All the applications you love—built and maintained by a community member who understands what you need on Unraid. Love a particular app or plugin? Donate directly to the developer to support their work.
Cryptomator WebDAV allows you to serve a locally stored Cryptomator vault over a secure WebDAV (https) connection, allowing access to decrypted files through third party WebDav tools such as rclone, Mountain Duck, CyberDuck etc.
Setting the Cryptomator Vault Password:
The password for the vault can either be set directly through the Cryptomator Vault Password variable, or can be stored in a local file and shared through the Cryptomator Vault Password File setting.
Only one is needed.
Note: Unraid only shows directories in its drop down by default, manually type the full path to the file in the variable box, e.g. '/mnt/user/appdata/cryptomator-webdav/vault.pass'
Optional Signed Certificate:
An optional signed certificate can be passed to the container, e.g. from LetsEncrypt.
Set the "Optional: Signed Certificate" variable to the full path of your certificate file, containing both your cert and the key in one .pem file.
Note: Unraid only shows directories in its drop down by default, manually type the full path to the file in the variable box, e.g. '/mnt/user/appdata/cryptomator-webdav/mycert.pem'
File Permissions:
Cryptomator-webdav runs as UID:99, GID:100 by default. This can be changed through the CRYPTOMATOR_UID and CRYPTOMATOR_GID variables.
Ensure vault files are read and writable by the IDs you set.
Ensure any vault password file provided is readable by these IDs.
More Secure File Permissions:
Most Unraid Community Applications containers run as UID:99, GID:100
In theory this would mean a rouge container could have read access to your encrypted files if the vault was shared with it.
To ensure a slightly more secure installation, it is recommended the container application is run as a separate Unraid user id, and vault files are only accessible by this user.
For example:
Set CRYPTOMATOR_UID to your Unraid user id, e.g. 1000
Ensure all vault files are only readable and writable by this user:
chown -R 1000: /path/to/cryptomator/vault
chmod -R u+rwX,g-rwx,o-rwx /path/to/cryptomator/vault
See the Cryptomator WebDAV github project for more details at https://github.com/greycubesgav/cryptomator-webdav
More details about Cryptomator can be found at https://cryptomator.org
CryptPad is the Zero Knowledge realtime collaborative editor.
Before Installing the docker Unraid CLI
cd /mnt/user/appdata && mkdir cryptpad && cd cryptpad
mkdir -p block customize data datastore config onlyoffice-dist onlyoffice-conf
chown -R 4001:4001 block customize data datastore onlyoffice-dist onlyoffice-conf
wget -O /mnt/user/appdata/cryptpad/config/config.js https://raw.githubusercontent.com/xwiki-labs/cryptpad/main/config/config.example.js
Edit /mnt/user/appdata/cryptpad/config/config.js
Change httpUnsafeOrigin:http://UNRAID_IP/DOMAIN:PORT
Example httpUnsafeOrigin: 'http://192.168.0.99:3000',
In httpAddress: remove // and put httpAddress: '0.0.0.0',
More info
https://docs.cryptpad.org/fr/admin_guide/installation.html#configure-cryptpad
This Docker will install and download CSMM for 7DtD (CatalysmsServerManager).
It's a powerfull Server Manager with Server automation, Discord notifications, High ping kicker, Country ban, Player tracking, Ingame commands, Economy system, Discord integration, Support ticket system, Server analytics,... for 7DtD.
UPDATE NOTICE: Simply set the 'Force Update' to 'true' and restart the container (don't forget to turn it off after the update).
Enjoy Cura directly in your browser with this easy to use Docker container.
This template has the minimum variables defined, but you can find additional details on the template at the URLs listed below.
https://github.com/helfrichmichael/cura-novnc
https://hub.docker.com/r/mikeah/cura-novnc
Darktable is an open source photography workflow application and raw developer. A virtual lighttable and darkroom for photographers. It manages your digital negatives in a database, lets you view them through a zoomable lighttable and enables you to develop raw images and enhance them.
Databag is a federated chat app that focuses on user privacy and security. It allows users to communicate with each other in real-time, while keeping their conversations private and secure from third-party surveillance.
https://hub.docker.com/r/balzack/databag/
This container will run apt-mirror and Apache2. This allows you to create a local apt mirror for Debian packages.
On first run you will have to edit the mirror.list file that lives in your CONFIG_DIR which repositories you want to sync and other settings like how many threads to use for downloading,...
Restart the container afterwards (keep an eye on the logs the container will tell you what to do).
ATTENTION/WARNING: Keep in mind that the first sync can take very long depending on how much repositories you've selected (stable main contrib non-free: Will take about 200GB of hard drive space!).
Update from the mirror files: By default a cron job will run every day at 01:00 which will update your mirror.
Mirror address: The default address for the mirror is 'http://ipFROMtheCONTAINER:980'
Add something like this to your '/etc/apt/sources.list': 'deb http://ipFROMtheCONTAINER:980/debian stable main contrib non-free'
This Container is a full Debian Bookworm Xfce4 Desktop environment with a noVNC webGUI and all the basic tools pre-installed.
ROOT ACCESS:
1. Open up your WebGUI
2. Open up a terminal
3. Type in 'su'
4. Type in your password that you've set (no screenoutput is shown if you type in passwords in Linux)
5. Press Enter
6. You should now be root.
If you want to install some other application you can do that by creating a user.sh and mounting it to the container to /opt/scripts/user.sh (a standard bash script should do the trick).
You also can reverse proxy this container with nginx or apache (for more info see the Github/Dockerhub page).
Storage Note: All things that are saved in the container should be in the home or a subdirectory in your homefolder, all files that are store outside your homefolder are not persistant and will be wiped if there is an update of the container or you change something in the template.
Deleterr uses Radarr, Sonarr, and Tautulli to identify and delete media files based on user-specified criteria. Deleterr is customizable, allowing you to specify metadata based rules for different libraries and Sonarr/Radarr instances.
Setup Deleterr to run on a schedule and it will automatically delete media files that meet your criteria. This allows to keep your library fresh and clean, without having to manually manage it to free up space.
An Instant App & API for your SQL Database.
Directus wraps your new or existing SQL database with a realtime GraphQL+REST API for developers, and an intuitive admin app for non-technical users.
This Docker will download and install the Runtime and also DirSyncPro with optional encryption by CryFS.
You can sync your files to another offsite SMB (is removed in the latest version, please use Unassigned Devices Plugin in Unraid and mount the share with the 'local' option), FTP or WebDAV share also don't forget to specify a path where your source files are.
You can also use this tool to duplicate your files on the server to another directory.
ENCRYPTION: If you want to use encryption by CryFS you can enable it in the variables below and the mounted folder will be automaticaly encrypted (smb: '/mnt/smb' - ftp: '/mnt/ftp' - webdav: '/mnt/webdav' - local: if you set the type to 'local' you must set the container mountpoint to: '/mnt/local'). Please also note if you set up a encrypted share for the first time the destination folder should be empty since CryFS will create a folder with the basic information for the encryption and all the split files (don't delete any folder since it can corrupt files). The docker will automaticaly create a directory named 'cryfs' in the main directory of DirSyncPro, please copy the 'cryfs.cfg' to a save place since you will need this file and your selected password for CryFS to decrypt the files.
Restoring of encrypted files on another computer/server with this Docker: start the container once with CryFS enabled but set no password, the container will start and create the 'cryfs' directory, stop the container copy your cryfs.cfg in the 'cryfs' folder edit the Docker and set the apropriate password and blocksize for the cryfs.cfg and restart the Docker. Now you can sync from/or to your encrypted share again.
Also there is a commandline mode without the GUI if you configured all right under the 'Show more settings' section, please be sure that you put your config file in the main directory of the Docker and specify it.
Unraid template for the official Docker-in-Docker (aka DinD) image. Build docker images directly using your Unraid server as a node i.e. without needing to run a VM - just expose TCP port like you would for a network build node. This is NOT a start-it-and-forget-it set up so PLEASE READ THE NOTES.
NOTES:
(1) I'm not affiliated with Docker. I just realised nobody created an Unraid template for this really useful image that I have been using for a while (e.g. all my Unraid docker images are built on this via buildx node) so I share this for the community. If Docker ever has an official template then I'll deprecate this one.
(2) Must be run in Bridge network mode. Don't bother doing macvlan (aka "br0" / "br1" Unraid docker network), the child dockers will always fail due to lack DNS resolving errors. Don't bother with host network, it crashes my whole docker network every time, requiring a reboot to reset.
(3) It is possible to run this rootless / without privileged with the appropriate image tag and config but I could never get it to work properly. Hence, this template requires to run docker with root in privileged mode - with all the usual warning about it.
(4) I do NOT recommend mapping /var/lib/docker (i.e. the equivalent to Unraid docker image) unless you actually need it. I don't map it and just delete dangling volume using user scripts.
(5) This template has TLS enabled by default and the certs will be saved at wherever you map /certs to on the host. If the /certs is empty, a script will automatically create certificates for you. Port 2376 is used to access docker service through TCP with TLS. As always, buildx will require the full set of certificates to authenticate but note VERY IMPORTANTLY: you have to set it up using DNS name (e.g. by adding the docker name and the Unraid server IP to /etc/hosts and set buildx to use docker_name:2376) and not directly by IP.
(5a) Alternatively, once the certificates have been generated (i.e. docker was run at least once), you need to map the FILE /certs/server/openssl.conf to a host file as READ-ONLY (to prevent the docker TLS generator script from overwriting it) + make your appropriate edits + delete the rest of the /certs folder content and let the certificate generator script run again for new certs. You can even do wildcard and stuff like that but I'm not going into details here.
(5b) If the above is too complicated for you, just run it without TLS (set DOCKER_TLS_CERTDIR variable to blank). But be mindful that docker has been screaming that this will be deprecated in a (yet-undetermined) future version. And you will need to map 2375 port.
(6) You don't need to map both 2375 and 2376. 2375 for non-TLS. 2376 for TLS.
Docker Registry is used to store and distribute Docker images using HTTP API. This allows you host your own private Registry and store your images. Uses official Docker Registry image @ https://hub.docker.com/_/registry/
Configuration
/mnt/user/appdata/registry This is where Registry will store it's data.
Port 5000 Default connection port
Open-source collaborative wiki and documentation software
Create, collaborate, and share knowledge seamlessly with Docmost.
Ideal for managing your wiki, knowledge-base, documentation and a lot more.
Require before deploying:
- Postgres
- redis
Dokuwiki(https://www.dokuwiki.org/dokuwiki/) is a simple to use and highly versatile Open Source wiki software that doesn't require a database. It is loved by users for its clean and readable syntax. The ease of maintenance, backup and integration makes it an administrator's favorite. Built in access controls and authentication connectors make DokuWiki especially useful in the enterprise context and the large number of plugins contributed by its vibrant community allow for a broad range of use cases beyond a traditional wiki.
Web GUI for Duplicacy. Duplicacy backs up your files to many cloud storages with client-side encryption and the highest level of deduplication
http://duplicacy.com
Note:
- It's imporatant to pass hostname (Advanced View > Extra Parameters > --hostname=), as duplicacy license is requested based on hostname and machine-id provided by dbus.
- Machine-id will be persisted in the /config directory.
- Default hostname set to 'duplicacy-unraid'.
- If you want to backup the unRAID FLASH drive then you will have to run Duplicacy as root i.e. USR_ID=0 and GRP_ID=0
- /config -- is where configuration data will be stored. Should be backed up.
- /logs -- logs will go there.
- /cache -- transient and temporary files will be stored here. Can be safely deleted.
- Readme: https://hub.docker.com/r/saspus/duplicacy-web
Duplicati(https://www.duplicati.com/) works with standard protocols like FTP, SSH, WebDAV as well as popular services like Microsoft OneDrive, Amazon Cloud Drive and S3, Google Drive, box.com, Mega, hubiC and many others.
This Plugin will install all necessary modules and dependencies to get your DVB Cards working (currently you have the choice between DigitalDevices, TBS-OpenSource and LibreELEC DVB drivers on the settings page).
ecoDMS 18.09 (apu) Full Installation - Document Management System (DMS) - Audit-compliant archive for scanning, archiving, managing and retrieving all data and documents.
To use ecoDMS you need to do the following steps after installing the container:
- Download and install the ecoDMS client for your platform (https://www.ecodms.de/index.php/en/download/ecodms-archive/ecodms-version-18-09-apu)
- Add a new profile to the client with your UnRaid IP, 17001 as port and login with ecodms as user and password. !Change the password later!
- If the profile is created successfully connect to the new ecoDMS connection
- If you want to use the web interface of ecoDMS navigate to Settings -> Web/Mobile/API, enable remote access and start the service. Once the service started you should be able to access the web interface via your UnRaid-IP on Port 17004 (or whatever port you chose during setup of the Docker Container
Reference:
https://forums.unraid.net/topic/77838-anyone-ecodms-got-running/?tab=comments#comment-842793&searchlight=1
@laest - Thank you