running on | 27015 |
| VALIDATE | Validates the game data | true |
| VALIDATE | Validates the game data | blank |
| USERNAME | Leave blank for anonymous login | blank |
| PASSWRD | Leave blank for anonymous login | blank |
**ATTENTION: You have to disable Steam Guard for games that require authentication, but not all games need Steam credentials, Steam recommends to create a seperate account for dedicated servers **
>**NOTE** GAME_ID values can be found [here](https://developer.valvesoftware.com/wiki/Dedicated_Servers_List)
> And for GAME_NAME there is no list, so a quick search should give you the result
## Run example for CS:Source
```
docker run --name CSSource -d \
@@ -34,17 +28,13 @@ docker run --name CSSource -d \
--env 'GAME_PARAMS=-secure +maxplayers 32 +map de_dust2' \
--env 'UID=99' \
--env 'GID=100' \
--volume /mnt/user/appdata/steamcmd:/serverdata/steamcmd \
--volume /mnt/user/appdata/cstrikesource:/serverdata/serverfiles \
--volume /path/to/steamcmd:/serverdata/steamcmd \
--volume /path/to/cstrikesource:/serverdata/serverfiles \
ich777/steamcmd:latest
```
>**NOTE** port 26900 is the port for vac, in case of multiple servers make sure these are not the same
This Docker was mainly edited for better use with Unraid, if you don't use Unraid you should definitely try it!
This Docker is forked from mattieserver, thank you for this wonderfull Docker.
#### Support Thread: https://forums.unraid.net/topic/79530-support-ich777-gameserver-dockers/

View File

@@ -1,25 +1,35 @@
#!/bin/bash
echo "---Checking if UID: ${UID} matches user---"
echo "---Ensuring UID: ${UID} matches user---"
usermod -u ${UID} ${USER}
echo "---Checking if GID: ${GID} matches user---"
echo "---Ensuring GID: ${GID} matches user---"
groupmod -g ${GID} ${USER} > /dev/null 2>&1 ||:
usermod -g ${GID} ${USER}
echo "---Setting umask to ${UMASK}---"
umask ${UMASK}
echo "---Checking for optional scripts---"
if [ -f /opt/scripts/user.sh ]; then
echo "---Found optional script, executing---"
chmod +x /opt/scripts/user.sh
/opt/scripts/user.sh
cp -f /opt/custom/user.sh /opt/scripts/start-user.sh > /dev/null 2>&1 ||:
cp -f /opt/scripts/user.sh /opt/scripts/start-user.sh > /dev/null 2>&1 ||:
if [ -f /opt/scripts/start-user.sh ]; then
echo "---Found optional script, executing---"
chmod -f +x /opt/scripts/start-user.sh ||:
/opt/scripts/start-user.sh || echo "---Optional Script has thrown an Error---"
else
echo "---No optional script found, continuing---"
echo "---No optional script found, continuing---"
fi
echo "---Starting...---"
echo "---Taking ownership of data...---"
chown -R root:${GID} /opt/scripts
chmod -R 750 /opt/scripts
chown -R ${UID}:${GID} ${DATA_DIR}
# Fix for CSDM not working properly
if [ -f "${SERVER_DIR}/cstrike/addons/sourcemod/gamedata/cssdm.games.txt" ]; then
chmod 550 ${SERVER_DIR}/cstrike/addons/sourcemod/gamedata/cssdm.games.txt
fi
echo "---Starting...---"
term_handler() {
kill -SIGTERM "$killpid"
wait "$killpid" -f 2>/dev/null
@@ -33,4 +43,4 @@ while true
do
wait $killpid
exit 0;
done
done

232
tailscale.sh Normal file
View File

@@ -0,0 +1,232 @@
#!/bin/bash
# The script will then add the container to your Tailscale network.
#
# For more information see: [Link TBD]
error_handler() {
echo
echo "======================="
exit 1
}
echo "======================="
echo
# Import variables from s6-overlay images
if [ -x "/usr/bin/with-contenv" ]; then
echo "just-containers s6-overlay image found, importing variables..."
ENV_VARS="$(/usr/bin/with-contenv bash -c 'env')"
while IFS='=' read -r KEY VALUE; do
export "${KEY}"="${VALUE}"
done <<< "${ENV_VARS}"
fi
if [[ ! -f /usr/bin/tailscale || ! -f /usr/bin/tailscaled ]]; then
if [ ! -z "${TAILSCALE_EXIT_NODE_IP}" ]; then
if [ ! -c /dev/net/tun ]; then
echo "ERROR: Device /dev/net/tun not found!"
echo " Make sure to pass through /dev/net/tun to the container."
error_handler
fi
APT_IPTABLES="iptables "
fi
echo "Detecting Package Manager..."
if which apt-get >/dev/null 2>&1; then
echo "Detected Advanced Package Tool!"
PACKAGES_UPDATE="apt-get update"
PACKAGES_INSTALL="apt-get -y install --no-install-recommends"
elif which apk >/dev/null 2>&1; then
echo "Detected Alpine Package Keeper!"
PACKAGES_UPDATE="apk update"
PACKAGES_INSTALL="apk add"
else
echo "ERROR: Detection failed!"
error_handler
fi
echo "Installing dependencies..."
echo "Please wait..."
${PACKAGES_UPDATE} >/dev/null 2>&1
${PACKAGES_INSTALL} jq wget ca-certificates ${APT_IPTABLES}>/dev/null 2>&1
echo "Done"
if [ "${APT_IPTABLES}" == "iptables " ]; then
if ! iptables -L >/dev/null 2>&1; then
echo "ERROR: Cap: NET_ADMIN not available!"
echo " Make sure to add --cap-add=NET_ADMIN to the Extra Parameters"
error_handler
fi
fi
echo "Tailscale not found, downloading..."
echo "Please wait..."
TAILSCALE_JSON=$(wget -qO- 'https://pkgs.tailscale.com/stable/?mode=json')
if [ -z "${TAILSCALE_JSON}" ]; then
echo "ERROR: Can't get Tailscale JSON"
error_handler
fi
TAILSCALE_TARBALL=$(echo "${TAILSCALE_JSON}" | jq -r .Tarballs.amd64)
TAILSCALE_VERSION=$(echo "${TAILSCALE_JSON}" | jq -r .TarballsVersion)
if [ ! -d /tmp/tailscale ]; then
mkdir -p /tmp/tailscale
fi
if wget -q -nc --show-progress --progress=bar:force:noscroll -O /tmp/tailscale/tailscale.tgz "https://pkgs.tailscale.com/stable/${TAILSCALE_TARBALL}" ; then
echo "Download from Tailscale version ${TAILSCALE_VERSION} successful!"
else
echo "ERROR: Download from Tailscale version ${TAILSCALE_VERSION} failed!"
rm -rf /tmp/tailscale
error_handler
fi
cd /tmp/tailscale
tar -xf /tmp/tailscale/tailscale.tgz
cp /tmp/tailscale/tailscale_${TAILSCALE_VERSION}_amd64/tailscale /usr/bin/tailscale
cp /tmp/tailscale/tailscale_${TAILSCALE_VERSION}_amd64/tailscaled /usr/bin/tailscaled
rm -rf /tmp/tailscale
echo "Done"
else
echo "Tailscale found, continuing..."
fi
unset TSD_PARAMS
unset TS_PARAMS
if [ ! -z "${TAILSCALE_STATE_DIR}" ]; then
TSD_STATE_DIR="${TAILSCALE_STATE_DIR}"
elif [ -v SERVER_DIR ]; then
TSD_STATE_DIR=${SERVER_DIR}/.tailscale_state
echo "Settings Tailscale state dir to: ${TSD_STATE_DIR}"
elif [ -v DATA_DIR ]; then
TSD_STATE_DIR=${DATA_DIR}/.tailscale_state
echo "Settings Tailscale state dir to: ${TSD_STATE_DIR}"
else
if [ -z "${TAILSCALE_STATE_DIR}" ]; then
TAILSCALE_STATE_DIR="/config/.tailscale_state"
fi
TSD_STATE_DIR=${TAILSCALE_STATE_DIR}
echo "Settings Tailscale state dir to: ${TSD_STATE_DIR}"
fi
if [ ! -d ${TS_STATE_DIR} ]; then
mkdir -p ${TS_STATE_DIR}
fi
if [ ! -z "${TAILSCALE_EXIT_NODE_IP}" ]; then
echo "Using ${TAILSCALE_EXIT_NODE_IP} as Exit Node! See https://tailscale.com/kb/1103/exit-nodes"
TS_PARAMS=" --exit-node=${TAILSCALE_EXIT_NODE_IP}"
if [ ! -z "${TAILSCALE_ALLOW_LAN_ACCESS}" ]; then
echo "Enabling local LAN Access to the container!"
TS_PARAMS+=" --exit-node-allow-lan-access"
fi
else
if [ -z "${TAILSCALE_USERSPACE_NETWORKING}" ] || [ "${TAILSCALE_USERSPACE_NETWORKING}" == "true" ]; then
TSD_PARAMS+="-tun=userspace-networking "
else
if [ ! -c /dev/net/tun ]; then
echo "ERROR: Device /dev/net/tun not found!"
echo " Make sure to pass through /dev/net/tun to the container and add the"
echo " parameter --cap-add=NET_ADMIN to the Extra Parameters!"
error_handler
fi
fi
fi
if [ "${TAILSCALE_USE_SSH}" == "true" ]; then
echo "Enabling SSH. See https://tailscale.com/kb/1193/tailscale-ssh"
TS_PARAMS+=" --ssh"
fi
if [ "${TAILSCALE_LOG}" != "false" ]; then
TSD_PARAMS+=">>/var/log/tailscaled 2>&1 "
TSD_MSG=" with log file /var/log/tailscaled"
else
TSD_PARAMS+=">/dev/null 2>&1 "
fi
if [[ ! -z "${TAILSCALE_AUTHKEY}" && -f ${TSD_STATE_DIR}/.initialized ]]; then
echo
echo "-> It is now save to remove the variable TAILSCALE_AUTHKEY from your template <-"
echo
unset TAILSCALE_AUTHKEY
fi
if [ ! -z "${TAILSCALE_AUTHKEY}" ]; then
TS_AUTH="--authkey=${TAILSCALE_AUTHKEY} "
fi
if [ ! -z "${TAILSCALE_HOSTNAME}" ]; then
echo "Setting host name to ${TAILSCALE_HOSTNAME}"
TS_PARAMS+=" --hostname=${TAILSCALE_HOSTNAME/ /}"
fi
if [ "${TAILSCALE_EXIT_NODE}" == "true" ]; then
echo "Configuring container as Exit Node! See https://tailscale.com/kb/1103/exit-nodes"
TS_PARAMS+=" --advertise-exit-node"
fi
if [ ! -z "${TAILSCALED_PARAMS}" ]; then
TSD_PARAMS="${TAILSCALED_PARAMS} ${TSD_PARAMS}"
fi
if [ ! -z "${TAILSCALE_PARAMS}" ]; then
TS_PARAMS="${TAILSCALE_PARAMS}${TS_PARAMS}"
fi
echo "Starting tailscaled${TSD_MSG}"
eval tailscaled -statedir=${TSD_STATE_DIR} ${TSD_PARAMS}&
echo "Starting tailscale"
eval tailscale up ${TS_AUTH}${TS_PARAMS}
EXIT_STATUS="$?"
if [ "${EXIT_STATUS}" == "0" ]; then
echo "Connecting to Tailscale successful!"
if [ ! -f ${TSD_STATE_DIR}/.initialized ]; then
echo "Please don't remove this file!" > ${TSD_STATE_DIR}/.initialized
fi
else
echo "ERROR: Connecting to Tailscale not successful!"
if [ -f /var/log/tailscaled ]; then
echo "Please check the logs:"
tail -20 /var/log/tailscaled
echo "======================="
fi
error_handler
fi
if [[ ! -z "${TAILSCALE_SERVE_PORT}" && "$(tailscale status --json | jq -r '.CurrentTailnet.MagicDNSEnabled')" == "false" ]] ; then
echo "ERROR: Enable HTTPS on your Tailscale account to use Tailscale Serve/Funnel."
echo "See: https://tailscale.com/kb/1153/enabling-https"
error_handler
fi
if [ ! -z ${TAILSCALE_SERVE_PORT} ]; then
if [ ! -z "${TAILSCALE_SERVE_PATH}" ]; then
TAILSCALE_SERVE_PATH="=${TAILSCALE_SERVE_PATH}"
fi
if [ -z "${TAILSCALE_SERVE_MODE}" ]; then
TAILSCALE_SERVE_MODE="https"
fi
if [ -z "${TAILSCALE_SERVE_PROTOCOL_PORT}" ]; then
TAILSCALE_SERVE_PROTOCOL_PORT="=443"
fi
if [ "${TAILSCALE_FUNNEL}" == "true" ]; then
echo "Enabling Funnel! See https://tailscale.com/kb/1223/funnel"
eval tailscale funnel --bg --"${TAILSCALE_SERVE_MODE}"${TAILSCALE_SERVE_PROTOCOL_PORT}${TAILSCALE_SERVE_PATH} http://localhost:"${TAILSCALE_SERVE_PORT}${TAILSCALE_SERVER_LOCALPATH}"
else
echo "Enabling Serve! See https://tailscale.com/kb/1312/serve"
eval tailscale serve --bg --"${TAILSCALE_SERVE_MODE}"${TAILSCALE_SERVE_PROTOCOL_PORT}${TAILSCALE_SERVE_PATH} http://localhost:"${TAILSCALE_SERVE_PORT}${TAILSCALE_SERVER_LOCALPATH}"
fi
fi
echo
echo "======================="