mirror of
https://github.com/truenas/charts.git
synced 2026-02-09 05:24:34 +08:00
NAS-124129 / 24.04 / adds unifi-controller to community train (#1541)
This commit is contained in:
6
library/ix-dev/community/unifi-controller/Chart.lock
Normal file
6
library/ix-dev/community/unifi-controller/Chart.lock
Normal file
@@ -0,0 +1,6 @@
|
||||
dependencies:
|
||||
- name: common
|
||||
repository: file://../../../common
|
||||
version: 1.1.1
|
||||
digest: sha256:a7dbe3e4d42dbcd4325776e5e01a1d630c7f185f79e7ebf22b1b9cc80f56eed7
|
||||
generated: "2023-09-11T14:13:06.750883824+03:00"
|
||||
27
library/ix-dev/community/unifi-controller/Chart.yaml
Normal file
27
library/ix-dev/community/unifi-controller/Chart.yaml
Normal file
@@ -0,0 +1,27 @@
|
||||
name: unifi-controller
|
||||
description: Unifi Controller is a network management controller for Unifi Equipment.
|
||||
annotations:
|
||||
title: Unifi Controller
|
||||
type: application
|
||||
version: 1.0.0
|
||||
apiVersion: v2
|
||||
appVersion: v7.4.162
|
||||
kubeVersion: '>=1.16.0-0'
|
||||
maintainers:
|
||||
- name: truenas
|
||||
url: https://www.truenas.com/
|
||||
email: dev@ixsystems.com
|
||||
dependencies:
|
||||
- name: common
|
||||
repository: file://../../../common
|
||||
version: 1.1.1
|
||||
home: https://github.com/jacobalberty/unifi-docker
|
||||
icon: https://theme.zdassets.com/theme_assets/77613/f9322e267ea20a462f60726984c22c1b8d5743b4.ico
|
||||
sources:
|
||||
- https://github.com/jacobalberty/unifi-docker
|
||||
- https://github.com/truenas/charts/tree/master/library/ix-dev/community/unifi-controller
|
||||
- https://hub.docker.com/r/jacobalberty/unifi
|
||||
keywords:
|
||||
- network
|
||||
- controller
|
||||
- unifi
|
||||
8
library/ix-dev/community/unifi-controller/README.md
Normal file
8
library/ix-dev/community/unifi-controller/README.md
Normal file
@@ -0,0 +1,8 @@
|
||||
# Unifi Controller
|
||||
|
||||
[Unifi Controller](https://github.com/jacobalberty/unifi-docker) is a network management controller for Unifi Equipment.
|
||||
|
||||
> When application is installed, a container will be launched with **root** privileges.
|
||||
> This is required in order to apply the correct permissions to the `Unifi Controller` directories.
|
||||
> Afterward, the `Unifi Controller` container will run as a **non**-root user (`999`).
|
||||
> All mounted storage(s) will be `chown`ed only if the parent directory does not match the configured user.
|
||||
8
library/ix-dev/community/unifi-controller/app-readme.md
Normal file
8
library/ix-dev/community/unifi-controller/app-readme.md
Normal file
@@ -0,0 +1,8 @@
|
||||
# Unifi Controller
|
||||
|
||||
[Unifi Controller](https://github.com/jacobalberty/unifi-docker) is a network management controller for Unifi Equipment.
|
||||
|
||||
> When application is installed, a container will be launched with **root** privileges.
|
||||
> This is required in order to apply the correct permissions to the `Unifi Controller` directories.
|
||||
> Afterward, the `Unifi Controller` container will run as a **non**-root user (`999`).
|
||||
> All mounted storage(s) will be `chown`ed only if the parent directory does not match the configured user.
|
||||
Binary file not shown.
@@ -0,0 +1,4 @@
|
||||
unifiStorage:
|
||||
data:
|
||||
type: hostPath
|
||||
hostPath: /mnt/{{ .Release.Namespace }}/data
|
||||
@@ -0,0 +1,12 @@
|
||||
unifiStorage:
|
||||
data:
|
||||
type: hostPath
|
||||
hostPath: /mnt/{{ .Release.Namespace }}/data
|
||||
additionalStorages:
|
||||
- type: hostPath
|
||||
hostPath: /mnt/{{ .Release.Namespace }}/init.d
|
||||
mountPath: /unifi/init.d
|
||||
|
||||
unifiNetwork:
|
||||
enableWebHttp: true
|
||||
enablePortalHttp: true
|
||||
@@ -0,0 +1,7 @@
|
||||
unifiStorage:
|
||||
data:
|
||||
type: hostPath
|
||||
hostPath: /mnt/{{ .Release.Namespace }}/data
|
||||
|
||||
unifiNetwork:
|
||||
hostNetwork: true
|
||||
@@ -0,0 +1,93 @@
|
||||
unifiStorage:
|
||||
data:
|
||||
type: hostPath
|
||||
hostPath: /mnt/{{ .Release.Namespace }}/data
|
||||
|
||||
unifiNetwork:
|
||||
certificateID: 1
|
||||
|
||||
ixCertificates:
|
||||
"1":
|
||||
certificate: |
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEdjCCA16gAwIBAgIDYFMYMA0GCSqGSIb3DQEBCwUAMGwxDDAKBgNVBAMMA2Fz
|
||||
ZDELMAkGA1UEBhMCVVMxDTALBgNVBAgMBGFzZGYxCzAJBgNVBAcMAmFmMQ0wCwYD
|
||||
VQQKDARhc2RmMQwwCgYDVQQLDANhc2QxFjAUBgkqhkiG9w0BCQEWB2FAYS5jb20w
|
||||
HhcNMjEwODMwMjMyMzU0WhcNMjMxMjAzMjMyMzU0WjBuMQswCQYDVQQDDAJhZDEL
|
||||
MAkGA1UEBhMCVVMxDTALBgNVBAgMBGFzZGYxDTALBgNVBAcMBGFzZGYxDTALBgNV
|
||||
BAoMBGFkc2YxDTALBgNVBAsMBGFzZGYxFjAUBgkqhkiG9w0BCQEWB2FAYS5jb20w
|
||||
ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC7+1xOHRQyOnQTHFcrdasX
|
||||
Zl0gzutVlA890a1wiQpdD5dOtCLo7+eqVYjqVKo9W8RUIArXWmBu/AbkH7oVFWC1
|
||||
P973W1+ArF5sA70f7BZgqRKJTIisuIFIlRETgfnP2pfQmHRZtGaIJRZI4vQCdYgW
|
||||
2g0KOvvNcZJCVq1OrhKiNiY1bWCp66DGg0ic6OEkZFHTm745zUNQaf2dNgsxKU0H
|
||||
PGjVLJI//yrRFAOSBUqgD4c50krnMF7fU/Fqh+UyOu8t6Y/HsySh3urB+Zie331t
|
||||
AzV6QV39KKxRflNx/yuWrtIEslGTm+xHKoCYJEk/nZ3mX8Y5hG6wWAb7A/FuDVg3
|
||||
AgMBAAGjggEdMIIBGTAnBgNVHREEIDAehwTAqAADhwTAqAAFhwTAqAC2hwTAqACB
|
||||
hwTAqACSMB0GA1UdDgQWBBQ4G2ff4tgZl4vmo4xCfqmJhdqShzAMBgNVHRMBAf8E
|
||||
AjAAMIGYBgNVHSMEgZAwgY2AFLlYf9L99nxJDcpCM/LT3V5hQ/a3oXCkbjBsMQww
|
||||
CgYDVQQDDANhc2QxCzAJBgNVBAYTAlVTMQ0wCwYDVQQIDARhc2RmMQswCQYDVQQH
|
||||
DAJhZjENMAsGA1UECgwEYXNkZjEMMAoGA1UECwwDYXNkMRYwFAYJKoZIhvcNAQkB
|
||||
FgdhQGEuY29tggNgUxcwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwEwDgYDVR0PAQH/
|
||||
BAQDAgWgMA0GCSqGSIb3DQEBCwUAA4IBAQA6FpOInEHB5iVk3FP67GybJ29vHZTD
|
||||
KQHbQgmg8s4L7qIsA1HQ+DMCbdylpA11x+t/eL/n48BvGw2FNXpN6uykhLHJjbKR
|
||||
h8yITa2KeD3LjLYhScwIigXmTVYSP3km6s8jRL6UKT9zttnIHyXVpBDya6Q4WTMx
|
||||
fmfC6O7t1PjQ5ZyVtzizIUP8ah9n4TKdXU4A3QIM6WsJXpHb+vqp1WDWJ7mKFtgj
|
||||
x5TKv3wcPnktx0zMPfLb5BTSE9rc9djcBG0eIAsPT4FgiatCUChe7VhuMnqskxEz
|
||||
MymJLoq8+mzucRwFkOkR2EIt1x+Irl2mJVMeBow63rVZfUQBD8h++LqB
|
||||
-----END CERTIFICATE-----
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEhDCCA2ygAwIBAgIDYFMXMA0GCSqGSIb3DQEBCwUAMGwxDDAKBgNVBAMMA2Fz
|
||||
ZDELMAkGA1UEBhMCVVMxDTALBgNVBAgMBGFzZGYxCzAJBgNVBAcMAmFmMQ0wCwYD
|
||||
VQQKDARhc2RmMQwwCgYDVQQLDANhc2QxFjAUBgkqhkiG9w0BCQEWB2FAYS5jb20w
|
||||
HhcNMjEwODMwMjMyMDQ1WhcNMzEwODI4MjMyMDQ1WjBsMQwwCgYDVQQDDANhc2Qx
|
||||
CzAJBgNVBAYTAlVTMQ0wCwYDVQQIDARhc2RmMQswCQYDVQQHDAJhZjENMAsGA1UE
|
||||
CgwEYXNkZjEMMAoGA1UECwwDYXNkMRYwFAYJKoZIhvcNAQkBFgdhQGEuY29tMIIB
|
||||
IjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAq//c0hEEr83CS1pMgsHX50jt
|
||||
2MqIbcf63UUNJTiYpUUvUQSFJFc7m/dr+RTZvu97eDCnD5K2qkHHvTPaPZwY+Djf
|
||||
iy7N641Sz6u/y3Yo3xxs1Aermsfedh48vusJpjbkT2XS44VjbkrpKcWDNVpp3Evd
|
||||
M7oJotXeUsZ+imiyVCfr4YhoY5gbGh/r+KN9Wf9YKoUyfLLZGwdZkhtX2zIbidsL
|
||||
Thqi9YTaUHttGinjiBBum234u/CfvKXsfG3yP2gvBGnlvZnM9ktv+lVffYNqlf7H
|
||||
VmB1bKKk84HtzuW5X76SGAgOG8eHX4x5ZLI1WQUuoQOVRl1I0UCjBtbz8XhwvQID
|
||||
AQABo4IBLTCCASkwLQYDVR0RBCYwJIcEwKgABYcEwKgAA4cEwKgAkocEwKgAtYcE
|
||||
wKgAgYcEwKgAtjAdBgNVHQ4EFgQUuVh/0v32fEkNykIz8tPdXmFD9rcwDwYDVR0T
|
||||
AQH/BAUwAwEB/zCBmAYDVR0jBIGQMIGNgBS5WH/S/fZ8SQ3KQjPy091eYUP2t6Fw
|
||||
pG4wbDEMMAoGA1UEAwwDYXNkMQswCQYDVQQGEwJVUzENMAsGA1UECAwEYXNkZjEL
|
||||
MAkGA1UEBwwCYWYxDTALBgNVBAoMBGFzZGYxDDAKBgNVBAsMA2FzZDEWMBQGCSqG
|
||||
SIb3DQEJARYHYUBhLmNvbYIDYFMXMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEF
|
||||
BQcDAjAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQELBQADggEBAKEocOmVuWlr
|
||||
zegtKYMe8NhHIkFY9oVn5ym6RHNOJpPH4QF8XYC3Z5+iC5yGh4P/jVe/4I4SF6Ql
|
||||
PtofU0jNq5vzapt/y+m008eXqPQFmoUOvu+JavoRVcRx2LIP5AgBA1mF56CSREsX
|
||||
TkuJAA9IUQ8EjnmAoAeKINuPaKxGDuU8BGCMqr/qd564MKNf9XYL+Fb2rlkA0O2d
|
||||
2No34DQLgqSmST/LAvPM7Cbp6knYgnKmGr1nETCXasg1cueHLnWWTvps2HiPp2D/
|
||||
+Fq0uqcZLu4Mdo0CPs4e5sHRyldEnRSKh0DVLprq9zr/GMipmPLJUsT5Jed3sj0w
|
||||
M7Y3vwxshpo=
|
||||
-----END CERTIFICATE-----
|
||||
privatekey: |
|
||||
-----BEGIN PRIVATE KEY-----
|
||||
MIIEvAIBADANBgkqhkiG9w0BAQEFAASCBKYwggSiAgEAAoIBAQC7+1xOHRQyOnQT
|
||||
HFcrdasXZl0gzutVlA890a1wiQpdD5dOtCLo7+eqVYjqVKo9W8RUIArXWmBu/Abk
|
||||
H7oVFWC1P973W1+ArF5sA70f7BZgqRKJTIisuIFIlRETgfnP2pfQmHRZtGaIJRZI
|
||||
4vQCdYgW2g0KOvvNcZJCVq1OrhKiNiY1bWCp66DGg0ic6OEkZFHTm745zUNQaf2d
|
||||
NgsxKU0HPGjVLJI//yrRFAOSBUqgD4c50krnMF7fU/Fqh+UyOu8t6Y/HsySh3urB
|
||||
+Zie331tAzV6QV39KKxRflNx/yuWrtIEslGTm+xHKoCYJEk/nZ3mX8Y5hG6wWAb7
|
||||
A/FuDVg3AgMBAAECggEAapt30rj9DitGTtxAt13pJMEhyYxvvD3WkvmJwguF/Bbu
|
||||
eW0Ba1c668fMeRCA54FWi1sMqusPS4HUqqUvk+tmyAOsAF4qgD/A4MMSC7uJSVI5
|
||||
N/JWhJWyhCY94/FPakiO1nbPbVw41bcqtzU2qvparpME2CtxSCbDiqm7aaag3Kqe
|
||||
EF0fGSUdZ+TYl9JM05+eIyiX+UY19Fg0OjTHMn8nGpxcNTfDBdQ68TKvdo/dtIKL
|
||||
PLKzJUNNdM8odC4CvQtfGMqaslwZwXkiOl5VJcW21ncj/Y0ngEMKeD/i65ZoqGdR
|
||||
0FKCQYEAGtM2FvJcZQ92Wsw7yj2bK2MSegVUyLK32QKBgQDe8syVCepPzRsfjfxA
|
||||
6TZlWcGuTZLhwIx97Ktw3VcQ1f4rLoEYlv0xC2VWBORpzIsJo4I/OLmgp8a+Ga8z
|
||||
FkVRnq90dV3t4NP9uJlHgcODHnOardC2UUka4olBSCG6zmK4Jxi34lOxhGRkshOo
|
||||
L4IBeOIB5g+ZrEEXkzfYJHESRQKBgQDX2YhFhGIrT8BAnC5BbXbhm8h6Bhjz8DYL
|
||||
d+qhVJjef7L/aJxViU0hX9Ba2O8CLK3FZeREFE3hJPiJ4TZSlN4evxs5p+bbNDcA
|
||||
0mhRI/o3X4ac6IxdRebyYnCOB/Cu94/MzppcZcotlCekKNike7eorCcX4Qavm7Pu
|
||||
MUuQ+ifmSwKBgEnchoqZzlbBzMqXb4rRuIO7SL9GU/MWp3TQg7vQmJerTZlgvsQ2
|
||||
wYsOC3SECmhCq4117iCj2luvOdihCboTFsQDnn0mpQe6BIF6Ns3J38wAuqv0CcFd
|
||||
DKsrge1uyD3rQilgSoAhKzkUc24o0PpXQurZ8YZPgbuXpbj5vPaOnCdBAoGACYc7
|
||||
wb3XS4wos3FxhUfcwJbM4b4VKeeHqzfu7pI6cU/3ydiHVitKcVe2bdw3qMPqI9Wc
|
||||
nvi6e17Tbdq4OCsEJx1OiVwFD9YdO3cOTc6lw/3+hjypvZBRYo+/4jUthbu96E+S
|
||||
dtOzehGZMmDvN0uSzupSi3ZOgkAAUFpyuIKickMCgYAId0PCRjonO2thn/R0rZ7P
|
||||
//L852uyzYhXKw5/fjFGhQ6LbaLgIRFaCZ0L2809u0HFnNvJjHv4AKP6j+vFQYYY
|
||||
qQ+66XnfsA9G/bu4MDS9AX83iahD9IdLXQAy8I19prAbpVumKegPbMnNYNB/TYEc
|
||||
3G15AKCXo7jjOUtHY01DCQ==
|
||||
-----END PRIVATE KEY-----
|
||||
7
library/ix-dev/community/unifi-controller/item.yaml
Normal file
7
library/ix-dev/community/unifi-controller/item.yaml
Normal file
@@ -0,0 +1,7 @@
|
||||
icon_url: https://theme.zdassets.com/theme_assets/77613/f9322e267ea20a462f60726984c22c1b8d5743b4.ico
|
||||
categories:
|
||||
- network
|
||||
screenshots: []
|
||||
tags:
|
||||
- controller
|
||||
- unifi
|
||||
8
library/ix-dev/community/unifi-controller/metadata.yaml
Normal file
8
library/ix-dev/community/unifi-controller/metadata.yaml
Normal file
@@ -0,0 +1,8 @@
|
||||
runAsContext:
|
||||
- userName: unifi
|
||||
groupName: unifi
|
||||
gid: 999
|
||||
uid: 999
|
||||
description: Unifi runs as a non-root user.
|
||||
capabilities: []
|
||||
hostMounts: []
|
||||
273
library/ix-dev/community/unifi-controller/questions.yaml
Normal file
273
library/ix-dev/community/unifi-controller/questions.yaml
Normal file
@@ -0,0 +1,273 @@
|
||||
groups:
|
||||
- name: Unifi Controller Configuration
|
||||
description: Configure Unifi Controller
|
||||
- name: User and Group Configuration
|
||||
description: Configure User and Group for Unifi Controller
|
||||
- name: Network Configuration
|
||||
description: Configure Network for Unifi Controller
|
||||
- name: Storage Configuration
|
||||
description: Configure Storage for Unifi Controller
|
||||
- name: Resources Configuration
|
||||
description: Configure Resources for Unifi Controller
|
||||
|
||||
portals:
|
||||
web_portal:
|
||||
protocols:
|
||||
- "$kubernetes-resource_configmap_portal_protocol"
|
||||
host:
|
||||
- "$kubernetes-resource_configmap_portal_host"
|
||||
ports:
|
||||
- "$kubernetes-resource_configmap_portal_port"
|
||||
path: "$kubernetes-resource_configmap_portal_path"
|
||||
|
||||
questions:
|
||||
- variable: TZ
|
||||
group: Unifi Controller Configuration
|
||||
label: Timezone
|
||||
schema:
|
||||
type: string
|
||||
default: Etc/UTC
|
||||
required: true
|
||||
$ref:
|
||||
- definitions/timezone
|
||||
|
||||
- variable: unifiConfig
|
||||
label: ""
|
||||
group: Unifi Controller Configuration
|
||||
schema:
|
||||
type: dict
|
||||
attrs:
|
||||
- variable: additionalEnvs
|
||||
label: Additional Environment Variables
|
||||
description: Configure additional environment variables for Unifi Controller.
|
||||
schema:
|
||||
type: list
|
||||
default: []
|
||||
items:
|
||||
- variable: env
|
||||
label: Environment Variable
|
||||
schema:
|
||||
type: dict
|
||||
attrs:
|
||||
- variable: name
|
||||
label: Name
|
||||
schema:
|
||||
type: string
|
||||
required: true
|
||||
- variable: value
|
||||
label: Value
|
||||
schema:
|
||||
type: string
|
||||
required: true
|
||||
|
||||
- variable: unifiNetwork
|
||||
label: ""
|
||||
group: Network Configuration
|
||||
schema:
|
||||
type: dict
|
||||
attrs:
|
||||
- variable: webHttpsPort
|
||||
label: Web HTTPS Port
|
||||
description: The HTTPS port for the Unifi Controller Web UI.
|
||||
schema:
|
||||
type: int
|
||||
default: 30072
|
||||
min: 9000
|
||||
max: 65535
|
||||
required: true
|
||||
- variable: enableWebHttp
|
||||
label: Enable Web HTTP
|
||||
description: Enable HTTP for the Unifi Controller Web UI.
|
||||
schema:
|
||||
type: boolean
|
||||
default: false
|
||||
- variable: webHttpPort
|
||||
label: Web HTTP Port
|
||||
description: The HTTP port for the Unifi Controller Web UI.
|
||||
schema:
|
||||
type: int
|
||||
default: 30073
|
||||
show_if: [["enableWebHttp", "=", true]]
|
||||
min: 9000
|
||||
max: 65535
|
||||
required: true
|
||||
- variable: portalHttpsPort
|
||||
label: Portal HTTPS Port
|
||||
description: The HTTPS port for the Unifi Controller Portal.
|
||||
schema:
|
||||
type: int
|
||||
default: 30074
|
||||
min: 9000
|
||||
max: 65535
|
||||
required: true
|
||||
- variable: enablePortalHttp
|
||||
label: Enable Portal HTTP
|
||||
description: Enable HTTP for the Unifi Controller Portal.
|
||||
schema:
|
||||
type: boolean
|
||||
default: false
|
||||
- variable: portalHttpPort
|
||||
label: Portal HTTP Port
|
||||
description: The HTTP port for the Unifi Controller Portal.
|
||||
schema:
|
||||
type: int
|
||||
default: 30075
|
||||
show_if: [["enablePortalHttp", "=", true]]
|
||||
min: 9000
|
||||
max: 65535
|
||||
required: true
|
||||
- variable: certificateID
|
||||
label: Certificate
|
||||
description: |
|
||||
The certificate to use for Unifi Controller </br>
|
||||
Using the Rocket method for TLS setup is NOT recommended </br>
|
||||
Prefer a reverse proxy with a valid certificate </br>
|
||||
schema:
|
||||
type: int
|
||||
"null": true
|
||||
$ref:
|
||||
- "definitions/certificate"
|
||||
- variable: hostNetwork
|
||||
label: Host Network
|
||||
description: |
|
||||
Bind to the host network. </br>
|
||||
This might be required for specific features like STUN.
|
||||
schema:
|
||||
type: boolean
|
||||
default: false
|
||||
|
||||
- variable: unifiStorage
|
||||
label: ""
|
||||
group: Storage Configuration
|
||||
schema:
|
||||
type: dict
|
||||
attrs:
|
||||
- variable: data
|
||||
label: Unifi Controller Data Storage
|
||||
description: The path to store Unifi Controller Data.
|
||||
schema:
|
||||
type: dict
|
||||
attrs:
|
||||
- variable: type
|
||||
label: Type
|
||||
description: |
|
||||
ixVolume: Is dataset created automatically by the system.</br>
|
||||
Host Path: Is a path that already exists on the system.
|
||||
schema:
|
||||
type: string
|
||||
required: true
|
||||
default: "ixVolume"
|
||||
enum:
|
||||
- value: "hostPath"
|
||||
description: Host Path (Path that already exists on the system)
|
||||
- value: "ixVolume"
|
||||
description: ixVolume (Dataset created automatically by the system)
|
||||
- variable: datasetName
|
||||
label: Dataset Name
|
||||
schema:
|
||||
type: string
|
||||
show_if: [["type", "=", "ixVolume"]]
|
||||
required: true
|
||||
hidden: true
|
||||
immutable: true
|
||||
default: "data"
|
||||
$ref:
|
||||
- "normalize/ixVolume"
|
||||
- variable: hostPath
|
||||
label: Host Path
|
||||
schema:
|
||||
type: hostpath
|
||||
show_if: [["type", "=", "hostPath"]]
|
||||
immutable: true
|
||||
required: true
|
||||
- variable: additionalStorages
|
||||
label: Additional Storage
|
||||
description: Additional storage for Unifi Controller.
|
||||
schema:
|
||||
type: list
|
||||
default: []
|
||||
items:
|
||||
- variable: storageEntry
|
||||
label: Storage Entry
|
||||
schema:
|
||||
type: dict
|
||||
attrs:
|
||||
- variable: type
|
||||
label: Type
|
||||
description: |
|
||||
ixVolume: Is dataset created automatically by the system.</br>
|
||||
Host Path: Is a path that already exists on the system.
|
||||
schema:
|
||||
type: string
|
||||
required: true
|
||||
default: "ixVolume"
|
||||
enum:
|
||||
- value: "hostPath"
|
||||
description: Host Path (Path that already exists on the system)
|
||||
- value: "ixVolume"
|
||||
description: ixVolume (Dataset created automatically by the system)
|
||||
- variable: mountPath
|
||||
label: Mount Path
|
||||
description: The path inside the container to mount the storage.
|
||||
schema:
|
||||
type: path
|
||||
required: true
|
||||
- variable: hostPath
|
||||
label: Host Path
|
||||
description: The host path to use for storage.
|
||||
schema:
|
||||
type: hostpath
|
||||
show_if: [["type", "=", "hostPath"]]
|
||||
required: true
|
||||
- variable: datasetName
|
||||
label: Dataset Name
|
||||
description: The name of the dataset to use for storage.
|
||||
schema:
|
||||
type: string
|
||||
show_if: [["type", "=", "ixVolume"]]
|
||||
required: true
|
||||
immutable: true
|
||||
default: "storage_entry"
|
||||
$ref:
|
||||
- "normalize/ixVolume"
|
||||
|
||||
- variable: resources
|
||||
group: Resources Configuration
|
||||
label: ""
|
||||
schema:
|
||||
type: dict
|
||||
attrs:
|
||||
- variable: limits
|
||||
label: Limits
|
||||
schema:
|
||||
type: dict
|
||||
attrs:
|
||||
- variable: cpu
|
||||
label: CPU
|
||||
description: CPU limit for Unifi Controller.
|
||||
schema:
|
||||
type: string
|
||||
max_length: 6
|
||||
valid_chars: '^(0\.[1-9]|[1-9][0-9]*)(\.[0-9]|m?)$'
|
||||
valid_chars_error: |
|
||||
Valid CPU limit formats are</br>
|
||||
- Plain Integer - eg. 1</br>
|
||||
- Float - eg. 0.5</br>
|
||||
- Milicpu - eg. 500m
|
||||
default: "4000m"
|
||||
required: true
|
||||
- variable: memory
|
||||
label: Memory
|
||||
description: Memory limit for Unifi Controller.
|
||||
schema:
|
||||
type: string
|
||||
max_length: 12
|
||||
valid_chars: '^[1-9][0-9]*([EPTGMK]i?|e[0-9]+)?$'
|
||||
valid_chars_error: |
|
||||
Valid Memory limit formats are</br>
|
||||
- Suffixed with E/P/T/G/M/K - eg. 1G</br>
|
||||
- Suffixed with Ei/Pi/Ti/Gi/Mi/Ki - eg. 1Gi</br>
|
||||
- Plain Integer in bytes - eg. 1024</br>
|
||||
- Exponent - eg. 134e6
|
||||
default: "8Gi"
|
||||
required: true
|
||||
@@ -0,0 +1 @@
|
||||
{{ include "ix.v1.common.lib.chart.notes" $ }}
|
||||
@@ -0,0 +1,59 @@
|
||||
{{- define "unifi.persistence" -}}
|
||||
persistence:
|
||||
data:
|
||||
enabled: true
|
||||
type: {{ .Values.unifiStorage.data.type }}
|
||||
datasetName: {{ .Values.unifiStorage.data.datasetName | default "" }}
|
||||
hostPath: {{ .Values.unifiStorage.data.hostPath | default "" }}
|
||||
targetSelector:
|
||||
unifi:
|
||||
unifi:
|
||||
mountPath: /unifi
|
||||
01-permissions:
|
||||
mountPath: /mnt/directories/unifi
|
||||
02-certs:
|
||||
mountPath: /unifi
|
||||
tmp:
|
||||
enabled: true
|
||||
type: emptyDir
|
||||
targetSelector:
|
||||
unifi:
|
||||
unifi:
|
||||
mountPath: /tmp
|
||||
{{- range $idx, $storage := .Values.unifiStorage.additionalStorages }}
|
||||
{{ printf "unifi-%v" (int $idx) }}:
|
||||
enabled: true
|
||||
type: {{ $storage.type }}
|
||||
datasetName: {{ $storage.datasetName | default "" }}
|
||||
hostPath: {{ $storage.hostPath | default "" }}
|
||||
targetSelector:
|
||||
unifi:
|
||||
unifi:
|
||||
mountPath: {{ $storage.mountPath }}
|
||||
01-permissions:
|
||||
mountPath: /mnt/directories{{ $storage.mountPath }}
|
||||
{{- end -}}
|
||||
|
||||
{{- if .Values.unifiNetwork.certificateID }}
|
||||
cert:
|
||||
enabled: true
|
||||
type: secret
|
||||
objectName: unifi-cert
|
||||
defaultMode: "0600"
|
||||
items:
|
||||
- key: tls.key
|
||||
path: private.key
|
||||
- key: tls.crt
|
||||
path: public.crt
|
||||
targetSelector:
|
||||
unifi:
|
||||
02-certs:
|
||||
mountPath: /ix/cert
|
||||
readOnly: true
|
||||
|
||||
scaleCertificate:
|
||||
unifi-cert:
|
||||
enabled: true
|
||||
id: {{ .Values.unifiNetwork.certificateID }}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
@@ -0,0 +1,12 @@
|
||||
{{- define "unifi.portal" -}}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: portal
|
||||
data:
|
||||
path: "/"
|
||||
port: {{ .Values.unifiNetwork.webHttpsPort | quote }}
|
||||
protocol: https
|
||||
host: $node_ip
|
||||
{{- end -}}
|
||||
@@ -0,0 +1,36 @@
|
||||
{{- define "unifi.service" -}}
|
||||
service:
|
||||
unifi:
|
||||
enabled: true
|
||||
primary: true
|
||||
type: NodePort
|
||||
targetSelector: unifi
|
||||
ports:
|
||||
web-https:
|
||||
enabled: true
|
||||
primary: true
|
||||
port: {{ .Values.unifiNetwork.webHttpsPort }}
|
||||
nodePort: {{ .Values.unifiNetwork.webHttpsPort }}
|
||||
targetSelector: unifi
|
||||
web-http:
|
||||
enabled: {{ .Values.unifiNetwork.enableWebHttp }}
|
||||
port: {{ .Values.unifiNetwork.webHttpPort }}
|
||||
nodePort: {{ .Values.unifiNetwork.webHttpPort }}
|
||||
targetSelector: unifi
|
||||
unifi-portal:
|
||||
enabled: true
|
||||
type: NodePort
|
||||
targetSelector: unifi
|
||||
ports:
|
||||
portal-https:
|
||||
enabled: true
|
||||
primary: true
|
||||
port: {{ .Values.unifiNetwork.portalHttpsPort }}
|
||||
nodePort: {{ .Values.unifiNetwork.portalHttpsPort }}
|
||||
targetSelector: unifi
|
||||
portal-http:
|
||||
enabled: {{ .Values.unifiNetwork.enablePortalHttp }}
|
||||
port: {{ .Values.unifiNetwork.portalHttpPort }}
|
||||
nodePort: {{ .Values.unifiNetwork.portalHttpPort }}
|
||||
targetSelector: unifi
|
||||
{{- end -}}
|
||||
@@ -0,0 +1,78 @@
|
||||
{{- define "unifi.workload" -}}
|
||||
workload:
|
||||
unifi:
|
||||
enabled: true
|
||||
primary: true
|
||||
type: Deployment
|
||||
podSpec:
|
||||
hostNetwork: {{ .Values.unifiNetwork.hostNetwork }}
|
||||
containers:
|
||||
unifi:
|
||||
enabled: true
|
||||
primary: true
|
||||
imageSelector: image
|
||||
securityContext:
|
||||
runAsUser: 999
|
||||
runAsGroup: 999
|
||||
readOnlyRootFilesystem: false
|
||||
env:
|
||||
UNIFI_STDOUT: true
|
||||
UNIFI_HTTP_PORT: {{ .Values.unifiNetwork.webHttpPort }}
|
||||
UNIFI_HTTPS_PORT: {{ .Values.unifiNetwork.webHttpsPort }}
|
||||
PORTAL_HTTP_PORT: {{ .Values.unifiNetwork.portalHttpPort }}
|
||||
PORTAL_HTTPS_PORT: {{ .Values.unifiNetwork.portalHttpsPort }}
|
||||
{{- if .Values.unifiNetwork.certificateID }}
|
||||
CERTNAME: cert.pem
|
||||
CERT_PRIVATE_NAME: privkey.pem
|
||||
CERT_IS_CHAIN: true
|
||||
{{- end }}
|
||||
{{ with .Values.unifiConfig.additionalEnvs }}
|
||||
envList:
|
||||
{{ range $env := . }}
|
||||
- name: {{ $env.name }}
|
||||
value: {{ $env.value }}
|
||||
{{ end }}
|
||||
{{ end }}
|
||||
probes:
|
||||
liveness:
|
||||
enabled: true
|
||||
type: exec
|
||||
command: /usr/local/bin/docker-healthcheck.sh
|
||||
readiness:
|
||||
enabled: true
|
||||
type: exec
|
||||
command: /usr/local/bin/docker-healthcheck.sh
|
||||
startup:
|
||||
enabled: true
|
||||
type: exec
|
||||
command: /usr/local/bin/docker-healthcheck.sh
|
||||
initContainers:
|
||||
{{- include "ix.v1.common.app.permissions" (dict "containerName" "01-permissions"
|
||||
"UID" 999
|
||||
"GID" 999
|
||||
"mode" "check"
|
||||
"type" "init") | nindent 8 }}
|
||||
{{- if .Values.unifiNetwork.certificateID }}
|
||||
# Unifi chowns the files on startup, and if we mount them directly
|
||||
# from the secret, it will fail to start. So we make copy.
|
||||
02-certs:
|
||||
enabled: true
|
||||
type: init
|
||||
imageSelector: image
|
||||
securityContext:
|
||||
runAsUser: 999
|
||||
runAsGroup: 999
|
||||
readOnlyRootFilesystem: false
|
||||
command:
|
||||
- /bin/sh
|
||||
- -c
|
||||
args:
|
||||
- |
|
||||
certdir=/unifi/cert
|
||||
echo "Copying certificates to $certdir"
|
||||
mkdir -p $certdir
|
||||
cp --force --verbose /ix/cert/private.key $certdir/privkey.pem
|
||||
cp --force --verbose /ix/cert/public.crt $certdir/cert.pem
|
||||
cp --force --verbose /ix/cert/public.crt $certdir/chain.pem
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
@@ -0,0 +1,11 @@
|
||||
{{- include "ix.v1.common.loader.init" . -}}
|
||||
|
||||
{{/* Merge the templates with Values */}}
|
||||
{{- $_ := mustMergeOverwrite .Values (include "unifi.workload" $ | fromYaml) -}}
|
||||
{{- $_ := mustMergeOverwrite .Values (include "unifi.service" $ | fromYaml) -}}
|
||||
{{- $_ := mustMergeOverwrite .Values (include "unifi.persistence" $ | fromYaml) -}}
|
||||
|
||||
{{/* Create the configmap for portal manually*/}}
|
||||
{{- include "unifi.portal" $ -}}
|
||||
|
||||
{{- include "ix.v1.common.loader.apply" . -}}
|
||||
@@ -0,0 +1 @@
|
||||
{"filename": "values.yaml", "keys": ["image"]}
|
||||
31
library/ix-dev/community/unifi-controller/upgrade_strategy
Executable file
31
library/ix-dev/community/unifi-controller/upgrade_strategy
Executable file
@@ -0,0 +1,31 @@
|
||||
#!/usr/bin/python3
|
||||
import json
|
||||
import re
|
||||
import sys
|
||||
|
||||
from catalog_update.upgrade_strategy import semantic_versioning
|
||||
|
||||
|
||||
RE_STABLE_VERSION = re.compile(r'v\d+\.\d+\.\d+')
|
||||
|
||||
|
||||
def newer_mapping(image_tags):
|
||||
key = list(image_tags.keys())[0]
|
||||
tags = {t.strip('v'): t for t in image_tags[key] if RE_STABLE_VERSION.fullmatch(t)}
|
||||
version = semantic_versioning(list(tags))
|
||||
if not version:
|
||||
return {}
|
||||
|
||||
return {
|
||||
'tags': {key: tags[version]},
|
||||
'app_version': version,
|
||||
}
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
try:
|
||||
versions_json = json.loads(sys.stdin.read())
|
||||
except ValueError:
|
||||
raise ValueError('Invalid json specified')
|
||||
|
||||
print(json.dumps(newer_mapping(versions_json)))
|
||||
29
library/ix-dev/community/unifi-controller/values.yaml
Normal file
29
library/ix-dev/community/unifi-controller/values.yaml
Normal file
@@ -0,0 +1,29 @@
|
||||
image:
|
||||
repository: jacobalberty/unifi
|
||||
pullPolicy: IfNotPresent
|
||||
tag: v7.4.162
|
||||
|
||||
resources:
|
||||
limits:
|
||||
cpu: 4000m
|
||||
memory: 8Gi
|
||||
|
||||
unifiConfig:
|
||||
additionalEnvs: []
|
||||
|
||||
unifiNetwork:
|
||||
webHttpsPort: 30072
|
||||
enableWebHttp: false
|
||||
webHttpPort: 30073
|
||||
portalHttpsPort: 30074
|
||||
enablePortalHttp: false
|
||||
portalHttpPort: 30075
|
||||
certificateID:
|
||||
# Stun only works with hostNetwork: true
|
||||
hostNetwork: false
|
||||
|
||||
unifiStorage:
|
||||
data:
|
||||
type: ixVolume
|
||||
datasetName: data
|
||||
additionalStorages: []
|
||||
Reference in New Issue
Block a user