Compare commits
35 Commits
longvinter
...
master
Author | SHA1 | Date | |
---|---|---|---|
48cd3f8930 | |||
34bb159529 | |||
70e233326a | |||
c15fdfd3b8 | |||
9fe9b4daef | |||
f9ddd1ba06 | |||
157071b334 | |||
f0840de307 | |||
b2e4d7e997 | |||
1ca26dcd59 | |||
7ad98fffa7 | |||
7e8c3be508 | |||
0468e72007 | |||
2a10d8a506 | |||
d3ac6481c9 | |||
d8445bcc49 | |||
713a899b2c | |||
05f20eac1e | |||
dcd70dd299 | |||
a295ac337d | |||
e712070a37 | |||
fc31e10b7c
|
|||
1cb7ab5f8b
|
|||
82b45708e5 | |||
|
27f2c6ee47 | ||
|
0fb3b33466 | ||
|
2bcce9f74e | ||
|
4f2d323874 | ||
|
638550d65d | ||
|
58135e9a43 | ||
|
5bc5d45ffb | ||
|
8a1b43d82d | ||
|
d8faf8d04e | ||
|
6cb4fd6f96 | ||
|
25688e6709 |
@@ -1,9 +1,10 @@
|
||||
FROM ich777/debian-baseimage
|
||||
FROM ich777/debian-baseimage:bullseye_amd64
|
||||
|
||||
LABEL maintainer="admin@minenet.at"
|
||||
LABEL org.opencontainers.image.authors="admin@minenet.at"
|
||||
LABEL org.opencontainers.image.source="https://github.com/ich777/docker-steamcmd-server"
|
||||
|
||||
RUN apt-get update && \
|
||||
apt-get -y install --no-install-recommends lib32gcc-s1 lib32stdc++6 && \
|
||||
apt-get -y install --no-install-recommends lib32gcc-s1 lib32stdc++6 lib32z1 && \
|
||||
rm -rf /var/lib/apt/lists/*
|
||||
|
||||
ENV DATA_DIR="/serverdata"
|
||||
@@ -33,4 +34,4 @@ ADD /scripts/ /opt/scripts/
|
||||
RUN chmod -R 770 /opt/scripts/
|
||||
|
||||
#Server Start
|
||||
ENTRYPOINT ["/opt/scripts/start.sh"]
|
||||
ENTRYPOINT ["/opt/scripts/start.sh"]
|
||||
|
16
README.md
16
README.md
@@ -14,16 +14,10 @@ This Docker will download and install SteamCMD and the according game that is pu
|
||||
| UID | User Identifier | 99 |
|
||||
| GID | Group Identifier | 100 |
|
||||
| GAME_PORT | Port the server will be running on | 27015 |
|
||||
| VALIDATE | Validates the game data | true |
|
||||
| VALIDATE | Validates the game data | blank |
|
||||
| USERNAME | Leave blank for anonymous login | blank |
|
||||
| PASSWRD | Leave blank for anonymous login | blank |
|
||||
|
||||
**ATTENTION: You have to disable Steam Guard for games that require authentication, but not all games need Steam credentials, Steam recommends to create a seperate account for dedicated servers **
|
||||
|
||||
>**NOTE** GAME_ID values can be found [here](https://developer.valvesoftware.com/wiki/Dedicated_Servers_List)
|
||||
|
||||
> And for GAME_NAME there is no list, so a quick search should give you the result
|
||||
|
||||
## Run example for CS:Source
|
||||
```
|
||||
docker run --name CSSource -d \
|
||||
@@ -34,17 +28,13 @@ docker run --name CSSource -d \
|
||||
--env 'GAME_PARAMS=-secure +maxplayers 32 +map de_dust2' \
|
||||
--env 'UID=99' \
|
||||
--env 'GID=100' \
|
||||
--volume /mnt/user/appdata/steamcmd:/serverdata/steamcmd \
|
||||
--volume /mnt/user/appdata/cstrikesource:/serverdata/serverfiles \
|
||||
--volume /path/to/steamcmd:/serverdata/steamcmd \
|
||||
--volume /path/to/cstrikesource:/serverdata/serverfiles \
|
||||
ich777/steamcmd:latest
|
||||
```
|
||||
>**NOTE** port 26900 is the port for vac, in case of multiple servers make sure these are not the same
|
||||
|
||||
|
||||
This Docker was mainly edited for better use with Unraid, if you don't use Unraid you should definitely try it!
|
||||
|
||||
|
||||
This Docker is forked from mattieserver, thank you for this wonderfull Docker.
|
||||
|
||||
|
||||
#### Support Thread: https://forums.unraid.net/topic/79530-support-ich777-gameserver-dockers/
|
@@ -1,25 +1,35 @@
|
||||
#!/bin/bash
|
||||
echo "---Checking if UID: ${UID} matches user---"
|
||||
echo "---Ensuring UID: ${UID} matches user---"
|
||||
usermod -u ${UID} ${USER}
|
||||
echo "---Checking if GID: ${GID} matches user---"
|
||||
echo "---Ensuring GID: ${GID} matches user---"
|
||||
groupmod -g ${GID} ${USER} > /dev/null 2>&1 ||:
|
||||
usermod -g ${GID} ${USER}
|
||||
echo "---Setting umask to ${UMASK}---"
|
||||
umask ${UMASK}
|
||||
|
||||
echo "---Checking for optional scripts---"
|
||||
if [ -f /opt/scripts/user.sh ]; then
|
||||
echo "---Found optional script, executing---"
|
||||
chmod +x /opt/scripts/user.sh
|
||||
/opt/scripts/user.sh
|
||||
cp -f /opt/custom/user.sh /opt/scripts/start-user.sh > /dev/null 2>&1 ||:
|
||||
cp -f /opt/scripts/user.sh /opt/scripts/start-user.sh > /dev/null 2>&1 ||:
|
||||
|
||||
if [ -f /opt/scripts/start-user.sh ]; then
|
||||
echo "---Found optional script, executing---"
|
||||
chmod -f +x /opt/scripts/start-user.sh ||:
|
||||
/opt/scripts/start-user.sh || echo "---Optional Script has thrown an Error---"
|
||||
else
|
||||
echo "---No optional script found, continuing---"
|
||||
echo "---No optional script found, continuing---"
|
||||
fi
|
||||
|
||||
echo "---Starting...---"
|
||||
echo "---Taking ownership of data...---"
|
||||
chown -R root:${GID} /opt/scripts
|
||||
chmod -R 750 /opt/scripts
|
||||
chown -R ${UID}:${GID} ${DATA_DIR}
|
||||
|
||||
# Fix for CSDM not working properly
|
||||
if [ -f "${SERVER_DIR}/cstrike/addons/sourcemod/gamedata/cssdm.games.txt" ]; then
|
||||
chmod 550 ${SERVER_DIR}/cstrike/addons/sourcemod/gamedata/cssdm.games.txt
|
||||
fi
|
||||
|
||||
echo "---Starting...---"
|
||||
term_handler() {
|
||||
kill -SIGTERM "$killpid"
|
||||
wait "$killpid" -f 2>/dev/null
|
||||
@@ -33,4 +43,4 @@ while true
|
||||
do
|
||||
wait $killpid
|
||||
exit 0;
|
||||
done
|
||||
done
|
||||
|
232
tailscale.sh
Normal file
232
tailscale.sh
Normal file
@@ -0,0 +1,232 @@
|
||||
#!/bin/bash
|
||||
# The script will then add the container to your Tailscale network.
|
||||
#
|
||||
# For more information see: [Link TBD]
|
||||
|
||||
error_handler() {
|
||||
echo
|
||||
echo "======================="
|
||||
exit 1
|
||||
}
|
||||
|
||||
echo "======================="
|
||||
echo
|
||||
|
||||
# Import variables from s6-overlay images
|
||||
if [ -x "/usr/bin/with-contenv" ]; then
|
||||
echo "just-containers s6-overlay image found, importing variables..."
|
||||
ENV_VARS="$(/usr/bin/with-contenv bash -c 'env')"
|
||||
|
||||
while IFS='=' read -r KEY VALUE; do
|
||||
export "${KEY}"="${VALUE}"
|
||||
done <<< "${ENV_VARS}"
|
||||
fi
|
||||
|
||||
if [[ ! -f /usr/bin/tailscale || ! -f /usr/bin/tailscaled ]]; then
|
||||
if [ ! -z "${TAILSCALE_EXIT_NODE_IP}" ]; then
|
||||
if [ ! -c /dev/net/tun ]; then
|
||||
echo "ERROR: Device /dev/net/tun not found!"
|
||||
echo " Make sure to pass through /dev/net/tun to the container."
|
||||
error_handler
|
||||
fi
|
||||
APT_IPTABLES="iptables "
|
||||
fi
|
||||
|
||||
echo "Detecting Package Manager..."
|
||||
if which apt-get >/dev/null 2>&1; then
|
||||
echo "Detected Advanced Package Tool!"
|
||||
PACKAGES_UPDATE="apt-get update"
|
||||
PACKAGES_INSTALL="apt-get -y install --no-install-recommends"
|
||||
elif which apk >/dev/null 2>&1; then
|
||||
echo "Detected Alpine Package Keeper!"
|
||||
PACKAGES_UPDATE="apk update"
|
||||
PACKAGES_INSTALL="apk add"
|
||||
else
|
||||
echo "ERROR: Detection failed!"
|
||||
error_handler
|
||||
fi
|
||||
|
||||
echo "Installing dependencies..."
|
||||
echo "Please wait..."
|
||||
${PACKAGES_UPDATE} >/dev/null 2>&1
|
||||
${PACKAGES_INSTALL} jq wget ca-certificates ${APT_IPTABLES}>/dev/null 2>&1
|
||||
echo "Done"
|
||||
|
||||
if [ "${APT_IPTABLES}" == "iptables " ]; then
|
||||
if ! iptables -L >/dev/null 2>&1; then
|
||||
echo "ERROR: Cap: NET_ADMIN not available!"
|
||||
echo " Make sure to add --cap-add=NET_ADMIN to the Extra Parameters"
|
||||
error_handler
|
||||
fi
|
||||
fi
|
||||
|
||||
echo "Tailscale not found, downloading..."
|
||||
echo "Please wait..."
|
||||
|
||||
TAILSCALE_JSON=$(wget -qO- 'https://pkgs.tailscale.com/stable/?mode=json')
|
||||
|
||||
if [ -z "${TAILSCALE_JSON}" ]; then
|
||||
echo "ERROR: Can't get Tailscale JSON"
|
||||
error_handler
|
||||
fi
|
||||
|
||||
TAILSCALE_TARBALL=$(echo "${TAILSCALE_JSON}" | jq -r .Tarballs.amd64)
|
||||
TAILSCALE_VERSION=$(echo "${TAILSCALE_JSON}" | jq -r .TarballsVersion)
|
||||
|
||||
if [ ! -d /tmp/tailscale ]; then
|
||||
mkdir -p /tmp/tailscale
|
||||
fi
|
||||
|
||||
if wget -q -nc --show-progress --progress=bar:force:noscroll -O /tmp/tailscale/tailscale.tgz "https://pkgs.tailscale.com/stable/${TAILSCALE_TARBALL}" ; then
|
||||
echo "Download from Tailscale version ${TAILSCALE_VERSION} successful!"
|
||||
else
|
||||
echo "ERROR: Download from Tailscale version ${TAILSCALE_VERSION} failed!"
|
||||
rm -rf /tmp/tailscale
|
||||
error_handler
|
||||
fi
|
||||
|
||||
cd /tmp/tailscale
|
||||
tar -xf /tmp/tailscale/tailscale.tgz
|
||||
cp /tmp/tailscale/tailscale_${TAILSCALE_VERSION}_amd64/tailscale /usr/bin/tailscale
|
||||
cp /tmp/tailscale/tailscale_${TAILSCALE_VERSION}_amd64/tailscaled /usr/bin/tailscaled
|
||||
rm -rf /tmp/tailscale
|
||||
|
||||
echo "Done"
|
||||
|
||||
else
|
||||
echo "Tailscale found, continuing..."
|
||||
fi
|
||||
|
||||
unset TSD_PARAMS
|
||||
unset TS_PARAMS
|
||||
|
||||
if [ ! -z "${TAILSCALE_STATE_DIR}" ]; then
|
||||
TSD_STATE_DIR="${TAILSCALE_STATE_DIR}"
|
||||
elif [ -v SERVER_DIR ]; then
|
||||
TSD_STATE_DIR=${SERVER_DIR}/.tailscale_state
|
||||
echo "Settings Tailscale state dir to: ${TSD_STATE_DIR}"
|
||||
elif [ -v DATA_DIR ]; then
|
||||
TSD_STATE_DIR=${DATA_DIR}/.tailscale_state
|
||||
echo "Settings Tailscale state dir to: ${TSD_STATE_DIR}"
|
||||
else
|
||||
if [ -z "${TAILSCALE_STATE_DIR}" ]; then
|
||||
TAILSCALE_STATE_DIR="/config/.tailscale_state"
|
||||
fi
|
||||
TSD_STATE_DIR=${TAILSCALE_STATE_DIR}
|
||||
echo "Settings Tailscale state dir to: ${TSD_STATE_DIR}"
|
||||
fi
|
||||
|
||||
if [ ! -d ${TS_STATE_DIR} ]; then
|
||||
mkdir -p ${TS_STATE_DIR}
|
||||
fi
|
||||
|
||||
if [ ! -z "${TAILSCALE_EXIT_NODE_IP}" ]; then
|
||||
echo "Using ${TAILSCALE_EXIT_NODE_IP} as Exit Node! See https://tailscale.com/kb/1103/exit-nodes"
|
||||
TS_PARAMS=" --exit-node=${TAILSCALE_EXIT_NODE_IP}"
|
||||
if [ ! -z "${TAILSCALE_ALLOW_LAN_ACCESS}" ]; then
|
||||
echo "Enabling local LAN Access to the container!"
|
||||
TS_PARAMS+=" --exit-node-allow-lan-access"
|
||||
fi
|
||||
else
|
||||
if [ -z "${TAILSCALE_USERSPACE_NETWORKING}" ] || [ "${TAILSCALE_USERSPACE_NETWORKING}" == "true" ]; then
|
||||
TSD_PARAMS+="-tun=userspace-networking "
|
||||
else
|
||||
if [ ! -c /dev/net/tun ]; then
|
||||
echo "ERROR: Device /dev/net/tun not found!"
|
||||
echo " Make sure to pass through /dev/net/tun to the container and add the"
|
||||
echo " parameter --cap-add=NET_ADMIN to the Extra Parameters!"
|
||||
error_handler
|
||||
fi
|
||||
fi
|
||||
fi
|
||||
|
||||
if [ "${TAILSCALE_USE_SSH}" == "true" ]; then
|
||||
echo "Enabling SSH. See https://tailscale.com/kb/1193/tailscale-ssh"
|
||||
TS_PARAMS+=" --ssh"
|
||||
fi
|
||||
|
||||
if [ "${TAILSCALE_LOG}" != "false" ]; then
|
||||
TSD_PARAMS+=">>/var/log/tailscaled 2>&1 "
|
||||
TSD_MSG=" with log file /var/log/tailscaled"
|
||||
else
|
||||
TSD_PARAMS+=">/dev/null 2>&1 "
|
||||
fi
|
||||
|
||||
if [[ ! -z "${TAILSCALE_AUTHKEY}" && -f ${TSD_STATE_DIR}/.initialized ]]; then
|
||||
echo
|
||||
echo "-> It is now save to remove the variable TAILSCALE_AUTHKEY from your template <-"
|
||||
echo
|
||||
unset TAILSCALE_AUTHKEY
|
||||
fi
|
||||
|
||||
if [ ! -z "${TAILSCALE_AUTHKEY}" ]; then
|
||||
TS_AUTH="--authkey=${TAILSCALE_AUTHKEY} "
|
||||
fi
|
||||
|
||||
if [ ! -z "${TAILSCALE_HOSTNAME}" ]; then
|
||||
echo "Setting host name to ${TAILSCALE_HOSTNAME}"
|
||||
TS_PARAMS+=" --hostname=${TAILSCALE_HOSTNAME/ /}"
|
||||
fi
|
||||
|
||||
if [ "${TAILSCALE_EXIT_NODE}" == "true" ]; then
|
||||
echo "Configuring container as Exit Node! See https://tailscale.com/kb/1103/exit-nodes"
|
||||
TS_PARAMS+=" --advertise-exit-node"
|
||||
fi
|
||||
|
||||
if [ ! -z "${TAILSCALED_PARAMS}" ]; then
|
||||
TSD_PARAMS="${TAILSCALED_PARAMS} ${TSD_PARAMS}"
|
||||
fi
|
||||
|
||||
if [ ! -z "${TAILSCALE_PARAMS}" ]; then
|
||||
TS_PARAMS="${TAILSCALE_PARAMS}${TS_PARAMS}"
|
||||
fi
|
||||
|
||||
echo "Starting tailscaled${TSD_MSG}"
|
||||
eval tailscaled -statedir=${TSD_STATE_DIR} ${TSD_PARAMS}&
|
||||
|
||||
echo "Starting tailscale"
|
||||
eval tailscale up ${TS_AUTH}${TS_PARAMS}
|
||||
EXIT_STATUS="$?"
|
||||
|
||||
if [ "${EXIT_STATUS}" == "0" ]; then
|
||||
echo "Connecting to Tailscale successful!"
|
||||
if [ ! -f ${TSD_STATE_DIR}/.initialized ]; then
|
||||
echo "Please don't remove this file!" > ${TSD_STATE_DIR}/.initialized
|
||||
fi
|
||||
else
|
||||
echo "ERROR: Connecting to Tailscale not successful!"
|
||||
if [ -f /var/log/tailscaled ]; then
|
||||
echo "Please check the logs:"
|
||||
tail -20 /var/log/tailscaled
|
||||
echo "======================="
|
||||
fi
|
||||
error_handler
|
||||
fi
|
||||
|
||||
if [[ ! -z "${TAILSCALE_SERVE_PORT}" && "$(tailscale status --json | jq -r '.CurrentTailnet.MagicDNSEnabled')" == "false" ]] ; then
|
||||
echo "ERROR: Enable HTTPS on your Tailscale account to use Tailscale Serve/Funnel."
|
||||
echo "See: https://tailscale.com/kb/1153/enabling-https"
|
||||
error_handler
|
||||
fi
|
||||
|
||||
if [ ! -z ${TAILSCALE_SERVE_PORT} ]; then
|
||||
if [ ! -z "${TAILSCALE_SERVE_PATH}" ]; then
|
||||
TAILSCALE_SERVE_PATH="=${TAILSCALE_SERVE_PATH}"
|
||||
fi
|
||||
if [ -z "${TAILSCALE_SERVE_MODE}" ]; then
|
||||
TAILSCALE_SERVE_MODE="https"
|
||||
fi
|
||||
if [ -z "${TAILSCALE_SERVE_PROTOCOL_PORT}" ]; then
|
||||
TAILSCALE_SERVE_PROTOCOL_PORT="=443"
|
||||
fi
|
||||
if [ "${TAILSCALE_FUNNEL}" == "true" ]; then
|
||||
echo "Enabling Funnel! See https://tailscale.com/kb/1223/funnel"
|
||||
eval tailscale funnel --bg --"${TAILSCALE_SERVE_MODE}"${TAILSCALE_SERVE_PROTOCOL_PORT}${TAILSCALE_SERVE_PATH} http://localhost:"${TAILSCALE_SERVE_PORT}${TAILSCALE_SERVER_LOCALPATH}"
|
||||
else
|
||||
echo "Enabling Serve! See https://tailscale.com/kb/1312/serve"
|
||||
eval tailscale serve --bg --"${TAILSCALE_SERVE_MODE}"${TAILSCALE_SERVE_PROTOCOL_PORT}${TAILSCALE_SERVE_PATH} http://localhost:"${TAILSCALE_SERVE_PORT}${TAILSCALE_SERVER_LOCALPATH}"
|
||||
fi
|
||||
fi
|
||||
|
||||
echo
|
||||
echo "======================="
|
Reference in New Issue
Block a user