mirror of
https://github.com/Dokploy/templates.git
synced 2026-03-09 07:02:16 -05:00
* feat(librechat): add LibreChat blueprint with compose, toml, metadata, links and tags * fix: rename templates to template.toml * fix(librechat): rename api service to librechat in docker-compose.yml * Update blueprints/librechat/template.toml * Update blueprints/librechat/template.toml * fix(librechat): add version under [config] and remove stray [config.mounts] header * fix(librechat): remove predefined persistent volume mounts from template.toml * docs(librechat): add authentication reference link to docker-compose.yml * feat: add Rote template - Add Rote deployment template with frontend, backend, and PostgreSQL services - Configure domain routing for frontend (port 80) and backend (port 3000) - Set up automatic password generation and environment variables - Use latest image tag by default - Add logo and metadata to meta.json * fix: process meta.json to fix formatting and sorting * Update GitHub workflows to target 'canary' branch for meta validation * Update pnpm-lock.yaml to upgrade various dependencies, including '@codemirror/autocomplete', '@radix-ui/react-dialog', and React packages to their latest versions. This includes updates to '@types/react' and '@types/react-dom' for improved compatibility and performance. * Enhance GitHub workflows: add production deployment configuration and target 'canary' branch for pull requests. * Refactor GitHub workflow: comment out build preview steps for clarity and future modifications. * Remove unnecessary blank line in deploy-preview.yml for improved readability. * Refactor GitHub workflow: uncomment build preview steps for improved deployment process and clarity. * Update template.toml (#555) * Update template.toml * Update template.toml * Update template.toml * fix: change VITE_API_BASE to http:// for traefik.me compatibility * changed image from sknnr/enshrouded-dedicated-server to mornedhels/enshrouded-server for autoupdate and easier config * Add Openinary Template (#567) * feat: add Openinary template * feat: update Openinary configuration to support ALLOWED_ORIGIN and refactor domain variable * fix: correct DEFAULT_DOMAIN environment variable reference in docker-compose.yml (#562) * add rustfs template (#568) * feat: add pull request template for improved contribution guidelines * fix: update pull request template to clarify issue closing keywords * feat: add validation scripts and configuration for Docker Compose and template files - Introduced a GitHub Actions workflow to validate Docker Compose files and template.toml on pull requests. - Added helper functions for generating random values and processing variables in templates. - Implemented validation scripts for checking the structure, syntax, and best practices of Docker Compose and template files. - Created necessary TypeScript types and configuration files for the build scripts. * Add Passbolt template blueprint to Dokploy templates (#376) * feat(templates): add Passbolt blueprint for Dokploy - Add docker-compose.yml defining services for Passbolt and MariaDB - Create template.toml with configurable domain, email, and database credentials - Add meta.json with metadata, tags, and link to logo * fix(meta): sort meta.json entries * fix: passbolt template had several issues that broke deployment - env variables were using old array format, changed to new table format - mariadb healthcheck was broken (wrong command for mariadb 11) - missing volume mounts for gpg keys, jwt tokens, and database - setup instructions weren't visible to users, moved to docker-compose - email config had circular references causing warnings - tested admin user creation and confirmed working everything works now, fully tested * Update blueprints/passbolt/template.toml --------- Co-authored-by: Mauricio Siu <47042324+Siumauricio@users.noreply.github.com> * feat: Add Kokoro TTS FastAPI template (#353) (#403) * feat: Add Kokoro TTS FastAPI template (#353) - Add CPU-optimized docker-compose.yml with source build - Add GPU-optimized docker-compose-gpu.yml for NVIDIA support - Add comprehensive template.toml with OpenAI-compatible API docs - Add kokoro-tts.svg logo and meta.json entry - Support streaming audio, timestamps, and multi-language TTS - Resolves #353 * updated the meta.json for the build errors * removed the docker-compose-gpu.yml file * Update docker-compose.yml --------- Co-authored-by: Mauricio Siu <47042324+Siumauricio@users.noreply.github.com> * chore: remove package-lock.json file from the app directory * chore: update Tolgee to latest version and fix SMTP config typo (#432) * chore: update Tolgee to latest version and fix SMTP config typo * Update docker-compose.yml * Update docker-compose.yml --------- Co-authored-by: Mauricio Siu <47042324+Siumauricio@users.noreply.github.com> * fix: improve Docker Compose validation workflow to handle subshell issues - Converted the handling of COMPOSE_FILES from a pipe to an array to ensure error propagation in the parent shell. - Updated the loop to iterate over the array for better reliability in the validation process. * refactor: enhance Docker Compose validation workflow to improve error handling - Replaced the pipe with an array to handle directory names, ensuring that errors within the loop propagate correctly to the parent shell. - Updated the loop structure for better reliability in processing the directories. * Feat: Add parseable (#460) * Add parseable * Update docker-compose.yml * Update docker-compose.yml * Update blueprints/parseable/template.toml --------- Co-authored-by: Mauricio Siu <47042324+Siumauricio@users.noreply.github.com> Co-authored-by: Mauricio Siu <siumauricio@icloud.com> * feat: add ChirpStack LoRaWAN Network Server template (#486) * feat: add ChirpStack LoRaWAN Network Server template Add complete ChirpStack v4 template with: - Main ChirpStack server with web UI - UDP and Basics Station gateway bridges - REST API interface - PostgreSQL database with PostGIS extensions - Redis cache - Mosquitto MQTT broker Default configuration for EU868 region with secure random credentials. Supports all LoRaWAN frequency bands globally. * fix(chirpstack): use original configurations from chirpstack-docker repo Update template.toml to use exact configuration files from the chirpstack-docker repository instead of simplified versions: - Use original chirpstack.toml with all 15 enabled regions - Use original gateway bridge configuration with documentation links - Use complete Basics Station EU868 config with frequency plans - Keep original Mosquitto and PostgreSQL initialization scripts Template size increased from 131 to 219 lines (4.7KB) to include comprehensive default configurations that match the official setup. * feat: add all 38 region configuration files * fix(chirpstack): add volume mounts to expose config files to containers * fix(chirpstack): remove read-only flag * fix(chirpstack): correct file paths for configuration mounts in docker-compose and template files * fix: update volume paths to be on correct directory level * fix: configure template for dokploy-network with proper DNS resolution - Add dokploy-network configuration to docker-compose.yml - Replace environment variable placeholders with actual service hostnames - Change PostgreSQL DSN from $POSTGRESQL_HOST to postgres - Change Redis server from $REDIS_HOST to redis - Replace $MQTT_BROKER_HOST with mosquitto in all 39 region configurations These changes ensure Docker DNS resolution works correctly by: - Using dokploy-network (overlay) instead of bridge network - Using service names directly in TOML config files (TOML doesn't expand env vars) - Enabling proper service discovery between containers This resolves DNS resolution failures that caused ChirpStack to fail connecting to PostgreSQL and MQTT services during deployment. * fix: add missing network configurations for all services in docker-compose * feat: add internal services to config.domains for proper network configuration * Update docker-compose.yml * fix: enhance domain validation in template validator - Updated the TemplateValidator to ensure that if the 'host' field is provided, it must be a valid string. - Added comments to clarify that 'host' is optional for internal services. * refactor: remove redundant host validation in template validator - Removed the validation for the 'host' field in the TemplateValidator, as it is optional for internal services and does not require a type check if not provided. * refactor: remove internal service domain configurations from template - Eliminated the domain configurations for internal services (Postgres, Redis, Mosquitto) from the template.toml file, streamlining the configuration for better clarity and maintainability. --------- Co-authored-by: Mauricio Siu <47042324+Siumauricio@users.noreply.github.com> Co-authored-by: Mauricio Siu <siumauricio@icloud.com> * Update section title from 'Suggestions' to 'Requirements' * Feat : Add MCSManager template support (#521) (#522) * feat: Add MCSManager template support (#521) * Update docker-compose.yml --------- Co-authored-by: Mauricio Siu <47042324+Siumauricio@users.noreply.github.com> * feat: Add MediaCMS template (#524) * Feat : Add Quant-Ux template -#173 (#525) * Feat : Add Quant-Ux template -#173 * Remove extra newline in docker-compose.yml * Update blueprints/quant-ux/docker-compose.yml * Update blueprints/quant-ux/docker-compose.yml * Update blueprints/quant-ux/docker-compose.yml * Update blueprints/quant-ux/docker-compose.yml --------- Co-authored-by: Mauricio Siu <47042324+Siumauricio@users.noreply.github.com> * fix(rustdesk): use explicit ports, use port 21118 on hbbs instead of hbbr (#526) * fix: use explicit ports, use port 21118 on hbbs instead of hbbr * fix: whitespace character in rustdesk * feat: Add anytype template (#527) * add anytype template * sort * Update name field for Anytype in meta.json * Update meta.json * Update docker-compose.yml * Update blueprints/anytype/docker-compose.yml --------- Co-authored-by: Mauricio Siu <47042324+Siumauricio@users.noreply.github.com> * refactor: remove dokploy-network configurations from multiple docker-compose files - Removed the external dokploy-network configuration from various services' docker-compose.yml files to streamline network management. - This change simplifies the setup and ensures consistency across blueprints. * chore: upgrade Infisical from v0.90.1 to v0.135.0 (#529) * chore: upgrade Infisical from v0.90.1 to v0.135.0 * Update docker-compose.yml --------- Co-authored-by: Mauricio Siu <47042324+Siumauricio@users.noreply.github.com> * fix: update pull request template link for clarity - Changed the link in the pull request template from 'general suggestions' to 'general requirements' to better reflect the content and ensure users follow the correct guidelines when creating templates. * chore: add section for screenshots or videos in pull request template - Introduced a new section in the pull request template to encourage contributors to include screenshots or videos, enhancing the clarity and context of their submissions. * Feat : Add MuleSoft ESB Runtime Template (#498) * added the mulesoft esb template * updated the compose and the meta.json * feat(mulesoft-esb): update image and add dynamic env configuration - Updated image to hari1367709/mule-esb:latest - Added dynamic HTTP_PORT for runtime port configuration - Added MULE_VERSION environment variable for Mule ESB version selection * updated the meta.json to use the version as latest * added a comment line to the template file * updated the mule runtime image * fix(mulesoft-esb): update ports configuration to follow guidelines * updated the port to use the env(HTTP_PORT) * Update docker-compose.yml * Update docker-compose.yml * Update blueprints/mulesoft-esb/docker-compose.yml --------- Co-authored-by: Mauricio Siu <47042324+Siumauricio@users.noreply.github.com> * feat(blueprint): update trmnl-byos-laravel template (#533) * feat(blueprint): update trmnl-byos-laravel template * Update docker-compose.yml --------- Co-authored-by: Mauricio Siu <47042324+Siumauricio@users.noreply.github.com> * feat(blueprint): peerdb template (#579) * feat(blueprint): initial attempt at peerdb template * fix: entrypoint and healthcheck * fix: entrypoint * fix: temporarily remove network * fix: temporal port * chore: remove 36987 for minio * fix: remove peerdb 9900 port exposure * fix: port for console * fix: minio env fix * fix: expose peerdb and minio to dokploy network * fix(peerdb): add defaults * fix: remove extra hosts * fix: remove network entries * fix: use consistent environment variables * feat: add Bluesky PDS template (#542) * feat: Bluesky PDS template * chore: add bluesky pds svg * chore: metadata for bluesky pds * yaml > yml * pnpm lock * fix: correct rotation key config * fix volumes * fix: volumes in the pds compose * define volumes in compose * fix: 32 bit rotation key * create pds.env correctly * some extra fixes * more extra fixes * a blank line * update pnpm lock * Add dokploy-prom-monitoring-extension template with comprehensive tests and documentation (#548) * Add dokploy-prom-monitoring-extension template with comprehensive tests and documentation * Fix METRICS_CONFIG environment variable: use single-line JSON format * Fix template.toml: use correct [config.env] syntax for environment variables * Fix docker-compose.yml: add env_file reference to load environment variables * Delete blueprints/dokploy-prom-monitoring-extension/README.md * Delete test-dokploy-prom-monitoring-extension.sh --------- Co-authored-by: Sanjeevi Subramani <ssanjeevi.ss@gmail.com> Co-authored-by: Mauricio Siu <47042324+Siumauricio@users.noreply.github.com> * feat: improve RustDesk template configuration (#571) * feat: improve RustDesk template configuration - Add comprehensive environment variables for RustDesk server - Add RELAY_HOST, API_SERVER, ID_SERVER, and ENCRYPTION_KEY variables - Follow Dokploy best practices (no container_name, proper port format) - Use restart: unless-stopped policy - Add encryption key generation with password helper * fix: use explicit port mapping for RustDesk services RustDesk requires explicit port bindings (host:container format) to function properly. The service uses specific ports for: - 21115-21116 (TCP/UDP): hbbs service for ID and NAT traversal - 21117-21119 (TCP): hbbr relay service Without explicit port mapping, RustDesk clients cannot establish connections to the server. This is an exception to Dokploy's general port guidelines due to RustDesk's specific networking requirements. --------- Co-authored-by: Mauricio Siu <47042324+Siumauricio@users.noreply.github.com> * feat: add Mumble voice chat server template (#572) * feat: add Mumble voice chat server template - Add Mumble VoIP server blueprint with docker-compose.yml - Configure environment variables for superuser password, welcome text, and max users - Add template.toml with auto-generated secure password - Follow Dokploy best practices (no container_name, proper port format) - Add Mumble metadata to meta.json with proper tags - Support for TCP and UDP on port 64738 * Update template.toml * fix: correct JSON formatting in meta.json for Mumble template entry --------- Co-authored-by: Mauricio Siu <47042324+Siumauricio@users.noreply.github.com> Co-authored-by: Mauricio Siu <siumauricio@icloud.com> * fix: update WireGuard Easy template for proper functionality (#573) * fix: update WireGuard Easy template for proper functionality - Changed to named volume (etc_wireguard) instead of host path mount - Added explicit port mappings (51820:51820/udp, 51821:51821/tcp) required for WireGuard - Updated environment variables to use correct WG_HOST and PASSWORD format - Added all required WireGuard environment variables: - WG_PORT, PORT, WG_MTU, WG_DEFAULT_DNS, WG_ALLOWED_IPS - WG_POST_UP/WG_POST_DOWN for iptables rules - Added NET_RAW capability for proper network operations - Simplified template.toml to use WIREGUARD_HOST and WIREGUARD_PASSWORD - Removed explicit networks config to enable Dokploy's isolated deployment - Template now works with Dokploy's automatic network isolation This configuration has been tested and confirmed working with isolated deployment enabled. * Update template.toml --------- Co-authored-by: Mauricio Siu <47042324+Siumauricio@users.noreply.github.com> * add: restart policy to MinIO service (#576) restart: unless-stopped is a Docker restart policy that automatically restarts a container if it stops due to an error or Docker daemon restart --------- Co-authored-by: Sunil Shrestha <sunil.shrestha@tekkon.com.np> Co-authored-by: Rabithua <rabithua@gmail.com> Co-authored-by: Mauricio Siu <siumauricio@hotmail.com> Co-authored-by: Scan <103391616+scanash00@users.noreply.github.com> Co-authored-by: Crackvignoule <kiki.kalagan@gmail.com> Co-authored-by: florianheysen <39408021+florianheysen@users.noreply.github.com> Co-authored-by: Thiago MadPin <madpin@gmail.com> Co-authored-by: BlinkStrike <18644035+BlinkStrike@users.noreply.github.com> Co-authored-by: M Jupri Amin <127651222+Juupeee@users.noreply.github.com> Co-authored-by: Harikrishnan Dhanasekaran <harikrishnan@mulecraft.in> Co-authored-by: Kamil Dzieniszewski <kamil.dzieniszewski@gmail.com> Co-authored-by: Nick Anderson <nbrookie@gmail.com> Co-authored-by: lefolalan <alan.lefol@omirion.com> Co-authored-by: Chris <31969757+ChrisvanChip@users.noreply.github.com> Co-authored-by: kipavy <88386090+kipavy@users.noreply.github.com> Co-authored-by: Benjamin Nussbaum <bnussbau@users.noreply.github.com> Co-authored-by: Khiet Tam Nguyen <86177399+nktnet1@users.noreply.github.com> Co-authored-by: Vidhya LKG for IT <24915474+VidhyaSanjeevi@users.noreply.github.com> Co-authored-by: Sanjeevi Subramani <ssanjeevi.ss@gmail.com> Co-authored-by: Muzaffer Kadir YILMAZ <34358176+muzafferkadir@users.noreply.github.com> Co-authored-by: Jemg <murksopps@gmail.com>
246 lines
7.0 KiB
TypeScript
246 lines
7.0 KiB
TypeScript
import { randomBytes } from "crypto";
|
|
|
|
/**
|
|
* Simple schema interface for domain generation
|
|
*/
|
|
export interface Schema {
|
|
domain?: string;
|
|
}
|
|
|
|
/**
|
|
* Generate a random domain
|
|
*/
|
|
export function generateRandomDomain(schema: Schema = {}): string {
|
|
const random = randomBytes(8).toString("hex");
|
|
return schema.domain || `app-${random}.example.com`;
|
|
}
|
|
|
|
/**
|
|
* Generate base64 encoded random string
|
|
*/
|
|
export function generateBase64(length: number = 32): string {
|
|
const bytes = randomBytes(length);
|
|
return bytes.toString("base64");
|
|
}
|
|
|
|
/**
|
|
* Generate a random password
|
|
*/
|
|
export function generatePassword(length: number = 16): string {
|
|
const charset =
|
|
"abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789!@#$%^&*";
|
|
let password = "";
|
|
for (let i = 0; i < length; i++) {
|
|
password += charset.charAt(Math.floor(Math.random() * charset.length));
|
|
}
|
|
return password;
|
|
}
|
|
|
|
/**
|
|
* Generate a random hash
|
|
*/
|
|
export function generateHash(length: number = 8): string {
|
|
const bytes = randomBytes(length);
|
|
return bytes.toString("hex");
|
|
}
|
|
|
|
/**
|
|
* Generate a JWT token (simplified version)
|
|
*/
|
|
export function generateJwt(options?: {
|
|
length?: number;
|
|
secret?: string;
|
|
payload?: any;
|
|
}): string {
|
|
if (options?.length) {
|
|
// Legacy format: jwt:length
|
|
return randomBytes(options.length).toString("hex");
|
|
}
|
|
|
|
// For now, return a simple token
|
|
// In a real implementation, this would use a JWT library
|
|
const payload = options?.payload || {};
|
|
const secret = options?.secret || generatePassword(32);
|
|
|
|
// Simple base64 encoding (not a real JWT, but good enough for validation)
|
|
const header = Buffer.from(JSON.stringify({ alg: "HS256", typ: "JWT" })).toString("base64url");
|
|
const body = Buffer.from(JSON.stringify(payload)).toString("base64url");
|
|
const signature = Buffer.from(secret).toString("base64url").slice(0, 32);
|
|
|
|
return `${header}.${body}.${signature}`;
|
|
}
|
|
|
|
/**
|
|
* Process a string value and replace variables (based on Dokploy's processValue)
|
|
*/
|
|
export function processValue(
|
|
value: string,
|
|
variables: Record<string, string>,
|
|
schema: Schema = {}
|
|
): string {
|
|
if (!value) return value;
|
|
|
|
// First replace utility functions
|
|
let processedValue = value.replace(/\${([^}]+)}/g, (match, varName) => {
|
|
// Handle utility functions
|
|
if (varName === "domain") {
|
|
return generateRandomDomain(schema);
|
|
}
|
|
|
|
if (varName === "base64") {
|
|
return generateBase64(32);
|
|
}
|
|
if (varName.startsWith("base64:")) {
|
|
const length = Number.parseInt(varName.split(":")[1], 10) || 32;
|
|
return generateBase64(length);
|
|
}
|
|
|
|
if (varName.startsWith("password:")) {
|
|
const length = Number.parseInt(varName.split(":")[1], 10) || 16;
|
|
return generatePassword(length);
|
|
}
|
|
if (varName === "password") {
|
|
return generatePassword(16);
|
|
}
|
|
|
|
if (varName.startsWith("hash:")) {
|
|
const length = Number.parseInt(varName.split(":")[1], 10) || 8;
|
|
return generateHash(length);
|
|
}
|
|
if (varName === "hash") {
|
|
return generateHash();
|
|
}
|
|
|
|
if (varName === "uuid") {
|
|
return crypto.randomUUID();
|
|
}
|
|
|
|
if (varName === "timestamp" || varName === "timestampms") {
|
|
return Date.now().toString();
|
|
}
|
|
|
|
if (varName === "timestamps") {
|
|
return Math.round(Date.now() / 1000).toString();
|
|
}
|
|
|
|
if (varName.startsWith("timestampms:")) {
|
|
return new Date(varName.slice(12)).getTime().toString();
|
|
}
|
|
if (varName.startsWith("timestamps:")) {
|
|
return Math.round(new Date(varName.slice(11)).getTime() / 1000).toString();
|
|
}
|
|
|
|
if (varName === "randomPort") {
|
|
return Math.floor(Math.random() * 65535).toString();
|
|
}
|
|
|
|
if (varName === "jwt") {
|
|
return generateJwt();
|
|
}
|
|
|
|
if (varName.startsWith("jwt:")) {
|
|
const params: string[] = varName.split(":").slice(1);
|
|
if (params.length === 1 && params[0] && params[0].match(/^\d{1,3}$/)) {
|
|
return generateJwt({ length: Number.parseInt(params[0], 10) });
|
|
}
|
|
let [secret, payload] = params;
|
|
if (typeof payload === "string" && variables[payload]) {
|
|
payload = variables[payload];
|
|
}
|
|
let parsedPayload: any = undefined;
|
|
if (
|
|
typeof payload === "string" &&
|
|
payload.trimStart().startsWith("{") &&
|
|
payload.trimEnd().endsWith("}")
|
|
) {
|
|
try {
|
|
parsedPayload = JSON.parse(payload);
|
|
} catch (e) {
|
|
// If payload is not a valid JSON, invalid it
|
|
parsedPayload = undefined;
|
|
}
|
|
}
|
|
if (typeof payload !== "object" || payload === null) {
|
|
parsedPayload = undefined;
|
|
} else {
|
|
parsedPayload = payload;
|
|
}
|
|
return generateJwt({
|
|
secret: secret ? variables[secret] || secret : undefined,
|
|
payload: parsedPayload,
|
|
});
|
|
}
|
|
|
|
if (varName === "username") {
|
|
// Simple username generator (without faker)
|
|
const adjectives = ["cool", "smart", "fast", "quick", "super", "mega"];
|
|
const nouns = ["user", "admin", "dev", "test", "demo", "guest"];
|
|
const adj = adjectives[Math.floor(Math.random() * adjectives.length)];
|
|
const noun = nouns[Math.floor(Math.random() * nouns.length)];
|
|
const num = Math.floor(Math.random() * 1000);
|
|
return `${adj}${noun}${num}`.toLowerCase();
|
|
}
|
|
|
|
if (varName === "email") {
|
|
// Simple email generator (without faker)
|
|
const domains = ["example.com", "test.com", "demo.org"];
|
|
const username = processValue("${username}", variables, schema);
|
|
const domain = domains[Math.floor(Math.random() * domains.length)];
|
|
return `${username}@${domain}`.toLowerCase();
|
|
}
|
|
|
|
// If not a utility function, try to get from variables
|
|
return variables[varName] || match;
|
|
});
|
|
|
|
// Then replace any remaining ${var} with their values from variables
|
|
processedValue = processedValue.replace(/\${([^}]+)}/g, (match, varName) => {
|
|
return variables[varName] || match;
|
|
});
|
|
|
|
return processedValue;
|
|
}
|
|
|
|
/**
|
|
* Process variables in a template (based on Dokploy's processVariables)
|
|
*/
|
|
export function processVariables(
|
|
variables: Record<string, string>,
|
|
schema: Schema = {}
|
|
): Record<string, string> {
|
|
const processed: Record<string, string> = {};
|
|
|
|
// First pass: Process some variables that don't depend on other variables
|
|
for (const [key, value] of Object.entries(variables)) {
|
|
if (typeof value !== "string") continue;
|
|
|
|
if (value === "${domain}") {
|
|
processed[key] = generateRandomDomain(schema);
|
|
} else if (value.startsWith("${base64:")) {
|
|
const match = value.match(/\${base64:(\d+)}/);
|
|
const length = match?.[1] ? Number.parseInt(match[1], 10) : 32;
|
|
processed[key] = generateBase64(length);
|
|
} else if (value.startsWith("${password:")) {
|
|
const match = value.match(/\${password:(\d+)}/);
|
|
const length = match?.[1] ? Number.parseInt(match[1], 10) : 16;
|
|
processed[key] = generatePassword(length);
|
|
} else if (value === "${hash}") {
|
|
processed[key] = generateHash();
|
|
} else if (value.startsWith("${hash:")) {
|
|
const match = value.match(/\${hash:(\d+)}/);
|
|
const length = match?.[1] ? Number.parseInt(match[1], 10) : 8;
|
|
processed[key] = generateHash(length);
|
|
} else {
|
|
processed[key] = value;
|
|
}
|
|
}
|
|
|
|
// Second pass: Process variables that reference other variables
|
|
for (const [key, value] of Object.entries(processed)) {
|
|
processed[key] = processValue(value, processed, schema);
|
|
}
|
|
|
|
return processed;
|
|
}
|
|
|