mirror of
https://github.com/truenas/charts.git
synced 2026-04-23 18:10:06 +08:00
570 lines
25 KiB
JSON
570 lines
25 KiB
JSON
{
|
|
"1.0.24": {
|
|
"healthy": true,
|
|
"supported": true,
|
|
"healthy_error": null,
|
|
"location": "/__w/charts/charts/charts/pihole/1.0.24",
|
|
"last_update": "2024-01-22 12:13:03",
|
|
"required_features": [
|
|
"definitions/timezone",
|
|
"normalize/ixVolume"
|
|
],
|
|
"human_version": "2023.11.0_1.0.24",
|
|
"version": "1.0.24",
|
|
"chart_metadata": {
|
|
"name": "pihole",
|
|
"description": "DNS and Ad-filtering for your network.",
|
|
"annotations": {
|
|
"title": "Pi-hole"
|
|
},
|
|
"type": "application",
|
|
"version": "1.0.24",
|
|
"apiVersion": "v2",
|
|
"appVersion": "2023.11.0",
|
|
"kubeVersion": ">=1.16.0-0",
|
|
"maintainers": [
|
|
{
|
|
"name": "truenas",
|
|
"url": "https://www.truenas.com/",
|
|
"email": "dev@ixsystems.com"
|
|
}
|
|
],
|
|
"dependencies": [
|
|
{
|
|
"name": "common",
|
|
"repository": "file://../../../common/2304.0.1",
|
|
"version": "2304.0.1"
|
|
}
|
|
],
|
|
"home": "https://pi-hole.net/",
|
|
"icon": "https://media.sys.truenas.net/apps/pihole/icons/icon.png",
|
|
"sources": [
|
|
"https://pi-hole.net/",
|
|
"https://github.com/truenas/charts/tree/master/charts/pihole"
|
|
],
|
|
"keywords": [
|
|
"networking",
|
|
"dns"
|
|
]
|
|
},
|
|
"app_metadata": {
|
|
"runAsContext": [
|
|
{
|
|
"userName": "root",
|
|
"groupName": "root",
|
|
"gid": 0,
|
|
"uid": 0,
|
|
"description": "Pi-hole runs as root user."
|
|
}
|
|
],
|
|
"capabilities": [
|
|
{
|
|
"name": "CHOWN",
|
|
"description": "Pi-hole is able to chown files."
|
|
},
|
|
{
|
|
"name": "FOWNER",
|
|
"description": "Pi-hole is able to bypass permission checks for it's sub-processes."
|
|
},
|
|
{
|
|
"name": "SYS_CHROOT",
|
|
"description": "Pi-hole is able to use chroot."
|
|
},
|
|
{
|
|
"name": "MKNOD",
|
|
"description": "Pi-hole is able to create device nodes."
|
|
},
|
|
{
|
|
"name": "DAC_OVERRIDE",
|
|
"description": "Pi-hole is able to bypass permission checks."
|
|
},
|
|
{
|
|
"name": "FSETID",
|
|
"description": "Pi-hole is able to set file capabilities."
|
|
},
|
|
{
|
|
"name": "KILL",
|
|
"description": "Pi-hole is able to kill processes."
|
|
},
|
|
{
|
|
"name": "SETGID",
|
|
"description": "Pi-hole is able to set group ID for it's sub-processes."
|
|
},
|
|
{
|
|
"name": "SETUID",
|
|
"description": "Pi-hole is able to set user ID for it's sub-processes."
|
|
},
|
|
{
|
|
"name": "SETPCAP",
|
|
"description": "Pi-hole is able to set process capabilities."
|
|
},
|
|
{
|
|
"name": "NET_BIND_SERVICE",
|
|
"description": "Pi-hole is able to bind to privileged ports."
|
|
},
|
|
{
|
|
"name": "SETFCAP",
|
|
"description": "Pi-hole is able to set file capabilities."
|
|
},
|
|
{
|
|
"name": "NET_RAW",
|
|
"description": "Pi-hole is able to use raw sockets."
|
|
},
|
|
{
|
|
"name": "NET_ADMIN",
|
|
"description": "Pi-hole is able to perform various network-related operations."
|
|
},
|
|
{
|
|
"name": "AUDIT_WRITE",
|
|
"description": "Pi-hole is able to write to audit log."
|
|
}
|
|
],
|
|
"hostMounts": []
|
|
},
|
|
"schema": {
|
|
"groups": [
|
|
{
|
|
"name": "Configuration",
|
|
"description": "Pihole application configuration"
|
|
},
|
|
{
|
|
"name": "Storage",
|
|
"description": "Configure storage for pihole"
|
|
},
|
|
{
|
|
"name": "Networking",
|
|
"description": "Networking Configuration for pihole"
|
|
},
|
|
{
|
|
"name": "Advanced DNS Settings",
|
|
"description": "Configure DNS settings"
|
|
},
|
|
{
|
|
"name": "Resource Limits",
|
|
"description": "Set CPU/memory limits for Kubernetes Pod"
|
|
}
|
|
],
|
|
"portals": {
|
|
"web_portal": {
|
|
"protocols": [
|
|
"http"
|
|
],
|
|
"host": [
|
|
"$node_ip"
|
|
],
|
|
"ports": [
|
|
"$variable-web_port"
|
|
],
|
|
"path": "/admin/"
|
|
}
|
|
},
|
|
"questions": [
|
|
{
|
|
"variable": "web_port",
|
|
"label": "Web Port for pihole",
|
|
"group": "Networking",
|
|
"schema": {
|
|
"type": "int",
|
|
"min": 8000,
|
|
"max": 65535,
|
|
"default": 20720,
|
|
"required": true
|
|
}
|
|
},
|
|
{
|
|
"variable": "dhcp",
|
|
"label": "Enable DHCP",
|
|
"group": "Networking",
|
|
"schema": {
|
|
"type": "boolean",
|
|
"default": false,
|
|
"show_subquestions_if": true,
|
|
"subquestions": [
|
|
{
|
|
"variable": "dhcp_start",
|
|
"label": "DHCP Start Address",
|
|
"group": "Networking",
|
|
"schema": {
|
|
"type": "ipaddr",
|
|
"cidr": false,
|
|
"required": true
|
|
}
|
|
},
|
|
{
|
|
"variable": "dhcp_end",
|
|
"label": "DHCP End Address",
|
|
"group": "Networking",
|
|
"schema": {
|
|
"type": "ipaddr",
|
|
"cidr": false,
|
|
"required": true
|
|
}
|
|
},
|
|
{
|
|
"variable": "dhcp_gateway",
|
|
"label": "Gateway",
|
|
"group": "Networking",
|
|
"schema": {
|
|
"type": "ipaddr",
|
|
"cidr": false,
|
|
"required": true
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"variable": "dnsConfig",
|
|
"label": "DNS Configuration",
|
|
"group": "Advanced DNS Settings",
|
|
"schema": {
|
|
"type": "dict",
|
|
"attrs": [
|
|
{
|
|
"variable": "options",
|
|
"label": "DNS Options",
|
|
"schema": {
|
|
"type": "list",
|
|
"items": [
|
|
{
|
|
"variable": "optionsEntry",
|
|
"label": "Option Entry Configuration",
|
|
"schema": {
|
|
"type": "dict",
|
|
"attrs": [
|
|
{
|
|
"variable": "name",
|
|
"label": "Option Name",
|
|
"schema": {
|
|
"type": "string",
|
|
"required": true
|
|
}
|
|
},
|
|
{
|
|
"variable": "value",
|
|
"label": "Option Value",
|
|
"schema": {
|
|
"type": "string",
|
|
"required": true
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"variable": "ownerUID",
|
|
"label": "Storage User ID",
|
|
"description": "User ID of the dnsmasq volume being used (application will chown the volume path with specified UID)",
|
|
"group": "Configuration",
|
|
"schema": {
|
|
"type": "int",
|
|
"default": 568,
|
|
"min": 1,
|
|
"max": 65535
|
|
}
|
|
},
|
|
{
|
|
"variable": "ownerGID",
|
|
"label": "Storage Group ID",
|
|
"description": "Group ID of the dnsmasq volume being used (application will chown the volume path with specified GID)",
|
|
"group": "Configuration",
|
|
"schema": {
|
|
"type": "int",
|
|
"default": 568,
|
|
"min": 1,
|
|
"max": 65535
|
|
}
|
|
},
|
|
{
|
|
"variable": "password",
|
|
"label": "Admin password",
|
|
"group": "Configuration",
|
|
"schema": {
|
|
"type": "string",
|
|
"private": true,
|
|
"required": true,
|
|
"empty": false,
|
|
"immutable": true
|
|
}
|
|
},
|
|
{
|
|
"variable": "timezone",
|
|
"label": "Configure timezone",
|
|
"group": "Configuration",
|
|
"description": "Configure timezone for pihole",
|
|
"schema": {
|
|
"type": "string",
|
|
"$ref": [
|
|
"definitions/timezone"
|
|
],
|
|
"enum": [
|
|
{
|
|
"value": "Asia/Damascus",
|
|
"description": "'Asia/Damascus' timezone"
|
|
},
|
|
{
|
|
"value": "Asia/Saigon",
|
|
"description": "'Asia/Saigon' timezone"
|
|
}
|
|
],
|
|
"default": "America/Los_Angeles"
|
|
}
|
|
},
|
|
{
|
|
"variable": "environmentVariables",
|
|
"label": "Pihole environment",
|
|
"group": "Configuration",
|
|
"schema": {
|
|
"type": "list",
|
|
"default": [],
|
|
"items": [
|
|
{
|
|
"variable": "environmentVariable",
|
|
"label": "Environment Variable",
|
|
"schema": {
|
|
"type": "dict",
|
|
"attrs": [
|
|
{
|
|
"variable": "name",
|
|
"label": "Name",
|
|
"schema": {
|
|
"type": "string"
|
|
}
|
|
},
|
|
{
|
|
"variable": "value",
|
|
"label": "Value",
|
|
"schema": {
|
|
"type": "string"
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"variable": "appVolumeMounts",
|
|
"label": "Pihole Storage",
|
|
"group": "Storage",
|
|
"schema": {
|
|
"type": "dict",
|
|
"attrs": [
|
|
{
|
|
"variable": "config",
|
|
"label": "Configuration Volume",
|
|
"schema": {
|
|
"type": "dict",
|
|
"attrs": [
|
|
{
|
|
"variable": "datasetName",
|
|
"label": "Configuration Volume Dataset Name",
|
|
"schema": {
|
|
"type": "string",
|
|
"hidden": true,
|
|
"$ref": [
|
|
"normalize/ixVolume"
|
|
],
|
|
"show_if": [
|
|
[
|
|
"hostPathEnabled",
|
|
"=",
|
|
false
|
|
]
|
|
],
|
|
"default": "ix-pihole_config",
|
|
"editable": false
|
|
}
|
|
},
|
|
{
|
|
"variable": "mountPath",
|
|
"label": "Configuration Mount Path",
|
|
"description": "Path where the volume will be mounted inside the pod",
|
|
"schema": {
|
|
"type": "path",
|
|
"hidden": true,
|
|
"editable": true,
|
|
"default": "/etc/pihole"
|
|
}
|
|
},
|
|
{
|
|
"variable": "hostPathEnabled",
|
|
"label": "Enable Custom Host Path for Pihole Configuration Volume",
|
|
"schema": {
|
|
"type": "boolean",
|
|
"default": false,
|
|
"show_subquestions_if": true,
|
|
"subquestions": [
|
|
{
|
|
"variable": "hostPath",
|
|
"label": "Host Path for Pihole Configuration Volume",
|
|
"schema": {
|
|
"type": "hostpath",
|
|
"required": true
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"variable": "dnsmasq",
|
|
"label": "DNSMASQ Volume for pihole",
|
|
"schema": {
|
|
"type": "dict",
|
|
"attrs": [
|
|
{
|
|
"variable": "datasetName",
|
|
"label": "DNSMASQ Volume Dataset Name",
|
|
"schema": {
|
|
"type": "string",
|
|
"hidden": true,
|
|
"$ref": [
|
|
"normalize/ixVolume"
|
|
],
|
|
"show_if": [
|
|
[
|
|
"hostPathEnabled",
|
|
"=",
|
|
false
|
|
]
|
|
],
|
|
"default": "ix-pihole_dnsmasq",
|
|
"editable": false
|
|
}
|
|
},
|
|
{
|
|
"variable": "mountPath",
|
|
"label": "DNSMASQ Mount Path",
|
|
"description": "Path where the volume will be mounted inside the pod",
|
|
"schema": {
|
|
"type": "path",
|
|
"hidden": true,
|
|
"editable": true,
|
|
"default": "/etc/dnsmasq.d"
|
|
}
|
|
},
|
|
{
|
|
"variable": "hostPathEnabled",
|
|
"label": "Enable Custom Host Path for Pihole DNSMASQ Volume",
|
|
"schema": {
|
|
"type": "boolean",
|
|
"default": false,
|
|
"show_subquestions_if": true,
|
|
"subquestions": [
|
|
{
|
|
"variable": "hostPath",
|
|
"label": "Host Path for Pihole DNSMASQ Volume",
|
|
"schema": {
|
|
"type": "hostpath",
|
|
"required": true
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"variable": "extraAppVolumeMounts",
|
|
"label": "Extra Host Path Volumes",
|
|
"group": "Storage",
|
|
"schema": {
|
|
"type": "list",
|
|
"items": [
|
|
{
|
|
"variable": "extraAppVolume",
|
|
"label": "Host Path Volume",
|
|
"description": "Add an extra host path volume for Pihole application",
|
|
"schema": {
|
|
"type": "dict",
|
|
"attrs": [
|
|
{
|
|
"variable": "mountPath",
|
|
"label": "Mount Path in Pod",
|
|
"description": "Path where the volume will be mounted inside the pod",
|
|
"schema": {
|
|
"type": "path",
|
|
"required": true
|
|
}
|
|
},
|
|
{
|
|
"variable": "hostPath",
|
|
"label": "Host Path",
|
|
"description": "Host path",
|
|
"schema": {
|
|
"type": "hostpath",
|
|
"required": true
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"variable": "enableResourceLimits",
|
|
"label": "Enable Pod resource limits",
|
|
"group": "Resource Limits",
|
|
"schema": {
|
|
"type": "boolean",
|
|
"default": false
|
|
}
|
|
},
|
|
{
|
|
"variable": "cpuLimit",
|
|
"label": "CPU Limit",
|
|
"description": "CPU resource limit allow plain integer values with suffix m(milli) e.g 1000m, 100.",
|
|
"group": "Resource Limits",
|
|
"schema": {
|
|
"type": "string",
|
|
"show_if": [
|
|
[
|
|
"enableResourceLimits",
|
|
"=",
|
|
true
|
|
]
|
|
],
|
|
"valid_chars": "^\\d+(?:\\.\\d+(?!.*m$)|m?$)",
|
|
"default": "4000m"
|
|
}
|
|
},
|
|
{
|
|
"variable": "memLimit",
|
|
"label": "Memory Limit",
|
|
"group": "Resource Limits",
|
|
"description": "Memory limits is specified by number of bytes. Followed by quantity suffix like E,P,T,G,M,k and Ei,Pi,Ti,Mi,Gi,Ki can also be used. e.g 129e6, 129M, 128974848000m, 123Mi",
|
|
"schema": {
|
|
"type": "string",
|
|
"show_if": [
|
|
[
|
|
"enableResourceLimits",
|
|
"=",
|
|
true
|
|
]
|
|
],
|
|
"valid_chars": "^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$",
|
|
"default": "8Gi"
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"app_readme": "<h1>Pihole</h1>\n<p>DNS and Ad-filtering for your network.</p>",
|
|
"detailed_readme": "<h1>Pihole</h1>\n<p>DNS and Ad-filtering for your network.</p>",
|
|
"changelog": null
|
|
}
|
|
} |