mirror of
https://github.com/truenas/charts.git
synced 2026-04-02 10:21:14 +08:00
Publish new changes in catalog
This commit is contained in:
@@ -1,6 +0,0 @@
|
||||
dependencies:
|
||||
- name: common
|
||||
repository: file://../../../common
|
||||
version: 1.2.3
|
||||
digest: sha256:e6ff49b06bf5d4d159e505ae6d153f36cd46170bb519caf90462cd5caebfd0fb
|
||||
generated: "2023-11-22T22:25:29.165074717+02:00"
|
||||
Binary file not shown.
6
charts/elastic-search/1.1.2/Chart.lock
Normal file
6
charts/elastic-search/1.1.2/Chart.lock
Normal file
@@ -0,0 +1,6 @@
|
||||
dependencies:
|
||||
- name: common
|
||||
repository: file://../../../common
|
||||
version: 1.2.4
|
||||
digest: sha256:47ebfd41bc2ac33ab6989e7bd4d1d3aea662365fffa8b525a24cc56a2a35c174
|
||||
generated: "2023-12-13T11:12:21.591788241+02:00"
|
||||
@@ -4,9 +4,9 @@ description: Elasticsearch is the distributed, RESTful search and analytics engi
|
||||
annotations:
|
||||
title: Elastic Search
|
||||
type: application
|
||||
version: 1.1.1
|
||||
version: 1.1.2
|
||||
apiVersion: v2
|
||||
appVersion: 8.11.2
|
||||
appVersion: 8.11.3
|
||||
kubeVersion: '>=1.16.0-0'
|
||||
maintainers:
|
||||
- name: truenas
|
||||
@@ -15,7 +15,7 @@ maintainers:
|
||||
dependencies:
|
||||
- name: common
|
||||
repository: file://../../../common
|
||||
version: 1.2.3
|
||||
version: 1.2.4
|
||||
home: https://www.elastic.co
|
||||
icon: https://media.sys.truenas.net/apps/elastic-search/icons/icon.svg
|
||||
sources:
|
||||
BIN
charts/elastic-search/1.1.2/charts/common-1.2.4.tgz
Normal file
BIN
charts/elastic-search/1.1.2/charts/common-1.2.4.tgz
Normal file
Binary file not shown.
@@ -1,7 +1,7 @@
|
||||
image:
|
||||
repository: docker.elastic.co/elasticsearch/elasticsearch
|
||||
pullPolicy: IfNotPresent
|
||||
tag: 8.11.2
|
||||
tag: 8.11.3
|
||||
|
||||
resources:
|
||||
limits:
|
||||
@@ -3,9 +3,9 @@ description: Real-time performance monitoring, done right!
|
||||
annotations:
|
||||
title: Netdata
|
||||
type: application
|
||||
version: 1.0.38
|
||||
version: 1.0.39
|
||||
apiVersion: v2
|
||||
appVersion: v1.44.0
|
||||
appVersion: v1.44.1
|
||||
kubeVersion: '>=1.16.0-0'
|
||||
maintainers:
|
||||
- name: truenas
|
||||
@@ -1,6 +1,6 @@
|
||||
image:
|
||||
pullPolicy: IfNotPresent
|
||||
repository: netdata/netdata
|
||||
tag: v1.44.0
|
||||
tag: v1.44.1
|
||||
runAsGroup: 201
|
||||
runAsUser: 201
|
||||
21
charts/nextcloud/1.6.54/.helmignore
Normal file
21
charts/nextcloud/1.6.54/.helmignore
Normal file
@@ -0,0 +1,21 @@
|
||||
# Patterns to ignore when building packages.
|
||||
# This supports shell glob matching, relative path matching, and
|
||||
# negation (prefixed with !). Only one pattern per line.
|
||||
.DS_Store
|
||||
# Common VCS dirs
|
||||
.git/
|
||||
.gitignore
|
||||
.bzr/
|
||||
.bzrignore
|
||||
.hg/
|
||||
.hgignore
|
||||
.svn/
|
||||
# Common backup files
|
||||
*.swp
|
||||
*.bak
|
||||
*.tmp
|
||||
*~
|
||||
# Various IDEs
|
||||
.project
|
||||
.idea/
|
||||
*.tmproj
|
||||
6
charts/nextcloud/1.6.54/Chart.lock
Normal file
6
charts/nextcloud/1.6.54/Chart.lock
Normal file
@@ -0,0 +1,6 @@
|
||||
dependencies:
|
||||
- name: common
|
||||
repository: file://../../../common/2304.0.1
|
||||
version: 2304.0.1
|
||||
digest: sha256:1ed155c6760e1166e2cb75b52bc5e81c6bdf0252c16ff5ede001157077c41670
|
||||
generated: "2023-04-24T13:40:41.468936547+03:00"
|
||||
30
charts/nextcloud/1.6.54/Chart.yaml
Normal file
30
charts/nextcloud/1.6.54/Chart.yaml
Normal file
@@ -0,0 +1,30 @@
|
||||
name: nextcloud
|
||||
description: A file sharing server that puts the control and security of your own
|
||||
data back into your hands.
|
||||
annotations:
|
||||
title: Nextcloud
|
||||
type: application
|
||||
version: 1.6.54
|
||||
apiVersion: v2
|
||||
appVersion: 28.0.0
|
||||
kubeVersion: '>=1.16.0-0'
|
||||
maintainers:
|
||||
- name: truenas
|
||||
url: https://www.truenas.com/
|
||||
email: dev@ixsystems.com
|
||||
dependencies:
|
||||
- name: common
|
||||
repository: file://../../../common/2304.0.1
|
||||
version: 2304.0.1
|
||||
home: https://nextcloud.com/
|
||||
icon: https://media.sys.truenas.net/apps/nextcloud/icons/icon.svg
|
||||
sources:
|
||||
- https://github.com/nextcloud/docker
|
||||
- https://github.com/nextcloud/helm
|
||||
- https://github.com/truenas/charts/tree/master/charts/nextcloud
|
||||
keywords:
|
||||
- nextcloud
|
||||
- storage
|
||||
- http
|
||||
- web
|
||||
- php
|
||||
11
charts/nextcloud/1.6.54/README.md
Normal file
11
charts/nextcloud/1.6.54/README.md
Normal file
@@ -0,0 +1,11 @@
|
||||
# nextcloud
|
||||
|
||||
[nextcloud](https://nextcloud.com/) is a file sharing server that puts the control and security of your own data back into your hands.
|
||||
|
||||
## Introduction
|
||||
|
||||
This chart bootstraps an [nextcloud](https://hub.docker.com/_/nextcloud/) deployment on a [Kubernetes](http://kubernetes.io) cluster using the [Helm](https://helm.sh) package manager.
|
||||
|
||||
## Configuration
|
||||
|
||||
Please refer to questions.yaml for a detailed overview on supported configurable values.
|
||||
3
charts/nextcloud/1.6.54/app-readme.md
Normal file
3
charts/nextcloud/1.6.54/app-readme.md
Normal file
@@ -0,0 +1,3 @@
|
||||
# nextcloud
|
||||
|
||||
[nextcloud](https://nextcloud.com/) is a file sharing server that puts the control and security of your own data back into your hands.
|
||||
BIN
charts/nextcloud/1.6.54/charts/common-2304.0.1.tgz
Normal file
BIN
charts/nextcloud/1.6.54/charts/common-2304.0.1.tgz
Normal file
Binary file not shown.
45
charts/nextcloud/1.6.54/ci/test-values.yaml
Normal file
45
charts/nextcloud/1.6.54/ci/test-values.yaml
Normal file
@@ -0,0 +1,45 @@
|
||||
appVolumeMounts:
|
||||
nextcloud-data:
|
||||
emptyDir: true
|
||||
mountPath: /var/www
|
||||
cronjob:
|
||||
enabled: false
|
||||
schedule: 1 */24 * * *
|
||||
dnsConfig:
|
||||
options: []
|
||||
emptyDirVolumes: true
|
||||
environmentVariables: []
|
||||
ixChartContext: {}
|
||||
nginxConfig:
|
||||
proxy_timeouts: 120
|
||||
useDifferentAccessPort: true
|
||||
externalPort: 443
|
||||
nextcloud:
|
||||
datadir: /var/www/html/data
|
||||
host: nextcloud.kube.home
|
||||
install_ffmpeg: true
|
||||
install_smbclient: true
|
||||
max_upload_size: 5
|
||||
max_execution_time: 30
|
||||
php_memory_limit: 512
|
||||
opcache_memory_consumption: 128
|
||||
password: changeme
|
||||
username: admin
|
||||
postgresAppVolumeMounts:
|
||||
postgres-backup:
|
||||
emptyDir: true
|
||||
mountPath: /postgres_backups
|
||||
postgres-data:
|
||||
emptyDir: true
|
||||
mountPath: /var/lib/postgresql/data
|
||||
postgresql:
|
||||
backupVolume:
|
||||
datasetName: ix-postgres_backups
|
||||
mountPath: /postgres_backups
|
||||
dataVolume:
|
||||
datasetName: ix-postgres_data
|
||||
mountPath: /var/lib/postgresql/data
|
||||
service:
|
||||
nodePort: 31000
|
||||
updateStrategy: Recreate
|
||||
useServiceNameForHost: true
|
||||
10
charts/nextcloud/1.6.54/ix_values.yaml
Normal file
10
charts/nextcloud/1.6.54/ix_values.yaml
Normal file
@@ -0,0 +1,10 @@
|
||||
image:
|
||||
pullPolicy: IfNotPresent
|
||||
repository: nextcloud
|
||||
tag: 28.0.0
|
||||
nginx:
|
||||
image:
|
||||
pullPolicy: IfNotPresent
|
||||
repository: nginx
|
||||
tag: 1.23.3
|
||||
useServiceNameForHost: false
|
||||
46
charts/nextcloud/1.6.54/metadata.yaml
Normal file
46
charts/nextcloud/1.6.54/metadata.yaml
Normal file
@@ -0,0 +1,46 @@
|
||||
runAsContext:
|
||||
- userName: root
|
||||
groupName: root
|
||||
gid: 0
|
||||
uid: 0
|
||||
description: Nextcloud runs as root user.
|
||||
- userName: root
|
||||
groupName: root
|
||||
gid: 0
|
||||
uid: 0
|
||||
description: Postgres runs as root user.
|
||||
- userName: root
|
||||
groupName: root
|
||||
gid: 0
|
||||
uid: 0
|
||||
description: Nginx runs as root user. (Nginx only runs when certificate is provided)
|
||||
capabilities:
|
||||
- name: CHOWN
|
||||
description: Nextcloud, Nginx and Postgres are able to chown files.
|
||||
- name: FOWNER
|
||||
description: Nextcloud, Nginx and Postgres are able to bypass permission checks for it's sub-processes.
|
||||
- name: SYS_CHROOT
|
||||
description: Nextcloud, Nginx and Postgres are able to use chroot.
|
||||
- name: MKNOD
|
||||
description: Nextcloud, Nginx and Postgres are able to create device nodes.
|
||||
- name: DAC_OVERRIDE
|
||||
description: Nextcloud, Nginx and Postgres are able to bypass permission checks.
|
||||
- name: FSETID
|
||||
description: Nextcloud, Nginx and Postgres are able to set file capabilities.
|
||||
- name: KILL
|
||||
description: Nextcloud, Nginx and Postgres are able to kill processes.
|
||||
- name: SETGID
|
||||
description: Nextcloud, Nginx and Postgres are able to set group ID for it's sub-processes.
|
||||
- name: SETUID
|
||||
description: Nextcloud, Nginx and Postgres are able to set user ID for it's sub-processes.
|
||||
- name: SETPCAP
|
||||
description: Nextcloud, Nginx and Postgres are able to set process capabilities.
|
||||
- name: NET_BIND_SERVICE
|
||||
description: Nextcloud, Nginx and Postgres are able to bind to privileged ports.
|
||||
- name: SETFCAP
|
||||
description: Nextcloud, Nginx and Postgres are able to set file capabilities.
|
||||
- name: NET_RAW
|
||||
description: Nextcloud, Nginx and Postgres are able to use raw sockets.
|
||||
- name: AUDIT_WRITE
|
||||
description: Nextcloud, Nginx and Postgres are able to write to audit log.
|
||||
hostMounts: []
|
||||
26
charts/nextcloud/1.6.54/migrations/migrate_from_1.1.0
Executable file
26
charts/nextcloud/1.6.54/migrations/migrate_from_1.1.0
Executable file
@@ -0,0 +1,26 @@
|
||||
#!/usr/bin/python3
|
||||
import json
|
||||
import os
|
||||
import sys
|
||||
|
||||
|
||||
def migrate(values):
|
||||
values.update({
|
||||
'appVolumeMounts': {
|
||||
'nextcloud-data': {
|
||||
'hostPathEnabled': values['nextcloudDataHostPathEnabled'],
|
||||
**({'hostPath': values['nextcloudHostPath']} if values.get('nextcloudHostPath') else {})
|
||||
},
|
||||
},
|
||||
'updateStrategy': values.get('nextcloud').get('strategy', 'Recreate'),
|
||||
})
|
||||
return values
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
if len(sys.argv) != 2:
|
||||
exit(1)
|
||||
|
||||
if os.path.exists(sys.argv[1]):
|
||||
with open(sys.argv[1], 'r') as f:
|
||||
print(json.dumps(migrate(json.loads(f.read()))))
|
||||
437
charts/nextcloud/1.6.54/questions.yaml
Normal file
437
charts/nextcloud/1.6.54/questions.yaml
Normal file
@@ -0,0 +1,437 @@
|
||||
groups:
|
||||
- name: "Container Images"
|
||||
description: "Image to be used for container"
|
||||
- name: "Nextcloud Configuration"
|
||||
description: "Configuration details for Nextcloud workload"
|
||||
- name: "Storage"
|
||||
description: "Configure Storage for Nextcloud"
|
||||
- name: "Container Configuration"
|
||||
description: "Configure nextcloud container parameters"
|
||||
- name: "Postgresql Configuration"
|
||||
description: "Configure Postgresql for nextcloud"
|
||||
- name: "CronJob configuration"
|
||||
description: "Configure CronJob for nextcloud"
|
||||
- name: "Scaling/Upgrade Policy"
|
||||
description: "Configure how pods are replaced when configuration is upgraded"
|
||||
- name: "Advanced DNS Settings"
|
||||
description: "Configure DNS settings"
|
||||
- name: "Resource Limits"
|
||||
description: "Set CPU/memory limits for Kubernetes Pod"
|
||||
|
||||
|
||||
portals:
|
||||
web_portal:
|
||||
protocols:
|
||||
- "$kubernetes-resource_configmap_nginx-configuration_protocol"
|
||||
host:
|
||||
- "$variable-nextcloud.host"
|
||||
ports:
|
||||
- "$variable-service.nodePort"
|
||||
|
||||
questions:
|
||||
|
||||
- variable: dnsConfig
|
||||
label: "DNS Configuration"
|
||||
group: "Advanced DNS Settings"
|
||||
schema:
|
||||
type: dict
|
||||
attrs:
|
||||
- variable: options
|
||||
label: "DNS Options"
|
||||
schema:
|
||||
type: list
|
||||
items:
|
||||
- variable: optionsEntry
|
||||
label: "Option Entry Configuration"
|
||||
schema:
|
||||
type: dict
|
||||
attrs:
|
||||
- variable: name
|
||||
label: "Option Name"
|
||||
schema:
|
||||
type: string
|
||||
required: true
|
||||
- variable: value
|
||||
label: "Option Value"
|
||||
schema:
|
||||
type: string
|
||||
required: true
|
||||
|
||||
- variable: certificate
|
||||
description: "Configure Certificate for Nextcloud"
|
||||
label: "Certificate Configuration"
|
||||
group: "Nextcloud Configuration"
|
||||
schema:
|
||||
type: int
|
||||
$ref:
|
||||
- "definitions/certificate"
|
||||
|
||||
- variable: nginxConfig
|
||||
description: "Configure Nginx for Nextcloud"
|
||||
label: "Nginx Configuration"
|
||||
group: "Nextcloud Configuration"
|
||||
schema:
|
||||
type: dict
|
||||
show_if: [["certificate", "!=", null]]
|
||||
attrs:
|
||||
- variable: proxy_timeouts
|
||||
label: "Proxy timeouts (Seconds)"
|
||||
description: |
|
||||
Applies the timeout to the following settings:</br>
|
||||
- proxy_connect_timeout</br>
|
||||
- proxy_send_timeout</br>
|
||||
- proxy_read_timeout</br>
|
||||
schema:
|
||||
type: int
|
||||
min: 30
|
||||
default: 60
|
||||
required: true
|
||||
- variable: useDifferentAccessPort
|
||||
label: "Use different port for URL rewrites"
|
||||
description: |
|
||||
If enabled, the URL rewrite will use [Access Port] defined below instead of the [Node Port].</br>
|
||||
Note that Nextcloud will still listen on the [Node Port]. (Default 9001)
|
||||
schema:
|
||||
type: boolean
|
||||
default: false
|
||||
- variable: externalAccessPort
|
||||
label: "External Access Port"
|
||||
schema:
|
||||
type: int
|
||||
show_if: [["useDifferentAccessPort", "=", true]]
|
||||
min: 443
|
||||
max: 65535
|
||||
default: 443
|
||||
required: true
|
||||
|
||||
- variable: nextcloud
|
||||
description: "Nextcloud configuration details"
|
||||
label: "Nextcloud Configuration"
|
||||
group: "Nextcloud Configuration"
|
||||
schema:
|
||||
type: dict
|
||||
required: true
|
||||
additional_attrs: true
|
||||
attrs:
|
||||
- variable: host
|
||||
description: "Nextcloud host to create application URLs"
|
||||
label: "Nextcloud host"
|
||||
schema:
|
||||
type: string
|
||||
$ref:
|
||||
- "definitions/nodeIP"
|
||||
- variable: username
|
||||
label: "Username"
|
||||
description: "Name of the Nextcloud admin user"
|
||||
schema:
|
||||
type: string
|
||||
default: "admin"
|
||||
required: true
|
||||
- variable: password
|
||||
label: "Password"
|
||||
description: "Password for the Nextcloud admin user"
|
||||
schema:
|
||||
type: string
|
||||
private: true
|
||||
default: "changeme"
|
||||
required: true
|
||||
- variable: datadir
|
||||
label: "Nextcloud data directory"
|
||||
description: "Configures the data directory where nextcloud stores all files from the users"
|
||||
schema:
|
||||
type: path
|
||||
default: "/var/www/html/data"
|
||||
required: true
|
||||
- variable: install_ffmpeg
|
||||
label: "Install ffmpeg"
|
||||
description: "Automatically Install ffmpeg when the container starts"
|
||||
schema:
|
||||
type: boolean
|
||||
default: false
|
||||
- variable: install_smbclient
|
||||
label: "Install smbclient"
|
||||
description: "Automatically Install smbclient when the container starts"
|
||||
schema:
|
||||
type: boolean
|
||||
default: false
|
||||
- variable: max_upload_size
|
||||
label: "Max Upload Size (Giga Bytes)"
|
||||
description: |
|
||||
Applies the timeout to the following settings:</br>
|
||||
- client_max_body_size in nginx</br>
|
||||
- post_max_size and upload_max_filesize in php</br>
|
||||
schema:
|
||||
type: int
|
||||
default: 3
|
||||
min: 1
|
||||
required: true
|
||||
- variable: max_execution_time
|
||||
label: "Max Execution Time (Seconds)"
|
||||
description: "Configures the max execution time of php"
|
||||
schema:
|
||||
type: int
|
||||
default: 30
|
||||
min: 30
|
||||
required: true
|
||||
- variable: php_memory_limit
|
||||
label: "PHP Memory Limit (Mega Bytes)"
|
||||
description: "Configures the memory limit of php"
|
||||
schema:
|
||||
type: int
|
||||
default: 512
|
||||
min: 128
|
||||
max: 4096
|
||||
required: true
|
||||
- variable: opcache_memory_consumption
|
||||
label: "Opcache Memory Consumption (Mega Bytes)"
|
||||
description: "Configures the memory consumption of the opcache"
|
||||
schema:
|
||||
type: int
|
||||
min: 128
|
||||
max: 1024
|
||||
default: 128
|
||||
required: true
|
||||
|
||||
- variable: cronjob
|
||||
description: "Setup cronjob for nextcloud"
|
||||
label: "Setup cronjob for nextcloud"
|
||||
group: "CronJob configuration"
|
||||
schema:
|
||||
type: dict
|
||||
attrs:
|
||||
- variable: enabled
|
||||
label: "Enable cronjobs for nextcloud"
|
||||
schema:
|
||||
type: boolean
|
||||
default: false
|
||||
show_subquestions_if: true
|
||||
subquestions:
|
||||
- variable: schedule
|
||||
label: Schedule
|
||||
schema:
|
||||
type: string
|
||||
default: "*/15 * * * *"
|
||||
empty: false
|
||||
|
||||
# Update strategy
|
||||
- variable: updateStrategy
|
||||
description: "Upgrade Policy"
|
||||
label: "Update Strategy"
|
||||
group: "Scaling/Upgrade Policy"
|
||||
schema:
|
||||
type: string
|
||||
default: "Recreate"
|
||||
enum:
|
||||
- value: "RollingUpdate"
|
||||
description: "Create new pods and then kill old ones"
|
||||
- value: "Recreate"
|
||||
description: "Kill existing pods before creating new ones"
|
||||
|
||||
- variable: service
|
||||
description: "Nextcloud Service Configuration"
|
||||
label: "Nextcloud Service Configuration"
|
||||
group: "Nextcloud Configuration"
|
||||
schema:
|
||||
type: dict
|
||||
required: true
|
||||
attrs:
|
||||
- variable: nodePort
|
||||
label: "Node Port to use for Nextcloud"
|
||||
schema:
|
||||
type: int
|
||||
min: 9000
|
||||
max: 65535
|
||||
default: 9001
|
||||
required: true
|
||||
|
||||
- variable: appVolumeMounts
|
||||
label: "Nextcloud Storage"
|
||||
group: "Storage"
|
||||
schema:
|
||||
type: dict
|
||||
attrs:
|
||||
- variable: nextcloud-data
|
||||
label: "Nextcloud Data Volume"
|
||||
schema:
|
||||
type: dict
|
||||
attrs:
|
||||
- variable: datasetName
|
||||
label: "Nextcloud Data Volume Name"
|
||||
schema:
|
||||
type: string
|
||||
hidden: true
|
||||
$ref:
|
||||
- "normalize/ixVolume"
|
||||
show_if: [["hostPathEnabled", "=", false]]
|
||||
default: "ix-nextcloud_data"
|
||||
editable: false
|
||||
- variable: mountPath
|
||||
label: "Nextcloud Data Mount Path"
|
||||
description: "Path where the volume will be mounted inside the pod"
|
||||
schema:
|
||||
type: path
|
||||
hidden: true
|
||||
editable: false
|
||||
default: "/var/www"
|
||||
- variable: hostPathEnabled
|
||||
label: "Enable Host Path for Nextcloud Data Volume"
|
||||
schema:
|
||||
type: boolean
|
||||
default: false
|
||||
show_subquestions_if: true
|
||||
subquestions:
|
||||
- variable: hostPath
|
||||
label: "Host Path for Nextcloud Data Volume"
|
||||
schema:
|
||||
type: hostpath
|
||||
required: true
|
||||
|
||||
- variable: extraAppVolumeMounts
|
||||
label: "Nextcloud Extra Host Path Volumes"
|
||||
group: "Storage"
|
||||
schema:
|
||||
type: list
|
||||
items:
|
||||
- variable: extraAppVolume
|
||||
label: "Nextcloud Host Path Volume"
|
||||
description: "Add an extra host path volume for nextcloud application"
|
||||
schema:
|
||||
type: dict
|
||||
attrs:
|
||||
- variable: mountPath
|
||||
label: "Mount Path in Pod"
|
||||
description: "Path where the volume will be mounted inside the pod"
|
||||
schema:
|
||||
type: path
|
||||
required: true
|
||||
- variable: hostPath
|
||||
label: "Host Path"
|
||||
description: "Host path"
|
||||
schema:
|
||||
type: hostpath
|
||||
required: true
|
||||
|
||||
- variable: postgresAppVolumeMounts
|
||||
label: "Postgres Storage"
|
||||
group: "Storage"
|
||||
schema:
|
||||
type: dict
|
||||
attrs:
|
||||
- variable: postgres-data
|
||||
label: "Postgres Data Volume"
|
||||
schema:
|
||||
type: dict
|
||||
attrs:
|
||||
- variable: datasetName
|
||||
label: "Postgres Data Volume Name"
|
||||
schema:
|
||||
type: string
|
||||
hidden: true
|
||||
$ref:
|
||||
- "normalize/ixVolume"
|
||||
default: "ix-postgres_data"
|
||||
show_if: [["hostPathEnabled", "=", false]]
|
||||
editable: false
|
||||
|
||||
- variable: mountPath
|
||||
label: "Postgresql Data Mount Path"
|
||||
description: "Path where the volume will be mounted inside the pod"
|
||||
schema:
|
||||
type: path
|
||||
hidden: true
|
||||
editable: false
|
||||
default: "/var/lib/postgresql/data"
|
||||
- variable: hostPathEnabled
|
||||
label: "Enable Host Path for Postgres Data Volume"
|
||||
schema:
|
||||
type: boolean
|
||||
default: false
|
||||
show_subquestions_if: true
|
||||
subquestions:
|
||||
- variable: hostPath
|
||||
label: "Host Path for Postgres Data Volume"
|
||||
schema:
|
||||
type: hostpath
|
||||
required: true
|
||||
|
||||
- variable: postgres-backup
|
||||
label: "Postgres Backup Volume"
|
||||
schema:
|
||||
type: dict
|
||||
attrs:
|
||||
- variable: datasetName
|
||||
label: "Postgres Backup Volume Name"
|
||||
schema:
|
||||
type: string
|
||||
hidden: true
|
||||
$ref:
|
||||
- "normalize/ixVolume"
|
||||
default: "ix-postgres_backups"
|
||||
show_if: [["hostPathEnabled", "=", false]]
|
||||
editable: false
|
||||
- variable: mountPath
|
||||
label: "Postgresql Backup Mount Path"
|
||||
description: "Path where the volume will be mounted inside the pod"
|
||||
schema:
|
||||
type: path
|
||||
hidden: true
|
||||
editable: false
|
||||
default: "/postgres_backups"
|
||||
- variable: hostPathEnabled
|
||||
label: "Enable Host Path for Postgres Backup Volume"
|
||||
schema:
|
||||
type: boolean
|
||||
default: false
|
||||
show_subquestions_if: true
|
||||
subquestions:
|
||||
- variable: hostPath
|
||||
label: "Host Path for Postgres Backup Volume"
|
||||
schema:
|
||||
type: hostpath
|
||||
required: true
|
||||
|
||||
- variable: enableResourceLimits
|
||||
label: "Enable Pod resource limits"
|
||||
group: "Resource Limits"
|
||||
schema:
|
||||
type: boolean
|
||||
default: false
|
||||
- variable: cpuLimit
|
||||
label: "CPU Limit"
|
||||
description: "CPU resource limit allow plain integer values with suffix m(milli) e.g 1000m, 100."
|
||||
group: "Resource Limits"
|
||||
schema:
|
||||
type: string
|
||||
show_if: [["enableResourceLimits", "=", true]]
|
||||
valid_chars: "^\\d+(?:\\.\\d+(?!.*m$)|m?$)"
|
||||
default: "4000m"
|
||||
- variable: memLimit
|
||||
label: "Memory Limit"
|
||||
group: "Resource Limits"
|
||||
description: "Memory limits is specified by number of bytes. Followed by quantity suffix like E,P,T,G,M,k and Ei,Pi,Ti,Mi,Gi,Ki can also be used. e.g 129e6, 129M, 128974848000m, 123Mi"
|
||||
schema:
|
||||
type: string
|
||||
show_if: [["enableResourceLimits", "=", true]]
|
||||
valid_chars: "^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$"
|
||||
default: "8Gi"
|
||||
|
||||
- variable: environmentVariables
|
||||
label: "Nextcloud environment"
|
||||
group: "Nextcloud Configuration"
|
||||
schema:
|
||||
type: list
|
||||
default: []
|
||||
items:
|
||||
- variable: environmentVariable
|
||||
label: "Environment Variable"
|
||||
schema:
|
||||
type: dict
|
||||
attrs:
|
||||
- variable: name
|
||||
label: "Name"
|
||||
schema:
|
||||
type: string
|
||||
- variable: value
|
||||
label: "Value"
|
||||
schema:
|
||||
type: string
|
||||
16
charts/nextcloud/1.6.54/templates/NOTES.txt
Normal file
16
charts/nextcloud/1.6.54/templates/NOTES.txt
Normal file
@@ -0,0 +1,16 @@
|
||||
## Database
|
||||
You can connect to the database using the pgAdmin App from the catalog
|
||||
|
||||
<details>
|
||||
<summary>Database Details</summary>
|
||||
|
||||
- Database: `nextcloud`
|
||||
- Username: `{{ .Values.nextcloudDbUser | b64dec }}`
|
||||
- Password: `{{ .Values.nextcloudDbPass | b64dec }}`
|
||||
- Host: `{{ .Values.nextcloudDbHost }}.{{ .Release.Namespace }}.svc.cluster.local`
|
||||
- Port: `5432`
|
||||
|
||||
</details>
|
||||
{{- $_ := unset .Values "nextcloudDbUser" }}
|
||||
{{- $_ := unset .Values "nextcloudDbPass" }}
|
||||
{{- $_ := unset .Values "nextcloudDbHost" }}
|
||||
79
charts/nextcloud/1.6.54/templates/_nginx.tpl
Normal file
79
charts/nextcloud/1.6.54/templates/_nginx.tpl
Normal file
@@ -0,0 +1,79 @@
|
||||
{{/*
|
||||
Retrieve true/false if certificate is configured
|
||||
*/}}
|
||||
{{- define "nginx.certAvailable" -}}
|
||||
{{- if .Values.certificate -}}
|
||||
{{- $values := (. | mustDeepCopy) -}}
|
||||
{{- $_ := set $values "commonCertOptions" (dict "certKeyName" $values.Values.certificate) -}}
|
||||
{{- template "common.resources.cert_present" $values -}}
|
||||
{{- else -}}
|
||||
{{- false -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
|
||||
{{/*
|
||||
Retrieve public key of certificate
|
||||
*/}}
|
||||
{{- define "nginx.cert.publicKey" -}}
|
||||
{{- $values := (. | mustDeepCopy) -}}
|
||||
{{- $_ := set $values "commonCertOptions" (dict "certKeyName" $values.Values.certificate "publicKey" true) -}}
|
||||
{{ include "common.resources.cert" $values }}
|
||||
{{- end -}}
|
||||
|
||||
|
||||
{{/*
|
||||
Retrieve private key of certificate
|
||||
*/}}
|
||||
{{- define "nginx.cert.privateKey" -}}
|
||||
{{- $values := (. | mustDeepCopy) -}}
|
||||
{{- $_ := set $values "commonCertOptions" (dict "certKeyName" $values.Values.certificate) -}}
|
||||
{{ include "common.resources.cert" $values }}
|
||||
{{- end -}}
|
||||
|
||||
|
||||
{{/*
|
||||
Retrieve configured protocol scheme for nextcloud
|
||||
*/}}
|
||||
{{- define "nginx.scheme" -}}
|
||||
{{- if eq (include "nginx.certAvailable" .) "true" -}}
|
||||
{{- print "https" -}}
|
||||
{{- else -}}
|
||||
{{- print "http" -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
|
||||
{{/*
|
||||
Retrieve nginx certificate secret name
|
||||
*/}}
|
||||
{{- define "nginx.secretName" -}}
|
||||
{{- print "nginx-secret" -}}
|
||||
{{- end -}}
|
||||
|
||||
|
||||
{{/*
|
||||
Formats volumeMount for tls keys and trusted certs
|
||||
*/}}
|
||||
{{- define "nginx.tlsKeysVolumeMount" -}}
|
||||
{{- if eq (include "nginx.certAvailable" .) "true" -}}
|
||||
- name: cert-secret-volume
|
||||
mountPath: "/etc/nginx-certs"
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{/*
|
||||
Formats volume for tls keys and trusted certs
|
||||
*/}}
|
||||
{{- define "nginx.tlsKeysVolume" -}}
|
||||
{{- if eq (include "nginx.certAvailable" .) "true" -}}
|
||||
- name: cert-secret-volume
|
||||
secret:
|
||||
secretName: {{ include "nginx.secretName" . }}
|
||||
items:
|
||||
- key: certPublicKey
|
||||
path: public.crt
|
||||
- key: certPrivateKey
|
||||
path: private.key
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
49
charts/nextcloud/1.6.54/templates/_postgres.tpl
Normal file
49
charts/nextcloud/1.6.54/templates/_postgres.tpl
Normal file
@@ -0,0 +1,49 @@
|
||||
{{/*
|
||||
Get Nextloud Postgres Database Name
|
||||
*/}}
|
||||
{{- define "postgres.DatabaseName" -}}
|
||||
{{- print "nextcloud" -}}
|
||||
{{- end -}}
|
||||
|
||||
|
||||
{{- define "postgres.imageName" -}}
|
||||
{{- print "postgres:13.1" -}}
|
||||
{{- end -}}
|
||||
|
||||
|
||||
{{/*
|
||||
Retrieve postgres backup name
|
||||
This will return a unique name based on revision and chart numbers specified.
|
||||
*/}}
|
||||
{{- define "postgres.backupName" -}}
|
||||
{{- $upgradeDict := .Values.ixChartContext.upgradeMetadata -}}
|
||||
{{- printf "postgres-backup-from-%s-to-%s-revision-%d" $upgradeDict.oldChartVersion $upgradeDict.newChartVersion (int64 $upgradeDict.preUpgradeRevision) -}}
|
||||
{{- end }}
|
||||
|
||||
|
||||
{{/*
|
||||
Retrieve postgres credentials for environment variables configuration
|
||||
*/}}
|
||||
{{- define "postgres.envVariableConfiguration" -}}
|
||||
{{ $envList := list }}
|
||||
{{ $envList = mustAppend $envList (dict "name" "POSTGRES_USER" "valueFromSecret" true "secretName" "db-details" "secretKey" "db-user") }}
|
||||
{{ $envList = mustAppend $envList (dict "name" "POSTGRES_PASSWORD" "valueFromSecret" true "secretName" "db-details" "secretKey" "db-password") }}
|
||||
{{ include "common.containers.environmentVariables" (dict "environmentVariables" $envList) }}
|
||||
{{- end -}}
|
||||
|
||||
|
||||
{{/*
|
||||
Retrieve postgres volume configuration
|
||||
*/}}
|
||||
{{- define "postgres.volumeConfiguration" -}}
|
||||
{{ include "common.storage.configureAppVolumes" (dict "appVolumeMounts" .Values.postgresAppVolumeMounts "emptyDirVolumes" .Values.emptyDirVolumes "ixVolumes" .Values.ixVolumes) | nindent 0 }}
|
||||
{{- end -}}
|
||||
|
||||
|
||||
{{/*
|
||||
Retrieve postgres volume mounts configuration
|
||||
*/}}
|
||||
{{- define "postgres.volumeMountsConfiguration" -}}
|
||||
{{ include "common.storage.configureAppVolumeMountsInContainer" (dict "appVolumeMounts" .Values.postgresAppVolumeMounts ) | nindent 0 }}
|
||||
{{- end -}}
|
||||
|
||||
@@ -0,0 +1,24 @@
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: "postgres-backup-hook-config-map"
|
||||
annotations:
|
||||
rollme: {{ randAlphaNum 5 | quote }}
|
||||
data:
|
||||
entrypoint.sh: |-
|
||||
#!/bin/bash
|
||||
echo "Fetching password from config.php"
|
||||
|
||||
# sed removes ' , => spaces and db* from the string
|
||||
DBUSER=$(cat /nc-config/config.php | grep "dbuser" | sed "s/dbuser\| \|'\|,\|=>//g")
|
||||
DBPASS=$(cat /nc-config/config.php | grep "dbpassword" | sed "s/dbpassword\| \|'\|,\|=>//g")
|
||||
DBNAME=$(cat /nc-config/config.php | grep "dbname" | sed "s/dbname\| \|'\|,\|=>//g")
|
||||
[ -n "$DBUSER" ] && [ -n "$DBPASS" ] && [ -n "$DBNAME" ] && echo "User, Database and password fetched from config.php"
|
||||
|
||||
until pg_isready -U ${POSTGRES_USER} -h ${POSTGRES_HOST}; do sleep 2; done
|
||||
|
||||
# pg_dump will automatically use the password from the PGPASSWORD environment variable
|
||||
echo "Creating backup of ${DBNAME} database as ${DBUSER}"
|
||||
PGPASSWORD=${DBPASS} pg_dump -U $DBUSER -d $DBNAME --host=${POSTGRES_HOST} > /postgres_backups/$BACKUP_NAME \
|
||||
&& echo "Backup created successfully" \
|
||||
|| echo "Backup failed"
|
||||
48
charts/nextcloud/1.6.54/templates/backup-postgres-hook.yaml
Normal file
48
charts/nextcloud/1.6.54/templates/backup-postgres-hook.yaml
Normal file
@@ -0,0 +1,48 @@
|
||||
{{- if .Values.ixChartContext.isUpgrade -}}
|
||||
{{ $values := (. | mustDeepCopy) }}
|
||||
{{ $_ := set $values "common" (dict "nameSuffix" "postgres") }}
|
||||
{{ $dbHost := .Values.nextcloudDbHost }}
|
||||
apiVersion: batch/v1
|
||||
kind: Job
|
||||
metadata:
|
||||
name: "pre-upgrade-hook2"
|
||||
annotations:
|
||||
"helm.sh/hook": pre-upgrade
|
||||
"helm.sh/hook-weight": "1"
|
||||
"helm.sh/hook-delete-policy": hook-succeeded
|
||||
rollme: {{ randAlphaNum 5 | quote }}
|
||||
spec:
|
||||
template:
|
||||
metadata:
|
||||
name: "pre-upgrade-hook2"
|
||||
spec:
|
||||
restartPolicy: Never
|
||||
serviceAccountName: "{{ template "common.names.serviceAccountName" . }}"
|
||||
containers:
|
||||
- name: {{ .Chart.Name }}-postgres-backup
|
||||
image: {{ template "postgres.imageName" . }}
|
||||
imagePullPolicy: {{ .Values.image.pullPolicy }}
|
||||
env: {{ include "postgres.envVariableConfiguration" $values | nindent 10 }}
|
||||
- name: BACKUP_NAME
|
||||
value: {{ template "postgres.backupName" . }}
|
||||
- name: POSTGRES_HOST
|
||||
value: {{ $dbHost }}
|
||||
volumeMounts: {{ include "postgres.volumeMountsConfiguration" $values | nindent 10 }}
|
||||
- name: backup-script-configmap
|
||||
mountPath: /bin/backup_entrypoint.sh
|
||||
readOnly: true
|
||||
subPath: entrypoint.sh
|
||||
- name: nextcloud-data
|
||||
mountPath: /nc-config
|
||||
subPath: "config"
|
||||
command:
|
||||
- "/bin/backup_entrypoint.sh"
|
||||
volumes: {{ include "postgres.volumeConfiguration" $values | nindent 8 }}
|
||||
- name: backup-script-configmap
|
||||
configMap:
|
||||
defaultMode: 0700
|
||||
name: "postgres-backup-hook-config-map"
|
||||
{{ if .Values.appVolumeMounts }}
|
||||
{{- include "common.storage.configureAppVolumes" .Values | nindent 8 }}
|
||||
{{ end }}
|
||||
{{- end -}}
|
||||
78
charts/nextcloud/1.6.54/templates/cronjob.yaml
Normal file
78
charts/nextcloud/1.6.54/templates/cronjob.yaml
Normal file
@@ -0,0 +1,78 @@
|
||||
{{ $cronjob_values := (. | mustDeepCopy) }}
|
||||
{{ $_ := set $cronjob_values "common" (dict "nameSuffix" "cronjob") }}
|
||||
|
||||
{{ $hostName := .Values.nextcloud.host }}
|
||||
{{ if .Values.useServiceNameForHost }}
|
||||
{{ $hostName = (include "common.names.fullname" .) }}
|
||||
{{ end }}
|
||||
|
||||
{{if .Values.cronjob.enabled }}
|
||||
apiVersion: batch/v1
|
||||
kind: CronJob
|
||||
metadata:
|
||||
name: {{ template "common.names.fullname" $cronjob_values }}
|
||||
labels:
|
||||
app: {{ template "common.names.name" $cronjob_values }}
|
||||
chart: {{ template "common.names.chart" $cronjob_values }}
|
||||
release: {{ .Release.Name }}
|
||||
annotations:
|
||||
rollme: {{ randAlphaNum 5 | quote }}
|
||||
spec:
|
||||
schedule: "{{ .Values.cronjob.schedule }}"
|
||||
concurrencyPolicy: Forbid
|
||||
failedJobsHistoryLimit: 2
|
||||
successfulJobsHistoryLimit: 1
|
||||
jobTemplate:
|
||||
metadata:
|
||||
labels:
|
||||
app: {{ template "common.names.name" $cronjob_values }}
|
||||
release: {{ .Release.Name }}
|
||||
{{- include "common.labels.selectorLabels" $cronjob_values | nindent 8 }}
|
||||
spec:
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
app: {{ template "common.names.name" $cronjob_values }}
|
||||
release: {{ .Release.Name }}
|
||||
{{- include "common.labels.selectorLabels" $cronjob_values | nindent 12 }}
|
||||
spec:
|
||||
restartPolicy: Never
|
||||
securityContext:
|
||||
runAsUser: 33
|
||||
runAsGroup: 0
|
||||
fsGroup: 33
|
||||
containers:
|
||||
- name: {{ .Chart.Name }}-cronjob
|
||||
image: "{{.Values.image.repository }}:{{.Values.image.tag }}"
|
||||
imagePullPolicy: {{ .Values.image.pullPolicy }}
|
||||
command:
|
||||
- php
|
||||
- -f
|
||||
- /var/www/html/cron.php
|
||||
volumeMounts:
|
||||
- name: nextcloud-data
|
||||
mountPath: /var/www/
|
||||
subPath: "root"
|
||||
- name: nextcloud-data
|
||||
mountPath: /var/www/html
|
||||
subPath: "html"
|
||||
- name: nextcloud-data
|
||||
mountPath: {{ .Values.nextcloud.datadir }}
|
||||
subPath: "data"
|
||||
- name: nextcloud-data
|
||||
mountPath: /var/www/html/config
|
||||
subPath: "config"
|
||||
- name: nextcloud-data
|
||||
mountPath: /var/www/html/custom_apps
|
||||
subPath: "custom_apps"
|
||||
- name: nextcloud-data
|
||||
mountPath: /var/www/tmp
|
||||
subPath: "tmp"
|
||||
- name: nextcloud-data
|
||||
mountPath: /var/www/html/themes
|
||||
subPath: "themes"
|
||||
volumes:
|
||||
{{ if .Values.appVolumeMounts }}
|
||||
{{- include "common.storage.configureAppVolumes" .Values | nindent 12 }}
|
||||
{{ end }}
|
||||
{{ end }}
|
||||
240
charts/nextcloud/1.6.54/templates/deployment.yaml
Normal file
240
charts/nextcloud/1.6.54/templates/deployment.yaml
Normal file
@@ -0,0 +1,240 @@
|
||||
{{ include "common.storage.hostPathValidate" .Values }}
|
||||
{{ $postgres_values := (. | mustDeepCopy) }}
|
||||
{{ $_ := set $postgres_values "common" (dict "nameSuffix" "postgres") }}
|
||||
{{ include "common.deployment.common_config" . | nindent 0 }}
|
||||
spec: {{ include "common.deployment.common_spec" . | nindent 2 }}
|
||||
template: {{ include "common.deployment.pod.metadata" . | nindent 4 }}
|
||||
spec:
|
||||
initContainers:
|
||||
- name: init-postgresdb
|
||||
image: {{ template "postgres.imageName" . }}
|
||||
command: ['sh', '-c', "until pg_isready -U $POSTGRES_USER -d {{ include "postgres.DatabaseName" .Values }} -h {{ template "common.names.fullname" $postgres_values }}; do echo waiting for postgres; sleep 2; done"]
|
||||
imagePullPolicy: {{ .Values.image.pullPolicy }}
|
||||
env: {{ include "postgres.envVariableConfiguration" $postgres_values | nindent 10 }}
|
||||
|
||||
containers:
|
||||
{{ if eq (include "nginx.certAvailable" .) "true" }}
|
||||
- name: nginx
|
||||
{{ include "common.containers.imageConfig" .Values.nginx.image | nindent 8 }}
|
||||
volumeMounts:
|
||||
- name: nginx-configuration
|
||||
mountPath: /etc/nginx/nginx.conf
|
||||
subPath: nginx.conf
|
||||
{{ include "nginx.tlsKeysVolumeMount" . | nindent 10 }}
|
||||
ports:
|
||||
- name: nginx-http
|
||||
containerPort: 8000
|
||||
protocol: TCP
|
||||
- name: nginx-https
|
||||
containerPort: {{ .Values.service.nodePort }}
|
||||
protocol: TCP
|
||||
livenessProbe:
|
||||
httpGet:
|
||||
scheme: HTTPS
|
||||
path: /status.php
|
||||
port: {{ .Values.service.nodePort }}
|
||||
httpHeaders:
|
||||
- name: Host
|
||||
value: localhost
|
||||
initialDelaySeconds: 10
|
||||
periodSeconds: 10
|
||||
timeoutSeconds: 5
|
||||
failureThreshold: 5
|
||||
successThreshold: 1
|
||||
readinessProbe:
|
||||
httpGet:
|
||||
scheme: HTTPS
|
||||
path: /status.php
|
||||
port: {{ .Values.service.nodePort }}
|
||||
httpHeaders:
|
||||
- name: Host
|
||||
value: localhost
|
||||
initialDelaySeconds: 10
|
||||
periodSeconds: 10
|
||||
timeoutSeconds: 5
|
||||
failureThreshold: 5
|
||||
successThreshold: 2
|
||||
startupProbe:
|
||||
httpGet:
|
||||
scheme: HTTPS
|
||||
path: /status.php
|
||||
port: {{ .Values.service.nodePort }}
|
||||
httpHeaders:
|
||||
- name: Host
|
||||
value: localhost
|
||||
initialDelaySeconds: 30
|
||||
periodSeconds: 5
|
||||
timeoutSeconds: 2
|
||||
failureThreshold: 60
|
||||
successThreshold: 1
|
||||
{{ end }}
|
||||
- name: {{ .Chart.Name }}
|
||||
{{ include "common.resources.limitation" . | nindent 8 }}
|
||||
{{ include "common.containers.imageConfig" .Values.image | nindent 8 }}
|
||||
env: {{ include "postgres.envVariableConfiguration" $postgres_values | nindent 10 }}
|
||||
{{ $secretName := (include "common.names.fullname" .) }}
|
||||
{{ $envList := (default list .Values.environmentVariables) }}
|
||||
{{- $_ := set .Values "nextcloudDbHost" (include "common.names.fullname" $postgres_values) -}} {{/* Temprary store it on values to display it on NOTES */}}
|
||||
{{ $envList = mustAppend $envList (dict "name" "POSTGRES_HOST" "value" (printf "%s:5432" (include "common.names.fullname" $postgres_values))) }}
|
||||
{{ $envList = mustAppend $envList (dict "name" "POSTGRES_DB" "value" (include "postgres.DatabaseName" .)) }}
|
||||
{{ $envList = mustAppend $envList (dict "name" "NEXTCLOUD_DATA_DIR" "value" .Values.nextcloud.datadir) }}
|
||||
{{ $envList = mustAppend $envList (dict "name" "PHP_UPLOAD_LIMIT" "value" (printf "%vG" (.Values.nextcloud.max_upload_size | default 3))) }}
|
||||
{{ $envList = mustAppend $envList (dict "name" "PHP_MEMORY_LIMIT" "value" (printf "%vM" (.Values.nextcloud.php_memory_limit | default 512))) }}
|
||||
{{ if eq (include "nginx.certAvailable" .) "true" }}
|
||||
{{ $envList = mustAppend $envList (dict "name" "APACHE_DISABLE_REWRITE_IP" "value" "1") }}
|
||||
{{ if and .Values.nextcloud.host .Values.service.nodePort }}
|
||||
{{ if .Values.nginxConfig.use443 }}
|
||||
{{ $envList = mustAppend $envList (dict "name" "OVERWRITEHOST" "value" .Values.nextcloud.host) }}
|
||||
{{ else }}
|
||||
{{ $envList = mustAppend $envList (dict "name" "OVERWRITEHOST" "value" (printf "%v:%v" .Values.nextcloud.host .Values.service.nodePort)) }}
|
||||
{{ end }}
|
||||
{{ end }}
|
||||
{{ $envList = mustAppend $envList (dict "name" "OVERWRITEPROTOCOL" "value" "https") }}
|
||||
{{ $envList = mustAppend $envList (dict "name" "TRUSTED_PROXIES" "value" "127.0.0.1") }}
|
||||
{{ end }}
|
||||
{{ $hostName := .Values.nextcloud.host }}
|
||||
{{ if .Values.useServiceNameForHost }}
|
||||
{{ $hostName = (include "common.names.fullname" .) }}
|
||||
{{ end }}
|
||||
{{ $envList = mustAppend $envList (dict "name" "NEXTCLOUD_TRUSTED_DOMAINS" "value" $hostName) }}
|
||||
{{ $envList = mustAppend $envList (dict "name" "NEXTCLOUD_ADMIN_USER" "valueFromSecret" true "secretName" $secretName "secretKey" "nextcloud-username") }}
|
||||
{{ $envList = mustAppend $envList (dict "name" "NEXTCLOUD_ADMIN_PASSWORD" "valueFromSecret" true "secretName" $secretName "secretKey" "nextcloud-password") }}
|
||||
{{ include "common.containers.environmentVariables" (dict "environmentVariables" $envList) | nindent 10 }}
|
||||
ports:
|
||||
- name: http
|
||||
containerPort: 80
|
||||
protocol: TCP
|
||||
livenessProbe:
|
||||
httpGet:
|
||||
path: /status.php
|
||||
port: http
|
||||
httpHeaders:
|
||||
- name: Host
|
||||
value: localhost
|
||||
initialDelaySeconds: 10
|
||||
periodSeconds: 10
|
||||
timeoutSeconds: 5
|
||||
failureThreshold: 5
|
||||
successThreshold: 1
|
||||
readinessProbe:
|
||||
httpGet:
|
||||
path: /status.php
|
||||
port: http
|
||||
httpHeaders:
|
||||
- name: Host
|
||||
value: localhost
|
||||
initialDelaySeconds: 10
|
||||
periodSeconds: 10
|
||||
timeoutSeconds: 5
|
||||
failureThreshold: 5
|
||||
successThreshold: 1
|
||||
startupProbe:
|
||||
{{ $cmds := list }}
|
||||
{{ if .Values.nextcloud.install_ffmpeg }}
|
||||
{{ $cmds = mustAppend $cmds "ffmpeg" }}
|
||||
{{ end }}
|
||||
{{ if .Values.nextcloud.install_smbclient }}
|
||||
{{ $cmds = mustAppend $cmds "smbclient" }}
|
||||
{{ end }}
|
||||
{{ if $cmds }}
|
||||
exec:
|
||||
command:
|
||||
- /bin/sh
|
||||
- -c
|
||||
- |
|
||||
commands_to_check={{ join " " $cmds }}
|
||||
for comm in $commands_to_check; do
|
||||
if ! command -v $comm /dev/null 2>&1; then
|
||||
echo "Command $comm not found"
|
||||
exit 1
|
||||
fi
|
||||
done
|
||||
{{ else }}
|
||||
httpGet:
|
||||
path: /status.php
|
||||
port: http
|
||||
httpHeaders:
|
||||
- name: Host
|
||||
value: localhost
|
||||
{{ end }}
|
||||
initialDelaySeconds: 60
|
||||
periodSeconds: 10
|
||||
timeoutSeconds: 2
|
||||
failureThreshold: 100
|
||||
successThreshold: 1
|
||||
volumeMounts:
|
||||
- name: nextcloud-data
|
||||
mountPath: /var/www/
|
||||
subPath: "root"
|
||||
- name: nextcloud-data
|
||||
mountPath: /var/www/html
|
||||
subPath: "html"
|
||||
- name: nextcloud-data
|
||||
mountPath: {{ .Values.nextcloud.datadir }}
|
||||
subPath: "data"
|
||||
- name: nextcloud-data
|
||||
mountPath: /var/www/html/config
|
||||
subPath: "config"
|
||||
- name: nextcloud-data
|
||||
mountPath: /var/www/html/custom_apps
|
||||
subPath: "custom_apps"
|
||||
- name: nextcloud-data
|
||||
mountPath: /var/www/tmp
|
||||
subPath: "tmp"
|
||||
- name: nextcloud-data
|
||||
mountPath: /var/www/html/themes
|
||||
subPath: "themes"
|
||||
- name: nextcloud-configuration
|
||||
# We use -z-99 to ensure that this file is loaded
|
||||
# after the default opcache file nextcloud provides.
|
||||
mountPath: /usr/local/etc/php/conf.d/opcache-z-99.ini
|
||||
subPath: opcache.ini
|
||||
- name: nextcloud-configuration
|
||||
# We use -z-99 to ensure that this file is loaded
|
||||
# after the default php config file nextcloud provides.
|
||||
mountPath: /usr/local/etc/php/conf.d/nextcloud-z-99.ini
|
||||
subPath: php.ini
|
||||
- name: nextcloud-configuration
|
||||
# https://github.com/nextcloud/docker/issues/1796
|
||||
mountPath: /etc/apache2/conf-enabled/limitrequestbody.conf
|
||||
subPath: limitrequestbody.conf
|
||||
{{ range $index, $hostPathConfiguration := .Values.extraAppVolumeMounts }}
|
||||
- name: extrappvolume-{{ $index }}
|
||||
mountPath: {{ $hostPathConfiguration.mountPath }}
|
||||
{{ end }}
|
||||
{{ if $cmds }}
|
||||
lifecycle:
|
||||
postStart:
|
||||
exec:
|
||||
command:
|
||||
- /bin/sh
|
||||
- -c
|
||||
- |
|
||||
echo "Installing {{ join " " $cmds }}..."
|
||||
apt update && \
|
||||
apt install -y --no-install-recommends \
|
||||
{{ join " " $cmds }} || echo "Failed to install binary/binaries"
|
||||
echo "Finished."
|
||||
{{ end }}
|
||||
{{ include "common.networking.dnsConfiguration" .Values | nindent 6 }}
|
||||
volumes:
|
||||
- name: nextcloud-configuration
|
||||
configMap:
|
||||
defaultMode: 0755
|
||||
name: "nextcloud-configuration"
|
||||
- name: nginx-configuration
|
||||
configMap:
|
||||
defaultMode: 0700
|
||||
name: "nginx-configuration"
|
||||
{{ include "nginx.tlsKeysVolume" . | nindent 8 }}
|
||||
{{ if .Values.appVolumeMounts }}
|
||||
{{ include "common.storage.configureAppVolumes" .Values | nindent 8 }}
|
||||
{{ end }}
|
||||
{{ range $index, $hostPathConfiguration := .Values.extraAppVolumeMounts }}
|
||||
- name: extrappvolume-{{ $index }}
|
||||
hostPath:
|
||||
path: {{ $hostPathConfiguration.hostPath }}
|
||||
{{ end }}
|
||||
# Will mount configuration files as www-data (id: 33) for nextcloud
|
||||
securityContext:
|
||||
fsGroup: 33
|
||||
14
charts/nextcloud/1.6.54/templates/nextcloud-configmap.yaml
Normal file
14
charts/nextcloud/1.6.54/templates/nextcloud-configmap.yaml
Normal file
@@ -0,0 +1,14 @@
|
||||
{{ $bytesGB := 1073741824 }}
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: "nextcloud-configuration"
|
||||
data:
|
||||
opcache.ini: |
|
||||
opcache.memory_consumption={{ .Values.nextcloud.opcache_memory_consumption }}
|
||||
|
||||
php.ini: |
|
||||
max_execution_time={{ .Values.nextcloud.max_execution_time }}
|
||||
|
||||
limitrequestbody.conf: |
|
||||
LimitRequestBody {{ mul .Values.nextcloud.max_upload_size $bytesGB }}
|
||||
96
charts/nextcloud/1.6.54/templates/nginx-configmap.yaml
Normal file
96
charts/nextcloud/1.6.54/templates/nginx-configmap.yaml
Normal file
@@ -0,0 +1,96 @@
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: "nginx-configuration"
|
||||
data:
|
||||
protocol: {{ include "nginx.scheme" . }}
|
||||
{{ $timeout := 60 }}
|
||||
{{ $size := .Values.nextcloud.max_upload_size | default 3 }}
|
||||
|
||||
{{ $useDiffAccessPort := false }}
|
||||
{{ $externalAccessPort := "" }}
|
||||
|
||||
{{/* Safely access key as it is conditionaly shown */}}
|
||||
{{ if hasKey .Values "nginxConfig" }}
|
||||
{{ $useDiffAccessPort = .Values.nginxConfig.useDifferentAccessPort }}
|
||||
{{ $externalAccessPort = printf ":%v" .Values.nginxConfig.externalAccessPort }}
|
||||
{{ $timeout = .Values.nginxConfig.proxy_timeouts | default 60 }}
|
||||
{{ end }}
|
||||
|
||||
{{/* If its 443, do not append it on the rewrite at all */}}
|
||||
{{ if eq $externalAccessPort ":443" }}
|
||||
{{ $externalAccessPort = "" }}
|
||||
{{ end }}
|
||||
nginx.conf: |-
|
||||
events {}
|
||||
http {
|
||||
# redirects all http requests to https requests
|
||||
server {
|
||||
listen 8000 default_server;
|
||||
listen [::]:8000 default_server;
|
||||
return 301 https://$host$request_uri;
|
||||
}
|
||||
|
||||
server {
|
||||
server_name localhost;
|
||||
|
||||
listen {{ .Values.service.nodePort }} ssl http2;
|
||||
listen [::]:{{ .Values.service.nodePort }} ssl http2;
|
||||
|
||||
ssl_certificate '/etc/nginx-certs/public.crt';
|
||||
ssl_certificate_key '/etc/nginx-certs/private.key';
|
||||
|
||||
# maximum 3GB Upload File; change to fit your needs
|
||||
client_max_body_size {{ $size }}G;
|
||||
|
||||
add_header Strict-Transport-Security "max-age=15552000; includeSubDomains; preload" always;
|
||||
|
||||
location = /robots.txt {
|
||||
allow all;
|
||||
log_not_found off;
|
||||
access_log off;
|
||||
}
|
||||
|
||||
location = /.well-known/carddav {
|
||||
{{ if $useDiffAccessPort }}
|
||||
return 301 $scheme://$host{{ $externalAccessPort }}/remote.php/dav;
|
||||
{{ else }}
|
||||
return 301 $scheme://$host:$server_port/remote.php/dav;
|
||||
{{ end }}
|
||||
}
|
||||
|
||||
location = /.well-known/caldav {
|
||||
{{ if $useDiffAccessPort }}
|
||||
return 301 $scheme://$host{{ $externalAccessPort }}/remote.php/dav;
|
||||
{{ else }}
|
||||
return 301 $scheme://$host:$server_port/remote.php/dav;
|
||||
{{ end }}
|
||||
}
|
||||
|
||||
location / {
|
||||
proxy_pass http://localhost;
|
||||
proxy_http_version 1.1;
|
||||
proxy_cache_bypass $http_upgrade;
|
||||
proxy_request_buffering off;
|
||||
|
||||
# Proxy headers
|
||||
proxy_set_header Upgrade $http_upgrade;
|
||||
proxy_set_header Connection "upgrade";
|
||||
proxy_set_header Host $http_host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto https;
|
||||
proxy_set_header X-Forwarded-Host $host;
|
||||
{{ if $useDiffAccessPort }}
|
||||
proxy_set_header X-Forwarded-Port {{ $externalAccessPort | default "443" | trimPrefix ":" }};
|
||||
{{ else }}
|
||||
proxy_set_header X-Forwarded-Port $server_port;
|
||||
{{ end }}
|
||||
|
||||
# Proxy timeouts
|
||||
proxy_connect_timeout {{ $timeout }}s;
|
||||
proxy_send_timeout {{ $timeout }}s;
|
||||
proxy_read_timeout {{ $timeout }}s;
|
||||
}
|
||||
}
|
||||
}
|
||||
10
charts/nextcloud/1.6.54/templates/nginx-secret.yaml
Normal file
10
charts/nextcloud/1.6.54/templates/nginx-secret.yaml
Normal file
@@ -0,0 +1,10 @@
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
name: {{ include "nginx.secretName" . }}
|
||||
type: Opaque
|
||||
data:
|
||||
{{ if eq (include "nginx.certAvailable" .) "true" }}
|
||||
certPublicKey: {{ (include "nginx.cert.publicKey" .) | toString | b64enc | quote }}
|
||||
certPrivateKey: {{ (include "nginx.cert.privateKey" .) | toString | b64enc | quote }}
|
||||
{{ end }}
|
||||
50
charts/nextcloud/1.6.54/templates/postgres-deployment.yaml
Normal file
50
charts/nextcloud/1.6.54/templates/postgres-deployment.yaml
Normal file
@@ -0,0 +1,50 @@
|
||||
{{ $values := (. | mustDeepCopy) }}
|
||||
{{ $_ := set $values "common" (dict "nameSuffix" "postgres") }}
|
||||
{{ include "common.deployment.common_config" $values | nindent 0 }}
|
||||
spec: {{ include "common.deployment.common_spec" $values | nindent 2 }}
|
||||
template: {{ include "common.deployment.pod.metadata" $values | nindent 4 }}
|
||||
spec:
|
||||
containers:
|
||||
- name: {{ .Chart.Name }}-postgres
|
||||
image: {{ template "postgres.imageName" . }}
|
||||
imagePullPolicy: {{ .Values.image.pullPolicy }}
|
||||
env: {{ include "postgres.envVariableConfiguration" $values | nindent 10 }}
|
||||
volumeMounts: {{ include "postgres.volumeMountsConfiguration" $values | nindent 10 }}
|
||||
ports:
|
||||
- name: postgres-tcp
|
||||
containerPort: 5432
|
||||
protocol: TCP
|
||||
readinessProbe:
|
||||
exec:
|
||||
command:
|
||||
- sh
|
||||
- -c
|
||||
- "until pg_isready -U ${POSTGRES_USER} -h localhost; do sleep 2; done"
|
||||
initialDelaySeconds: 10
|
||||
periodSeconds: 10
|
||||
timeoutSeconds: 5
|
||||
failureThreshold: 5
|
||||
successThreshold: 2
|
||||
livenessProbe:
|
||||
exec:
|
||||
command:
|
||||
- sh
|
||||
- -c
|
||||
- "until pg_isready -U ${POSTGRES_USER} -h localhost; do sleep 2; done"
|
||||
initialDelaySeconds: 10
|
||||
periodSeconds: 10
|
||||
timeoutSeconds: 5
|
||||
failureThreshold: 5
|
||||
successThreshold: 1
|
||||
startupProbe:
|
||||
exec:
|
||||
command:
|
||||
- sh
|
||||
- -c
|
||||
- "until pg_isready -U ${POSTGRES_USER} -h localhost; do sleep 2; done"
|
||||
initialDelaySeconds: 10
|
||||
periodSeconds: 5
|
||||
timeoutSeconds: 2
|
||||
failureThreshold: 60
|
||||
successThreshold: 1
|
||||
volumes: {{ include "postgres.volumeConfiguration" $values | nindent 8 }}
|
||||
26
charts/nextcloud/1.6.54/templates/postgres-secret.yaml
Normal file
26
charts/nextcloud/1.6.54/templates/postgres-secret.yaml
Normal file
@@ -0,0 +1,26 @@
|
||||
{{- $secretName := "db-details" }}
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
name: {{ $secretName }}
|
||||
data:
|
||||
{{/*
|
||||
Lookup for the user shouldn't be needed in normal circumstances
|
||||
But there was a typo before that resulted to a db-user with weird
|
||||
characters. So to keep that user for existing installations we retrieve
|
||||
it from the existing secret.
|
||||
*/}}
|
||||
{{/* Init values */}}
|
||||
{{- $dbUser := ((include "postgres.DatabaseName" .Values) | b64enc) -}}
|
||||
{{- $dbPass := (randAlphaNum 15 | b64enc) -}}
|
||||
{{- with (lookup "v1" "Secret" .Release.Namespace $secretName) -}}
|
||||
{{/* If there is a previous secret, use that */}}
|
||||
{{- $dbUser = (index .data "db-user") -}}
|
||||
{{- $dbPass = (index .data "db-password") -}}
|
||||
{{- end }}
|
||||
db-user: {{ $dbUser }}
|
||||
db-password: {{ $dbPass }}
|
||||
|
||||
{{/* Temprary store them on values to display it on NOTES */}}
|
||||
{{ $_ := set .Values "nextcloudDbPass" $dbPass }}
|
||||
{{ $_ := set .Values "nextcloudDbUser" $dbUser }}
|
||||
6
charts/nextcloud/1.6.54/templates/postgres-service.yaml
Normal file
6
charts/nextcloud/1.6.54/templates/postgres-service.yaml
Normal file
@@ -0,0 +1,6 @@
|
||||
{{ $ports := list }}
|
||||
{{ $ports = mustAppend $ports (dict "name" "postgres-tcp" "port" 5432 "targetPort" 5432) }}
|
||||
{{ $values := (. | mustDeepCopy) }}
|
||||
{{ $_ := set $values "common" (dict "nameSuffix" "postgres") }}
|
||||
{{ $_1 := set $values "commonService" (dict "type" "ClusterIP" "ports" $ports ) }}
|
||||
{{ include "common.classes.service" $values }}
|
||||
13
charts/nextcloud/1.6.54/templates/secrets.yaml
Normal file
13
charts/nextcloud/1.6.54/templates/secrets.yaml
Normal file
@@ -0,0 +1,13 @@
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
name: {{ template "common.names.fullname" . }}
|
||||
labels: {{ include "common.labels" . | nindent 4 }}
|
||||
type: Opaque
|
||||
data:
|
||||
nextcloud-username: {{ .Values.nextcloud.username | b64enc | quote }}
|
||||
{{ if .Values.nextcloud.password }}
|
||||
nextcloud-password: {{ .Values.nextcloud.password | b64enc | quote }}
|
||||
{{ else }}
|
||||
nextcloud-password: {{ randAlphaNum 10 | b64enc | quote }}
|
||||
{{ end }}
|
||||
10
charts/nextcloud/1.6.54/templates/service.yaml
Normal file
10
charts/nextcloud/1.6.54/templates/service.yaml
Normal file
@@ -0,0 +1,10 @@
|
||||
{{ $svc := .Values.service }}
|
||||
{{ $ports := list }}
|
||||
{{ if eq (include "nginx.certAvailable" .) "true" }}
|
||||
{{ $ports = mustAppend $ports (dict "name" "nginx-https" "targetPort" .Values.service.nodePort "port" .Values.service.nodePort "nodePort" $svc.nodePort) }}
|
||||
{{ else }}
|
||||
{{ $ports = mustAppend $ports (dict "name" "http" "port" 80 "nodePort" $svc.nodePort) }}
|
||||
{{ end }}
|
||||
{{ $params := . }}
|
||||
{{ $_ := set $params "commonService" (dict "type" "NodePort" "ports" $ports ) }}
|
||||
{{ include "common.classes.service" $params }}
|
||||
35
charts/nextcloud/1.6.54/templates/serviceaccount.yaml
Normal file
35
charts/nextcloud/1.6.54/templates/serviceaccount.yaml
Normal file
@@ -0,0 +1,35 @@
|
||||
{{ include "common.serviceaccount" . | nindent 0 }}
|
||||
|
||||
---
|
||||
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: RoleBinding
|
||||
metadata:
|
||||
name: "{{ .Release.Name }}-service-account-role-binding"
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
name: "{{ template "common.names.serviceAccountName" . }}"
|
||||
namespace: {{ .Release.Namespace }}
|
||||
roleRef:
|
||||
kind: Role
|
||||
name: "{{ .Release.Name }}-service-account-role"
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
|
||||
---
|
||||
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: Role
|
||||
metadata:
|
||||
name: "{{ .Release.Name }}-service-account-role"
|
||||
namespace: {{ .Release.Namespace }}
|
||||
rules:
|
||||
- apiGroups:
|
||||
- ""
|
||||
- "apps"
|
||||
resources:
|
||||
- pods
|
||||
- deployments
|
||||
verbs:
|
||||
- delete
|
||||
- get
|
||||
- list
|
||||
9
charts/nextcloud/1.6.54/to_keep_versions.md
Normal file
9
charts/nextcloud/1.6.54/to_keep_versions.md
Normal file
@@ -0,0 +1,9 @@
|
||||
# To keep versions
|
||||
|
||||
## 1.6.29
|
||||
|
||||
Latest 26.x.x version
|
||||
|
||||
## 1.6.53
|
||||
|
||||
Latest 27.x.x version
|
||||
@@ -1,6 +0,0 @@
|
||||
dependencies:
|
||||
- name: common
|
||||
repository: file://../../../common
|
||||
version: 1.2.3
|
||||
digest: sha256:e6ff49b06bf5d4d159e505ae6d153f36cd46170bb519caf90462cd5caebfd0fb
|
||||
generated: "2023-11-22T22:25:40.286580598+02:00"
|
||||
Binary file not shown.
6
community/autobrr/1.1.7/Chart.lock
Normal file
6
community/autobrr/1.1.7/Chart.lock
Normal file
@@ -0,0 +1,6 @@
|
||||
dependencies:
|
||||
- name: common
|
||||
repository: file://../../../common
|
||||
version: 1.2.4
|
||||
digest: sha256:47ebfd41bc2ac33ab6989e7bd4d1d3aea662365fffa8b525a24cc56a2a35c174
|
||||
generated: "2023-12-13T11:12:40.12884734+02:00"
|
||||
@@ -3,9 +3,9 @@ description: Autobrr is the modern download automation tool for torrents and use
|
||||
annotations:
|
||||
title: Autobrr
|
||||
type: application
|
||||
version: 1.1.6
|
||||
version: 1.1.7
|
||||
apiVersion: v2
|
||||
appVersion: 1.34.0
|
||||
appVersion: 1.34.1
|
||||
kubeVersion: '>=1.16.0-0'
|
||||
maintainers:
|
||||
- name: truenas
|
||||
@@ -14,7 +14,7 @@ maintainers:
|
||||
dependencies:
|
||||
- name: common
|
||||
repository: file://../../../common
|
||||
version: 1.2.3
|
||||
version: 1.2.4
|
||||
home: https://github.com/autobrr/autobrr
|
||||
icon: https://media.sys.truenas.net/apps/autobrr/icons/icon.png
|
||||
sources:
|
||||
BIN
community/autobrr/1.1.7/charts/common-1.2.4.tgz
Normal file
BIN
community/autobrr/1.1.7/charts/common-1.2.4.tgz
Normal file
Binary file not shown.
@@ -1,7 +1,7 @@
|
||||
image:
|
||||
repository: ghcr.io/autobrr/autobrr
|
||||
pullPolicy: IfNotPresent
|
||||
tag: v1.34.0
|
||||
tag: v1.34.1
|
||||
|
||||
resources:
|
||||
limits:
|
||||
@@ -1,6 +0,0 @@
|
||||
dependencies:
|
||||
- name: common
|
||||
repository: file://../../../common
|
||||
version: 1.2.3
|
||||
digest: sha256:e6ff49b06bf5d4d159e505ae6d153f36cd46170bb519caf90462cd5caebfd0fb
|
||||
generated: "2023-11-22T22:25:55.964781365+02:00"
|
||||
Binary file not shown.
6
community/castopod/1.1.6/Chart.lock
Normal file
6
community/castopod/1.1.6/Chart.lock
Normal file
@@ -0,0 +1,6 @@
|
||||
dependencies:
|
||||
- name: common
|
||||
repository: file://../../../common
|
||||
version: 1.2.4
|
||||
digest: sha256:47ebfd41bc2ac33ab6989e7bd4d1d3aea662365fffa8b525a24cc56a2a35c174
|
||||
generated: "2023-12-13T11:12:51.029570616+02:00"
|
||||
@@ -4,9 +4,9 @@ description: Castopod is an open-source hosting platform made for podcasters who
|
||||
annotations:
|
||||
title: Castopod
|
||||
type: application
|
||||
version: 1.1.5
|
||||
version: 1.1.6
|
||||
apiVersion: v2
|
||||
appVersion: 1.7.1
|
||||
appVersion: 1.7.2
|
||||
kubeVersion: '>=1.16.0-0'
|
||||
maintainers:
|
||||
- name: truenas
|
||||
@@ -15,7 +15,7 @@ maintainers:
|
||||
dependencies:
|
||||
- name: common
|
||||
repository: file://../../../common
|
||||
version: 1.2.3
|
||||
version: 1.2.4
|
||||
home: https://castopod.org
|
||||
icon: https://media.sys.truenas.net/apps/castopod/icons/icon.svg
|
||||
sources:
|
||||
BIN
community/castopod/1.1.6/charts/common-1.2.4.tgz
Normal file
BIN
community/castopod/1.1.6/charts/common-1.2.4.tgz
Normal file
Binary file not shown.
@@ -1,11 +1,11 @@
|
||||
image:
|
||||
repository: castopod/app
|
||||
pullPolicy: IfNotPresent
|
||||
tag: 1.7.1
|
||||
tag: 1.7.2
|
||||
webImage:
|
||||
repository: castopod/web-server
|
||||
pullPolicy: IfNotPresent
|
||||
tag: 1.7.1
|
||||
tag: 1.7.2
|
||||
|
||||
resources:
|
||||
limits:
|
||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user