From 631f91ce1f4a28e577209b5920e129d2d084531d Mon Sep 17 00:00:00 2001 From: TrueCharts-Bot Date: Wed, 9 Mar 2022 23:12:12 +0000 Subject: [PATCH] Commit new App releases for TrueCharts Signed-off-by: TrueCharts-Bot --- incubator/storj-node/0.0.1/CHANGELOG.md | 10 + incubator/storj-node/0.0.1/CONFIG.md | 8 + incubator/storj-node/0.0.1/Chart.lock | 6 + incubator/storj-node/0.0.1/Chart.yaml | 28 + incubator/storj-node/0.0.1/README.md | 39 + incubator/storj-node/0.0.1/SKIPINSTALL | 0 incubator/storj-node/0.0.1/app-readme.md | 3 + .../storj-node/0.0.1/charts/common-9.1.2.tgz | Bin 0 -> 42696 bytes incubator/storj-node/0.0.1/helm-values.md | 39 + incubator/storj-node/0.0.1/ix_values.yaml | 44 + incubator/storj-node/0.0.1/questions.yaml | 2860 +++++++++++++++++ incubator/storj-node/0.0.1/security.md | 136 + .../storj-node/0.0.1/templates/common.yaml | 1 + incubator/storj-node/0.0.1/values.yaml | 0 incubator/storj-node/item.yaml | 4 + 15 files changed, 3178 insertions(+) create mode 100644 incubator/storj-node/0.0.1/CHANGELOG.md create mode 100644 incubator/storj-node/0.0.1/CONFIG.md create mode 100644 incubator/storj-node/0.0.1/Chart.lock create mode 100644 incubator/storj-node/0.0.1/Chart.yaml create mode 100644 incubator/storj-node/0.0.1/README.md create mode 100644 incubator/storj-node/0.0.1/SKIPINSTALL create mode 100644 incubator/storj-node/0.0.1/app-readme.md create mode 100644 incubator/storj-node/0.0.1/charts/common-9.1.2.tgz create mode 100644 incubator/storj-node/0.0.1/helm-values.md create mode 100644 incubator/storj-node/0.0.1/ix_values.yaml create mode 100644 incubator/storj-node/0.0.1/questions.yaml create mode 100644 incubator/storj-node/0.0.1/security.md create mode 100644 incubator/storj-node/0.0.1/templates/common.yaml create mode 100644 incubator/storj-node/0.0.1/values.yaml create mode 100644 incubator/storj-node/item.yaml diff --git a/incubator/storj-node/0.0.1/CHANGELOG.md b/incubator/storj-node/0.0.1/CHANGELOG.md new file mode 100644 index 00000000000..bc4ba04d944 --- /dev/null +++ b/incubator/storj-node/0.0.1/CHANGELOG.md @@ -0,0 +1,10 @@ +# Changelog
+ + + +### storj-node-0.0.1 (2022-03-09) + +#### Feat + +* Add storj-node ([#2119](https://github.com/truecharts/apps/issues/2119)) + diff --git a/incubator/storj-node/0.0.1/CONFIG.md b/incubator/storj-node/0.0.1/CONFIG.md new file mode 100644 index 00000000000..fc9b2fa2d5f --- /dev/null +++ b/incubator/storj-node/0.0.1/CONFIG.md @@ -0,0 +1,8 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our "Linking Apps Internally" quick-start guide: +https://truecharts.org/manual/Quick-Start%20Guides/14-linking-apps/ + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/incubator/storj-node/0.0.1/Chart.lock b/incubator/storj-node/0.0.1/Chart.lock new file mode 100644 index 00000000000..db02af1d810 --- /dev/null +++ b/incubator/storj-node/0.0.1/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 9.1.2 +digest: sha256:c31f80d9a593b307274ae84096234c1928a407d3899cf5b173eac54118901f24 +generated: "2022-03-09T23:04:43.910894054Z" diff --git a/incubator/storj-node/0.0.1/Chart.yaml b/incubator/storj-node/0.0.1/Chart.yaml new file mode 100644 index 00000000000..d624b2c99b2 --- /dev/null +++ b/incubator/storj-node/0.0.1/Chart.yaml @@ -0,0 +1,28 @@ +apiVersion: v2 +appVersion: "1.49.5" +dependencies: +- name: common + repository: https://truecharts.org + version: 9.1.2 +description: Storj is an S3-compatible platform and suite of decentralized applications that allows you to store data in a secure and decentralized manner +home: https://github.com/truecharts/apps/tree/master/charts/stable/storj-node +icon: https://truecharts.org/_static/img/appicons/storj-node.png +keywords: +- storj +- storage +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: storj-node +sources: +- https://github.com/storj/storj +- https://docs.storj.io/node/ +- https://hub.docker.com/r/storjlabs/storagenode +version: 0.0.1 +annotations: + truecharts.org/catagories: | + - media + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/incubator/storj-node/0.0.1/README.md b/incubator/storj-node/0.0.1/README.md new file mode 100644 index 00000000000..3263087929b --- /dev/null +++ b/incubator/storj-node/0.0.1/README.md @@ -0,0 +1,39 @@ +# Introduction + +Storj is an S3-compatible platform and suite of decentralized applications that allows you to store data in a secure and decentralized manner + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://truecharts.org | common | 9.1.2 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/03-Installing-an-App/). + +## Uninstalling the Chart + +To remove this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/07-Deleting-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Open-Apps/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/incubator/storj-node/0.0.1/SKIPINSTALL b/incubator/storj-node/0.0.1/SKIPINSTALL new file mode 100644 index 00000000000..e69de29bb2d diff --git a/incubator/storj-node/0.0.1/app-readme.md b/incubator/storj-node/0.0.1/app-readme.md new file mode 100644 index 00000000000..a36208fdd45 --- /dev/null +++ b/incubator/storj-node/0.0.1/app-readme.md @@ -0,0 +1,3 @@ +Storj is an S3-compatible platform and suite of decentralized applications that allows you to store data in a secure and decentralized manner + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/incubator/storj-node/0.0.1/charts/common-9.1.2.tgz b/incubator/storj-node/0.0.1/charts/common-9.1.2.tgz new file mode 100644 index 0000000000000000000000000000000000000000..a1931401a3c72396c0ca878273c2cbac48a83d32 GIT binary patch literal 42696 zcmV*0KzY9(iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYccjGpaC_aDdQ{bw5ZtPs^X<2q_r{}khyOa2&A3kk&XLo1k zxFHgfFs4Wb0Oi&={oQ{DPXZ)JQGO+vF?T0zkwBqPC{z^+g+h=lmr2|^SwOwF+(vEP_y3Qc+~G79vrl;(E2(dA)T~3AaAVI(U^9`i&h7yX0Ea+GF|=V zuP+DP!MNM+^uK8>A&wcuF(LvOT0$I60FGzLf98O@37NM5h#~Ks63_5FBaqMa)-&**A)3J~V!ZGP0 zbuM760b3xT3V*7Uj(F!6I(v0S{+%dDO|uHpO6gBwdDFw zx`4xj@njn8!-Mg37z|zLGqZUOP@O#GOD)7iU(oe@NNhgt&K&zPVeGDyO0seX+K zn)8a)bkAWoB)Ngv0Gdtc)u7w&4*SDF|HWWr=zR#$Xm->e9PJ++9HDT$fB0fLo*m5& z$Fn0e8_fpO(cx%191f>P{ewf)e=(TC{&a*6X5->mbbG#ecrjHfRU>JRpZ zv!n26G~OS)I2z9&91iyn#zW|5=R(_CQ8z}6E|P?8OI=;Bnz{yZL+a}Cn_*Q8i-Z0_ zxIfzOqwp{ogrof#3I|8wG#m^L52uG?6immnVE=GD80=4j(IDI(g>bmv4@UhV9334T zG-$h;y2sHqTvJ8YAPEsgWQEAKl+9~a)0UU%DDVx*YgK6k(P7~c7ZjSvhrt014+s7I z{=q>oJsj;%2ebY0=x`QHhtuJ~;4mDc+4%5q2nU1kMR2e`8tudW!8jNqc+~F?n>D`` z7sDvUG1`{WvQ{;fk0sQG1eVY?!EwmC-yK+@Vbp(du>WENr&EYt^bgUC(R45y&cY!Y zhG-m&X2bpf9!y^x_D2VY`@_+G0FTggFb=0jK{!1OHa5MT*i9GVU6UhtZlHKI3% z-c`r{YV12jDtG-|#nsax|XnZhWi5n=$wAXyZV9F-o zZ-1BY)l!irOQZ<@3;-b3UGlB?)5hiQ7)-#;*NWanaEhXBz{(1D?b9urwL9`ITTT(- zj2t402?{})gj7!d2nUc(z@UbKvUE;hhyY~-GBjU{qTeS3yfVnpJ>CZ#%AQEx`hWt0 zAVXkBNvvG};}CpEq6o+Hk7)>*;!6(eT=nK0d4au;U!e#wR0ffQm%v^LQgAQ;&*Oyf zse>v1rt#-fi`XFe3#i?n?l00 zKmqwLBP~A25#>M#T49Ql7%VX55*|c&iJ2I6`Qb~#Ql4~jiFoJXqQXE|2cn%;4@oa`jzHkh2!1e%MrU_v% zW=3WUaSDF;cq%)iAx}VC{BE~Y!&(R{USBR@9PZFv14k=aJ`IFptECEwsqBFP$(+{I z=AW&q$6+XI;Mj;5z!D896LSji;h(NGv~KGeI3suo369pD4x=xOz+<-^&IczN32=dz z=$}c9S{MH_0Us|;tU^-Xao}qpXc`$m<-6l^*-A@(C~BrTijlNVw5n79q~)@NsjaM} zqEiqI1cv?? z*aVEnV~e2mYB5d1R+@yz9@Xbj5?&S2dS*4&qy?c7ya>7~M%8@dYOm&K`4yJ~)k5VJ zVu&npj3~HXAWrCf*2w9>s{)e66kKDr02dekt+}b&Vr*?}r`v&}EW~jRQ2ca3in$7Y zObGrbhZKRcBm~D9OK1QiL<%PPUqVa;tiQIPDuZJo7E4orK{7{d!Wk*o70N1D;`oD6 z&fuBQ&rA5leb?_BC?{thKQbKQe~Pg_LnJ^kz@=l~!zJ?UJ}^jD_xq3s1e>7O9*nWmt76e#iv*eVruylT(4q6`D=| zfdWP~BbRaLDn%1SS*V5+PLq|HEyWoM3`|SNo+uxJaI9S?4}I zT)u!16BMv$4IpDMSSU5drJ%9^am)~z!9a}QS%e_v0|($WBxnLIIE?8!g_I%+u8yc? z8_LZ_L}D17Y5>$)t#W(Ge3*bXis^n^En0C3mlO53@({GcMUb{D>P|_&t}0*i;6RrE z^5^NWc!_5Y8M=n+ zi38s(9L$KY1f)rtMN))QzSw2bq~QFjmagk0Q=YsvAD8dcfB?3D!se#PUgUCZgW`a! zQ$DeC%YRSmAE76ODLUiJTE2+mtI%hH4dV4Q3D*(<7zCWN)YP#ys=*9LsN0gr8V|wQ z@%j1B??1enfaSWwS>!q)q3Z5iD6FFuCP^%ovc@v+f(xbDa_i|CIA6yMe$hUrN$VLn z-UWKO@eF*oD_eUt0pHx*fbIt*IJNtZYs#-*ziB-KC#FbC4GD@@-;-o%egn|$c3UW3 zDGB!se9}nC{wtDl#XTd*(x_lQ%jFV*SNd6y3J{5cwhAU7M9XAPy7FXUj(~&-u5lEB zDUyXcFkIr8BXW^OhME_z-=4iWzIc84>G;jZ*Avk8^i$Ss*WfPj-mw-ny8@$E$#r}U zNeGV5PI+Z6o^{~FRW?N=Mhwv|PI_Sy&>n;IiuQ2K^+6|u40d2D3`jmYJ!@DydRRN? zOPWyBNt3XH<5@zMvMlfACytsJ3EkIs?_a&Xe0TizwVq@%jH2)Zn&p#Dyg3sKI6e`& zaS|dFhIiu$s)j{e|ZI!l;#)WV~qCS0kgd~J$#z=>S{r35Dgvo#1J zNaaF3cPTKgN(FaMrE8f63lwJDxYzYgc(r$;3GfWiHDzeo;eF`@1dD~DUM)x$hMM%w z8q`1)xVFqs0~TIi@xkqcFrFilWVDkbQUx7-;RA}95VwMdDPoKpFZzY{wfww5v0h^* zl)aN08Z6-z0+ibZLRcXN!kB7hnSjsAB>5f_%J`J|QP%z3vVauVV7cyY+tu3u&z!a~ zl@*12Yge@7tHmwwZp$DlsApH#9-36Ga9_PU*L0zKW=loe>T#Gbs$>>e!Zjd>CeaFk zm_|u*m8Aevnn}x!uXMprW~yYT4W#wAHdeZo_HS zOA#c&0@;>;G_-ok$P#F~ju)?x7L2Y{J(tga`x`;CzyE!wMrZ^{9H5lZp03wX#vG34 z{A0|8i6uv9M-}WnlZpq&^A1}e{d%`0^~1UR`3A>V)MXg$fI1_IP+T7=BH;8D*g5-n z`f8W=jLRoLQ7V>M(VAXBg9z&M&g5JELHAg!6l5I zJMZHUNy6S@x`ZrPY=`xd+XuOula{eh30~m{&27&IK`?wDM{C~h_c%gQo|>I3;RZg_ z^+ z#sJ5dnG$>4P{i?^&tJSm05X7M%3u_MB#zeImilEpw)CD`LwxCgLM*oUGP$FmI9;r* zx-GTW0OD+rC{cmRjQ!dax^G~0-{lIOTYfKkH38>LuCm9ig zq=BCq*iyvj@SQWqcnXeu{3-{6I?_m^8VQ_Vkyh-Ntef*k` zgna&u$e^Q~RO7Fdm;^Y^IZf_)ffymlcbXOm%n1z8EQ_M`BVjLa7p9f?g07IeGaT}wENT_LU^ zmNMWG#$ceq>{%{evG0_`(K`PuYC&>^LcZQrC`i!iM+s{uR!aJuv)K%Pk>Is%lS7B8 zLkKqj+5^&PA+?<=HGv7^ll$j|SXJEW(-pyDQUNUCTDW=8FBv9M z6nf)ZJORhIMC(>z$JJd@plW&(Iq?}KHEF?8PGk{+2doV$B^oxF6ueqaAgjmLxdNQ3 zE&r~~Me#gB=L`l{d*Don+E*Ej)QbA{CV8)ALAvmBN z5+yuDIU1*DtI;0+@7Qhvi;V*CcQ5Uv_qGAiESV~(bZddib(AGg8x4sz^K#L;QM{&l zmR88u4Kh~HVuOIS;M`KiN{Uws*a{)*aEAa9iwOR_PD0qEP?k$A-Vc@pNz}EzooA_l zVFem|=Btd)d-C6N{>R11nKGk3zB>DCSC@FIv&bhWVdle@W&IuN~<0RRgGtQ{-yrR$FF z=N$BBK4R+p6$;hj#u^5r;c#q@N=Of|wc^1sWeA2KnOW`d(w|e&gcyx3A7K^F!6_7~ zsi%WMs2n<5nTkbLj(d)EksqAnluE0qC7-;9s^BOtyf<5g!dG7{!Q^L4a4Fyg>+f%WZ&|HY8mp>I6KgdudN*@b!KpS^ zbtqYLb5)bT5vL|vuU3}oxcEETt0olBFH3bR4{om-;?^0g#~Di^9ADYAlks@AP~^!8DNOfm*U7?g?+S?bnN z9Ck9Q^zf`mTP4FfeD>qGGldifHpAp?|4UGPX|t8yV*hK?s=i6m*I+_B2=!4Xnm#^PSg&l5_zRw$n}i{&;-e~#XzYc zc=oKIix&xHxgNH4n)s4WQi=MH2^A-y1XAuUz1GkoX4q0C0!09t z*>!PsT7U?{GvQx1LI#L4X(xy(m)37~5in z_W{XpG_K|(_8iVK$zsNp?8o!(K#1gdgge>s7Pe(uUbawa$~WujLm^ja-HV}#kZ!Qj zu*%+csUbmp0}^qbsCuno&iQio3QQ2}hV_O)(6{0+wdKjJ!f`*hs*~>kY&t6F*7aEm z0)Qz7LdYP{859fh*c^P|^>{(Y+?XZF1WX~ROzPMK-QylJfndR)$iDLPGK~KBsbYv!0p}$ooUU`tL?UvHc z?1Xb-8lkgKCwuD8AJ6tcx(fCHTBdCM3X?sh>-O^5wkPzI$Ogc9O#~TOTQTX%UQx{w z5|{)IsmKn(`(ly)XBJdw(cx_Vp5aj`oD>)A5ojIFp;QuU~6fBW?N`_1%QMN>S zvF7e(YXaNHA3pc~!qK@*W|wS%E@kz)sX~V@|(^#N_$efrD?|8St8%RMJxQ^ix2izi)DNQ&r#c4@u31+97us%Bf^ZohfJtykLfI!6K zKT!QD!{c+BEyO{bh$0Dcj#nrKRQ5`Cs$4&dg|iriV8=pZSFol89cNLr2jawmB+O9} z&?7ch`P^9~##7<%6yQddzn| z@toC(wYQ`Top2bU@pY1sjsR)l@KHGrgCzck&Y3Kn7oQyfpSxCC0SIU|?a1(`m}<5( zYl1MJu-Y3hBD0B1c__|Go2kQxvO}|}SUxDU#d(*viJde|3rJRA z-M6_@Gf^hJu#@Fk&1DiIGlg=u|5OFDso|638Y1$46ws~Q@e)Qa$FL(Yr261ahhssd zGaj0*O~3~P!=DLe=sh=G^X^|P5P(uRCNqPh?gdvoh~}FYm9(MwpJ)PJym;{gHo&D* zArXrh$&p;h%7ZeWPC%9>G59P}#bmKMHSt*qE?%&h#o)xOOSJOQoWTcU0SUKP*fl~i zfRTL=pk+~c8zLLZiuOWGcIzV~ISS##HF?YePAWf*c~R>3WMz*-W{Ee6tdb48qDE|k zo#THZ`SCl^`X@=T&tQfi0Q_jDo00&fW)DYx6rV?F& zXJ8;X?GM2kD@dYbPH)K@D@c00`V)6NGIvO!hn8s~lKv~&)Q&VSeam5H%k+0Rz-n~= z^#=FxrasByN!3EQ!PF;N{KOZ{`J!cQ3kai95G75pG>gT#)ZA;yaqeZ5^rkolvm^=; zk&!5JpEgW_D?~bcZJMZ*cXwf#g~F+xWuAeH_pjaql`K;%!4lz6`7aUsK8+GVh!Sob zdMBf#GsQ)QGcqVn#Imy_mGqL`UOD4nAtT$BTZ5M=uR6PCXGZa?qGs(HTv_`KSK#KL z183IHx~b2_+0yRuPrCi~Z8+gyg$sUL4)`rc-x>MWD)~z?12FeWEme}O#~4L18X;P3 zPyqKx{1C0I#jOr85DtkHktL>7`1jsNMv&h3;ey6VL`6&_RyAP5#HxYCDy7+EXNoQtc*iVu{vYaJ$mNZP90;tA2tP?yFg zi&&L^PLN{@@0^b3DYL8$eE$tOS9*OLFtBzH-<5%7kMEz2HQXm={>_+KoxRL?xN^5i z6znW@8qylJvvwE$!0vvlzYpj1e)#%=s6m4BaU-O zK1`y%{P0e7E6<4b2j<_0W?%1!tMHo5!>uyOH5+SLc=JH3)*Fs;5$e+jR|%*v7f>c3 zTF_`|@6A~BbVSGD;h|U7snL=V80End@AHVlE3}?~j3Qz-pn-|YTdq5El4NObx$c-E ztqt2=)^#t6%kqGL&sMY*jzhe{VFn{UGFSTk1d(@%G8hM_+maL(8)!OhCsmmjMcj%= zqG)@M_*?PP-UwkvekGAn8P6b4sWT5835ZMNdr0-ejh zw`hO(1D3y>ea>KkVA@gdIwH_lQT-j~3%Lu&2_7UdWdvf8;(RM5CKEK`c-}!P8H&?` zl;U|Tk}btah<0J&c)vDaI#M_W5yyAw?$mO<8RyW(3Q(J;Z{ZjA`Z6N>eWO zPtSBPv@E1kh~7);NEn74g+PZTf(H=`Is%6dmw4jO4wRVpc3W0I%(&vz%F8_H4*Gp5 z1q`NAl662^hqVUDvaR1;Utf2f_ip}4oghJPT~pALm*&ulw1C}~$*C}DfoI@n1Tvb5 zOG5|>lI0S`p@=`SlGEh*gj7v=_#y!jf-B{$6In_)%Lh2gD2E&@5^O~aavjo@xlLe1 z6M$o`3&gpy1sC{K#uHLNvY0QSt>mC8&v1kpix3BG5ZMDX3l_Zbw>ZXpc)L0Q%+@L)x?En6Xbq-B z96y0Gh6wm3r|~ykktmLjh}645noYo{-|sKg2E$TZWq0%g7Fo9BC|X4ag@OnDw>ZzQ zsIHk-v6w0fg93_Hh`@+XjSgP~>r{*~+{I+k3q?$iihHV!w}fG6a+%k*Y@$3roxM}d zcfl!Z&@@ojYKil8IG!bY$|I0u4E!z02w&t=IhiLtF?+jLN3;W3XOS$$?C2#K>EwC$ z^=;!FeLJ`!NAH=r3b(ULW4~j_%0b=&V3pbj5^Y}z<< zJ$0&}eFCulx@K9f`i#12FkgGh&BGAI3_}@3sS@LAzYcHg+)3jhW?cvF8W`M=RX!-4 zbY1RkCD~k`U(mLqakBtZHV;<3!cla7jajg;9P{XlxG^GBNt5a2>Dg*zf>nKA$Hklo zN-FZMSV=B51q-QOD`@BrJSf&G##2R+mAlv+!Is%Lb$%lm1FijMX$&Y1Q2?!rek`w+ zSP?kxEVUBjy^>dn&E&;nCg4zDtd@H##|dGs&H5c9?8GDk@XQWMM)4|lk(6(40;R~} z{ECiHAYKmsR?8y6;Zrk*P)~VB$-9YhD=)CKk+Di+{=Y6qL47UnT|Iy+ zb$e%O$(_pS)oyuogOa-*?ObNK4Yfy#uh=kW zJ?(Gm2(O5|q9VjZ9;COzMWaMz?qCT>iEP9f3=Jp{nayR##GQ-AJ=5vH%*dAxh?Cfo z0!0L@FKrc4-|Ma@Z?RpGHb^aVfIxo%nHg7ZJaGNLK(UK5EAqoPe$HdWDHh4QU%i^4LhUR`Co208}tZXL59Hj`Hx&~Y&4(dm^r4?2Y4;&YB(AOP^VwS>f9JSqRMxWqVcGMVot%Z zSi37Pw-9+2@_ELMMiC+})^@7RE5ujnSBP>x3b+ZUlN4F4%hrlGyw<_)$}gxUB!A=Y zjm&2*ZF=-26&HPB?e*gV7>KW1e{DkIs5&qz&5EA z3a2v*=kS5LCrl1qx9(KE=d3)h?K}4_1nRcO-YXBj>l5AE*<>k6mJH&^GRSh9EK26m z?L!wh1vX!ajQ_ zH&d)rq>{ltet5%s{U*7>;sa+6H`wCBWR?)TGdD*_r3IjBxv*6)qC}q%G>IdWk;5zW zzU}e?-u1fbxOF8>f4g}RBSsgAJd&yB1xYf_0^)USE_o6+E?r}`5H`nI65iX~&^Xl1 z4TI-HEF%o?`z`kuyuiA2V@k!*cT?AUMYBG6XsoYr8W0rHw&wZ3y_i`i?ViMj~s&?E?xi-M(9dS8LWIQS@;;wd8yq zPPgxts@SY!s__ z{|@)Z2Y(ujhJ(TI;9$@n{;5Cg5BK|j0{wgLtM|z$gXB;BJGWKr+#lq*x#@k|5-QB( zfe|YzwQW0%GL#Y=%LGCT!x|#jKQzptLcLU?G)VI6@AEt4U1O@-`nLD=YwPC5ggdom zf$k!OZP5A3tq1-U&p`K+G!z166MP>wE0mpzGF@ z>+a^2zkY3XI-M3wv08^sfQ4OeHJl;_2dyg{hZ9gSqgqSEpo~}2A)Yrkc_##VYQbp` zEn+6WbBulkG3M%rff28&uNx6fU5MVPn`{AauufCjTMg9K8^`wMrlS9O1Q%adDk=bA z;qDtKNm=l#akAL7766tw{(wX}V_FHtDr12fC;;%wW&n8^3&6etfEdAnO=dsSNz6~q zK7M34!v7TN{S1+So1b%}$Tbe_ zcL~Lz{j;`*^4Q{ic5;~?lDtDd8{p-1RsZNHNu&S%t%dII=qc-e7)5u`^}c6={_h_Q z`>y^Uj0Oi!`u|ZLq5svr_>8ROnb6$9>i9q8t*YQu?FJDfd=-3QExZ)dcwAWhdB7kpuw#`t`U*cM8rLa7330kV1 z4{gTOLgTCKa~t9xS+tbrzd62fZ&F~x{2vSl`-S;`us_;=n*WdSi246P%;Z8QOEVdC z&OIFxqb^sjn!tvCs;05L8^TKI39UAqnMYteN8mZHum_&!=ZYpTjggSQbd8(5bZM!e zOny^9LgGNJCOTigwoK{Xw=#{HwN+@Re=B9@#2k_ z@NL@_+mcF7AB{|EdEtTfdojQgTpR3!IADAf&F~eQ+%1r>C>X_tnLQ?L@VwS8v&^zT zpy>RUc*^qMBt zMY{U5kr&N6B<(!G79Q1jT3Bl55(I{g4rohTgkS(EWUw!Pg8*(m5lh8AWPe#InJs$mUa(3UB0kA>;?~e`-iu(WH zaP*}AALF@={x=MAzXpH-+r$Deg`Z4-e*qJK__lAHnriFDpz)kC0vVdG`Fd6_%G)21 zWWcr$h^b-kEy6eiJ2A50-o@%&>N%Fh1%Y5iUfDjScIZzi9x)vmKUG`^gx6GDiQ6 zjM1|Fr^DaxZx3*z{kLE8|MU+Ip6tKJc!YD?_Wz%%Ll(8(e^6z_Ddwqn{pa@vH}w4L zgCCaPU%x7N{WbGe`25vp%j2)%`278$PBm5b30ooAz^Q!abRU5QfBs&$NFTka9iFY<_%lO(XH7Q!HgSZi+g56UZ!JLLZ zW~jq_^A->y>_?INxox%MC0mgZ5Mf<;pwQa;@ph@s2=ng`wUn%48Hr1|=!&;@tE6-r z6u`3RoqI_fI}i(fz^=gcF>mqrOw(yzHz-;s_)g6I?cV0{^eTvjc4Hrr0hvy zU~;d5U9cmqBu<{)Qb!Zwt=6@sz5r2GY;VCjw)SYmG**Q&yOch&Fr zYQZr(OrlNU|(xHvaNSw>{~$C*9UqGCk?GC*Af()@_ff+8jUQZ|!p| z`~S@Gw#SP9-yiQ6{eK6e!Qqqt?=c?X|2s!P5{Hni?L(kkq-sZgl)w;?;<-?<6XgeoCRfvvohvs!m#Gyy*TMAm8H+eJKAX)G?-aW`+g=&jPY z8D7Qoe_N1ES8Yx-U85Ol#SCm)pr)%fM@`q*fZBH%j>7yz;1Z_wY@HvM>sB*y4m3Yu zU4Kk@6}U&9%cr76#?Ip)NV1p}%FcXYgg!z!p3lN1PoP~0>b0zg0y1{N5*1`6pR2Xp zpmU604Z8iX*h5W&Q=_=S50H`Cz&OV*k z;WZ|iet-(fh+D0^w9!>N=oheK4hRTz#CIta#fx1P$|tI+#EYWSC1;S;t`$Sbk?Rz_ z0Rm#FeB;yp<(7(JUNUrS(~@^{w3pRV+tY5-*gr{GN1PRx+QrS`n}4ZD>ObaFmj7Ji z->(ALbpHQfI4sKl{lSy`f0Spd{Esk-EdB5)zlHT)4+2V)(-R^jII|ELWJdvs?=WK` zO{F;5VnqYV5F&LC#D^q8zoUbL0&(}q;LRNl3|6(U^?ARNv@XLGSETaK;t#zAR~?F^ z0CM~IZo~H-jzb*JpGI-JW=Iktl?W83_y>|?X$|FDIw`0|q4?hMe3M{eU6_DeAt{uS=#!6>&ALc^MB~hn1GhA1`vatpDZ8_&zOw z4f?--&>t7||M+n5r2ik|QTiW&bI)b|N{LsiYVAewC}ShDCE(viPRrBM?^F0ohRO;| zd5O4)5_e<2Qs~u9`+v3Ni*No5LHl^;KZm1!(f&W^kDliLqdX=5kG|*kmi`{&)~!1L zs_zeLdj3;iT4s5G^eflv2@ta z;P60a{Vdc=P1YUt)Aj75eg%^Lc1Qh851vl?-R7y(|4=Tp?!ye&Wd9$Q_J78s;Zy#v zM|mv!-(FvDy$*0g3Cg}Zw?tP$+^}wNTm;_rgVxR^)md6d>{ekC-~Fx?k29grNXcj8 z_4PDLymikD5YPP2;}q^`4X|PUkM@UyqWyn3dOH96D9E{zHZURB86Tc%D@_l6xtOIz?vJx#Sf2L!{P31;ZMi1673 zzk*+~#7+a6U)$z@7S|O!*V_xMSVG`D$GJ=KKb`hoym;{gZu?sCg<(o)(mm7$JHQu{ z#0RoHkCG{j+TeL9lJ#H375|$&CHr3n$M>wm61_|7?89wV1e@&t;h>QJaX1(bpU(e0 z$|LQ6ZThoB-|AL4ER)17eeIi`!aaavl@~xzl}^ogqJXN;<7i)B z?^|%3rd%G#F<)%g&CF`HiT5b9&uPa)nZ0+=3?T|L< zdI4sB!*1>kFT~{M@XJA?z8+X(s_IFVuE$dTa)(cq*s23EuI=39Q?3|A1-gC+?LcL9 z80HGC&1QC=)yYZo6OAaJQ=5Y8HFj-EK5=LW-uNQI$aQ#+%-D zBb+K?)~1^+jfR5I`xd-H43Q<5>EfiCy!+YNC;h+TOm)6pD%ofiXg`jXM%8YniHEmS z0C~n6YQmH9%(wkP;Aq2BYm3W0@O+U_X6Fu8(D`dxxyQF7R}`XhH-&6LL4VicPQ|UV zFNPj%jz`;cX18J^t?69YnBKQ;E?CKZ?=Tmt{{F4)pnun=q5ZGyi`#7oY>NLmJRBG8 z|Ni*N{(qFm?Eg6?0uE6C3+A#&`biO~-3Y9+i1{>ESKgcNExZ)Ygtp@_)L&2e$1Xu> zLNQCo8hrgasVT_d9DM!SmN3tVYzjd5AG&&2+Ta694IS~S&@)n^H@#tfi%g-H^N3v5=9U~Y-Dt2QcqCkMPV(RCCl zulB(6l^|rf?^m7sg0mwzV1rYAH!r5+uAemE} zPpU!ll4A2p=GyXisRP=bj<5{)pLasFty-!CpwjBT!o>FR_1eyfkdkp`xpL(qw|THdP}#$1GpQH7)lYq-Z>9TKe3?4CgFq)^&1IKri7Y zphuE~^}3WUdN{l!6iPpMHkF^%yPKLbHf3y#t5%%mu>H1MhAm60tC9Y{7$?_5Idn%^Zx>9~RvBO7#<3!|u4lr<3E8locoMiuT=q6rutjJXnEXsL8t2V9}G zu~(&gGxeFUPhP!0+EXR}b*j5NJO3KU|M93~{~z?9;{PAzG4kIeQoO74&!koKy8iT6 zpW{z|+u-(di#2ijxiwsu-_|}q00Nl8DULA1I$#Qhp^lR3fOoGiE{|WmJ$={O!aryw zqx>U!2Mzb!mv7Lf$HRLDIRnEulo={|Qyll`Lj2tc#6L7bCGL&dzO7`| z)f3p46ui=9dm0kF9RkpuUF7XaatfJ33kMfJKb?x&YGaMn=$sSv#J@Z{O>_0tLq;8a4VQmiu5k|4O@h2nE z#JSCPKxS%-fl(@Qf--NMlZ1{n@q_~M>H5inLb;1DGNj1~!H z=56uV3*e3U+TqXTWeVBi@=~oe_z$sQs5nCKZ|1^iB>x|F{XZO**Z-sOll*^_r!4>P zy8gFSL3#aeB(Z1xufJ_r|GUMStpD8_cU=E(v8cE7+#hjKZ&>2K7WFng9)3~3A?n5; z(>Ufvs;e&7%rAS01-X!Ptb%qautj%97gLZ*;Ud*A-N2FZCxT%3K91HCaZ}x$BXb(W z;?$1sAIJak@BVDo|7K7h%KtMs+&?V&f1dLHJ~3{9mPU?^4_)`QZ5<2mN8cnE!EjFnpT-kMUI5f9fjI$29%Kb)=Tnx6L)DH|8qJ zc9No4-fVj7i&1kBz;B?K#;!3z^9+(Z-NR}F@if?KWO1z0Slb#NOysBUailU`|GT=o zpPs@~C;!zn=v_)SeX#Za;BZv5|AzZd_kTUgQzifPaUePLKq~=gQdkt0)Dfl(Bs1^Q zx&`A<)P$bXMO>0f|MLuQ-dr$}*}vpZ^dY8)Sn;d2A92BNdb{;{pWZRCkM1kI?_@qt zy5{%wG?M=hoBv_|a9ouCgTemO`u|a$()rK3ZvT3uWWM{WKKeF))u#=6zfP$pTfa_) zyCr+rBJf+kIsfnT%eU`eeSGtJi(O+*y+7uLG3THA+ACI6c=&DNicJRI{uPd*^J~n4 zh1=TqrypMbeEjB(-CFzoyS7#2!~2gHuP+BqiNWEpI~aHS-F|N{Z2K>|mc*=JiZ3!4 z@149uo?f1wtwt_pve}y(VQ#4`wnHCXDu&z)iJu@o490o&=lZ+4<({s_@=6+0!n+f{ zp>Nf&UjndWB@FwIKd;)}a$T@n?Bl%KM%_t&by6@JP zOChD#2?-@-P`vt{Bug2qAniDHNhsKSGiSjkt7W`}d^sM%ih8i)baIDAmo6YdVb>JY zWR%Fruhj=d3qB8Ln2e{S6o0{u9bL0YyaO*A;T4JzrDr6WiiVsQO+y|!8(Mj=fQm-; z-^1qr=#K}(QvBaj{@=%W9w7fmaqZZ7sM|rG+v28aWcTx`$nH;P?=Fu&Ui>(b8PyAF zrHROGCT@QP)A0z!!S5r?sc!xozw{kFfE(xkxP1QiDgNhio+|&}&wA|d#RI5BM!npy zwn6;fy&R`I`uB{>t`r_wz{K(O?LL5q&+2pIGhO#O{tf5 zKOA4Y|KNBG{-gcmGAg@_{*XSSpHAPrIsf_e;^aqXghd!&rTb(g+$XNz=s|obqlUhe zk>8h6?&Rg`|2lc|@zv{B?_OX0{QkpF=a;8vpGGBiD#I_({$Jk@)sS}M0__@8WivBB zw0q`Wd^3mzmO*ko@Bce_X&&w=*?%hC|9zbM*UzT-kHh_gLj2!hfAF;adz7d4{#RJI z{S`(!2>&fi@Ad9ieaS>2eSi|Vvn-1A{UDot(4FF$hPN=)wR2EbsnQ*@UH1?}ZcnKj z@w@(eF6<-u_V;f2OoZF=%bL6XJ%NYL<@^eSdqvBxe&4lU`%YwN+Bg@l2>s=LuYqUD zuiGYZC^RO(-p|dt8t>wDx>XW+!+p9M+&x~RD~VBRfxphnvNQra8r-hq#H`XG%~VLW z{6}9HA~B3kV}{5K28ceG|8G=^{~I4Z#eYA_vz7dRtylsWo~Tv=8O8Bj-WPsy{N^?I z;p6FM@n7b-JR-cXSBpjSmdwUqUYBZ1v6B%oF@aA)wXcq7H;8dJh=W-dC%x66tz?!m zqmLPb!GbSNUm=nI4JWZjis3IEF35`4kc*e*Hd%e8s}y$=@QwH?dh+$_H@}4?SUvys zO=EXI08&5y2ZP~wSUmr6FnG%U`6$oU_TQvoSn>wP zSN9B7rMo`QFM+ROks{#>-7F1&`@Lo$JSddM!&9h13q@uswWcpdJR&XOh$u7erPxE+C|c z+;oN+iAK*EoJL+zXm3TBOG0%8b*@aqS%%>?;po#;*-&kTdK8JoOG9)FDtB!- zUlzMdThxF<_Qt=iov{&5`=Pnr!3hDj{w3zJ-?JK<$rhn zsFJs-%?Ly@d}aEaa}!_Gk|bl|mPJO^X@X-$+g2npwLaLl{9U7|*caEEu}zz?##uFE zk9=v_DrHYKQjbN}P2J_H0Ca%3 zQ##LcY5_5o)xFa>BLR`ej-{Mh&s}PJ#EC6abC@)M5jsKoHcJ3X*Uc2foBjWVbwry* z^2TW{u-o`cfW(#7zQ%Iz$p^H;e8PIAE}nsIj!q?tf&^AMLkz!Q^^B*&3&zrXSjBbVb~amUhgx10ZjGKfY-tumJ~Opbu8}IE-(#k_*PS~| zQM$I@i^WSLG|VfrQi#j=*ce$=#cyYY;lat_TuJj(Z&VAKiv+)3#MylT7KxDe#&}c`;#ebvR{h0t zXneIN7iwOXE5;f4S8=*In@$NaZ4<;Gj($W$MawQ-^mOP~Clvw4?FqO- zDD_>maQF33o!NTJyDl~^SGQh~!5~1CzD+`8Zj=;j2-9ox-ClowKrsB7V20ku0cwk* zQK@3ddm;`Y}{NJR^Vt^%>VwcPL`iJ>Jl ztjfK7(G`f&@Qyr>klPAq({Q;;PS-J7i%0fl(yecJL zBdetA^tV2g_j0_gou0Kfl=Lt}1zyF;WL4C3aNjw|`-<0jTC+se zSBJXwAnF>&>GyDnqqWVy?mKte%Tv6ba;gT_$mG9^!?%fS!Y(LmxNxPgXYFG+mWI<` z{>r{vQfv}9?&z-Vla{v*y8h~J{?bx<&+TKePHRRzyB|fmCN3b|LPBY`#r}N7$Meds z7bj;{bbx+80T(A{EuRZNFOhfNgKTjh%nQM3Bd?HKTORuC2vgTl67P~wY!7g?D!o=x zw+iH9^>KICbW*>vx}aZKI^XXD@l6OBFA<|keY#uqnJd6uC8Z)1u!Kx}vQ2)fm?iFK zB~7Z&cT`CgdxWa(Sku~@db74_(`ADtP-&FEjzbw}aNlNmi8M5uQlt;ALL)NGnR{hy zmZiI4Z!K%Kls0wpMmFt}Ik_-7>f3u?)pN+dLw!%1V;lWHmvV`A7cbDJ^Pl_0`#%SV zhx`2}|IcGQ!vFIDv5ds(vL&(P6s#+KKI#q!*YDHVms4EfTkZ=rVa~*in!J==)%?4E z9(J91*r}U{g{XUzm&a{bPPghv{EC|&`d}wQu?uV0o~9!C#g2B$yi25*5uP%QASbVO zL;Y|2&-8!W|EF!@AGl}769s}Q99}9C zZbLw>^mTp50cT)dp*1Za{wtVaLRoc?y9MxGeB=KPPg(x!v&yt5L_fU4#gFRQApb{) zhsE<>hyBr$|Nl`Qp9D9FALRJAbC z)o=ln*{&CTaMsWKP0^mcu>)A=q!@OpnSj5(NF&>_t7TT3zhLteumQ;2QDWN+3$8em%@P#0k>zB{o z_$%*v77)+X&Vii1izKk~p;OcH4Q4cHS>5qMUck4J9w|nJH=8 zhUVoAvOO7I*45FC=(7!F`q*=3M~Q%PF`3E1?vZ0B77)4xoEr90 zt9LOMiZj9bUJ#nhb<#N4Dm0y~Dc2WMv5Dkw#Jhh~*-+|l#MjK3&)??SujZ?gqV1|x zwv*J(AZCwSS$Z-zTBg((txRwS%>8V}Q&r$nF`U{vSR7l6DGE~81LS#06jV&6)TH=w zM4}I{ioY%a?sPh>?UTbupoLhbZT4(SAzUPhBIRl!Fb_6pyeU!&%|0BYjL-j;`!mFUGIKtGxS{CZr7?4 zr{t=v-1Suqky0z29JI-Fzw1UCZAaaHo%U(C&0PLep-2`M`7Mgjwh229yt{*&7#IsU^7!@5bh^h#IxS zBH9g<2JsU@>;eZrp|vE$uYe`zjNo{l-!I@O77pDuy|~@ z6C7>#^fD!gqL}5;{~deDsDDU$7UiU~G178}K?-+ph1MW(hM}JDmQMKHkrK2m>^Pel z-S1OIIYl>7N-C}GNo6U!-yN-PNt!LDvYDa)#{hph$-mNCy5$`2i_kYO-MIEVL8ILc z*fGJcMe=nmvRP)x?#6jz_i{#(rMXQ&n02*1+t8!u3MIiDw?{l*B5pGY$;qUqJ+kXql4M59v_K@*E{qeAr|9w1o z%K!T)kGNy&M4r>Kk5b5!8UO|)v66jOUi@Qm%5_4nq6CIrnj&?8yOGPa;CSAc&R3+- z;uWusXm>SmlKAR7H$;>FNN^0=d!T&_*cHChrZm{H`@eyhtegK%GOarZfQ|8g!+vT0 zA3ojx`6!RPV=s!5Yw%MxMaoB}Zv0B5A2dX9w{q%xGp=3bpzQE89r@Zlu`5~ac6IxD zrdogs=N1cwFR)@5VVaU8C72s8x!+HO+ZD4HZ`CV1k6hj0N3{fxke(l_3UYvc2_o69jkm0B(~1{j&e>VDOax=TRQp{!{0b zw=@0p9tWR%I{%5_pPD1S;=4NETe)rGIk{qsneGV((mhU7E#Jj1Pg*$fyt0yoma9~y z)+obS!Whm`*qN$JCG}p=d7cHWEN0L3NuN7VwnT=G7rzacW?KiU%XM)~8H@wu_RJ15 zdy=mIs!yH#m#p*P`Cmqdhei8;ygz=5|9F%~$f?&~QmF3O7DqXfnM~ip*`QK9*@DFi z6_ELl-q}$U#ZxL)sK=*5)+8sU!vpFi*fD2uJ)iZmL4I;#Id&`0jpVBmp&o?XGp%Td zPFRSiX|Z2UvN!rYL|JMSvztBo=T|s>@-VVHAb($Wersn4wT!myRjenXbhUzj}Ah z%i?%0F6iCuwoYe&NDUx?s5_jg;s)^!tGnQ*2xOGwNdXkdD{SjoCJz#_*e0%xEAm|L zB8T96bz{dp@mdL7ncqr93OuKKx0&zc@o-(eSg*1@2klsfD~U#8T6TPaTjFQV367)?)?nI)o}gR)w)nF!QOv{;eP8xn7x+U)-BkTNx_`a)4W=85|ly+cdMYrZc@n->zW)z<~&71K$Q*?=Y(vMA`-1Z z069}=Ceb=Gi5W?v2oaHLWfOy#(iiL0<4CdYBUR;8+r$GSA0E3TZ5$xGBnE~0oVumTov%a?$jKsWdMQ|jBp5wZSMS;?zXEi@=4`N z1OMylc!4`?~+|Au2gtq_c?00vIV3r~)PQ(m`c=l;4!( zrQq9M9*9ujbA7(D3#_J&GnULzj0m53X+qhYAo@!LQb_4_LP9Fek0TVKunu;JQWS?M z4zM_xqQP`={14$xscV&>5Ysy~C?GUyYY7R4;q*?eDHz4}8aZz2=D$t=`LO=q;eLOA zRPz5GJjH)L$|J0sJ56uD-dmM&uv$i<0_Ch^6vX^SoKS_{)z-==BAzNc$r7`C#V2bP z6QD17ufx3dGNVjTg0GIQ31+B>mED{J%ESbAK|4QMp|NpV@>w1&0jKvZ5CuV+gvWU> z!5d7OOd#dHm!!{+OWNOF;eeTxDtRe&r;ItTS8B!rn1?xfKug0}4zg7#Kar_%f^nP( z+KP_(TlTi#!^DiITizkHYIC=OuF{F_kW{`ZQB%HdL`ciFjB@x@w6p*>CSwGrWh$1M zErPG1p;Z~Q^%jmx#t2TmRLpC7nbiB)rLMQgwv>iVShu>RW~9&S`x)7fPhGoB#{^dJ zw~Nt+0V;BP@k`aPJPhx9;cq(*O=p6)v09iqOmTnJrD2Fxcr*Dn5Xl0vfj+Y2@0>z8%XrkMbyr4Bl z3R}t}qPZGWakbwP@qTy2NpqgIrlldan|wx-!qaB0kdm+(X^I-?%|sMirXtr`vB`=q zxcWrYuEW8Lv!H3ErYJOKjNdZuCh0^a6O_!R;-^O&`Ua{=g4t+^d12mStesl`is(A( zsx-6=$9*>=nJ`Z`;g0jdQbkS8nUR#BBxS`xCXQ0iT$yX!{l-)@o#X@v0|E zL9{xrAAD%6<=e7+WR6o*c6gytv&BB>c>YraxIUl_Pv zpxCx&vD!MeB&)MoDr=v}+Fc89X?M+I=T^&`B4m-%Re^37!>Ak77Pq&YX%Mez03$IS zO0X)-81xS-aSM{=6vr|$M0$r|6jkuHR{J(L(=5$7E=b}4GMB}jLAS_fVOle1%e(>F zW#rm69-We9sKO(1ZKU(EI&O@FFptV;prUN>&c=XGP5n--#=Q5N?MBy#q-0e#A~k_6 zxOHZvxgpQeWR$FSJ!2^V+MaI0=obDI_kO(UaoUC@hN_(*FQ$OyXqH zi7AG6<%(eyCpbn=;r<#4st3=hGKB}>R~0HbIvS~)pB zyL|Wh;_|!GcdstbUw`;?dh)ugu1{ck9EKi+8)TFv%gWC}_Emlj*D+k;pz^zJ`V~pi zy0$C6>&7cS=dJq-)L3-R!8aI&6+M1=3joC&tBoLpyaN>-Z-|5oq6!N`@~ZAT{P41I zy)D`+^wnj8+7`WCH1m_-l}^Q#nOT~UG-MWMQ#!AdhyzQRi8eKl8b=66x;f*o*$ z;$r;;_jeko1<3Mrx%D=zwJE#m6y?Qu?T zjqOHhm}?9Ju}UZ@q0lah$a0?FdV|uQYgMLXE(aYuQoVL0O94vYK(TceR#0taz0r`UU84SG-Ik zboS|_?L`%|nF#l7r>mgMAC>TaJlg0oZ zt-O-fFmE~5?mcs5n_P6QYOlIeG|**nwcIasNqHP3 z?$yUyzJ6_WRC?j}(y!=!+NmhQvfJqr}^)jRw1nZPDp#KDh;{{|2A~j^Dg#0YDHH7iF89goP(e zBX7RiKAnd56LYqOaVVSYfOc<+;~rhK_3ut#{zSnd0pA=u{*)jg1O<$bxGh_|-EaQm z=B9k_2Mk00d6nwRxxU8{GJGd4t4)}^55!YN9qhtX6mJ7@uWqnNu4B;o01n1SlY{XQ z=&jPYr(5_B5GXZ)n)`j`M&tLuF4UwiEKfhgdP7obszQmT=W1F_=%>(XH}zx^l8|pqw^~ zm)Sb4`l#M=uHzD)X*P8~suwwcQV9?CPsVN4v(f%jXTTA;{W+j|`)@Ef7#H$C4g34U zr~H49^4!QXX&2nCgE$6exb=~<5a76Yve`PAR&B>|a3>m?wBjtmu=)NNF@1Bpq*y_G z$+IK5HO{gqI!huPtR0(1eCwv>W3Jd8!$2u_kEU0WN&7LWFxpJhT=MbO9LeKcO?Y!t zV_i51S(sOV`{Bd;k7sohz6HqpfaVjt#VrPcVE8_c z)*q6DakHJSDML#~DwnG8C=2bw+SU(?Met3QS>hk@&H~)S4;r;u(Xx7fB~cc*Fh{^2VHuh=az?>yG3XotL3>J2kj#!OHI$8*J77X z5jE%q$koeVpUBYD1+Dk2DPYYl>oRY9U9T?vD5B)_qAW?bZ2OZQ%Vrqxl9S>+XN%dF%awdz-PEK(TXBQw8Xi#2# zs8m($Gnq?~rYOL(wP>&>LCg{Yd`iN154HIr{zmai^LlwZS$%Z3D}Z7^i-|hGyvq5< z;hwyXmuYNf1ztYwRB)-=%0}*ViR%?;6}jj*`px>=&>!J6F2c6-Ae2(x=bjK1nAufX zx%`VSVbhco=jTvtM{*8K=^me#*=nU~9ae`lNv6n;wTWx(ecJ*ud5qjEydW8RcYF@c zPmbTb20F)42t<5-JWFIJdCBq~4A(N;ikR4CR@K_O z;Q#*LjUe@X0QBX-VAv3%+H3s+dYsn1j1ti$Im8`3#06MU5?pauZm9~8w+H9dj~!+qMqPm%9D8|8nRgm=vVxMBaVKkN^R_kRrr{U`bV7?0fl zYh5fvdNe6nv5>;m`+wb5qYc0`3GMuUj?>QU(#b3Mg*8=tSG#RdK3i2zQC(x$`|??L zD;$iTla->m=DRml2f^HC2u=jR2vVvqUn#w8zO6!o1q!nW5e>_E(Hst!X7A+HT)c$! zb2}J%VXgnJt!gR4AMH zZdU&=Ru@Zl6M5mT=ZoM-ZgUaeSBfCv3SJ>0-+DK7%WVm2s2_LV1oUGp%33cb;BSAw z$ENJ=b9+nv+P)F%PZ?BouFoRJ>YC8pe^UJ1VBd01V1UjL!9rFfaVRQTC4MLssNjDt zeofefS$x*5)Jp-g6{4pOhGjQ5tzDgA8M8_#d`9Y2=BM;jt_{4?UacE)QrHXb=jE@? zsZ7Uhs82Xwsq4G1(3;jX^DD?={0sOM(1b8?SL<$Jrznq+(HC-8Lv!8K)%}= zL|$&lIE`qn1>NbE)BO8>ISB>5&1PNAX4L5cz48;NkR_O+BfoeWcA*toR z{{Vimf0w6$|BtXc-T|^{|L1U2y8r*6|8)Q7qda2&=S<`uF%Ca{&z<_ zC*b1btQ4)1f8~gm5h|z8sRrsO&w?7Q`g_y--z@({9LSv%z^3#6!buFGWR8PoQeTA$ne+B3!AnTi`d)msS}qFv(jr2A=&I`C(!(N5opr07 zH>XlF*)7@%$f~DS?QUVEH_A(z2vVA(D~sj0?Z{vx^;Pa3HR@4YUyD`1V|Uj(iJuGV zUaV7jud$Fi=2||b97K_KN*(gQo%98AU~Tay3zf8Mp*g!X{kh$?jQTz(RaE;-f|;D- za;iz0Xsvh!u>3|-6!@YZ(t~gJwK?OU~182tVyL&04j!)+SPjp7`rSPg9o49Qsdvc9{{jOro$3yV_z;z?`l~vgTHl%g^@&nwC%V zsxV8Bn<4ILM>PNWH1dC^{%1x`b<_fP=zjy>9aZZ;xg+nB{`WCHV4}W}4%#gq0P8)U z)&TXYxxfE)K&HoC7Uxa?Xi4KJ%7&bNSy-vZunD23!>U7p{9;xfe4gJC4<-C$N9N7o z4L#|K%^FInhawBX@SMu_1%xf2of@<<`k?2O%5Oi9i3y_D?;T2CK&8q`rNT;)@*=CJ zmrydWF4a{rtFAaZjxh`vIx|)_(BIlZkpyH(iWlH+mJO@F?tp4zu2sSQ>+Z|q_-;oxkXj{Y;kp)T(V%>RmpC`kpkYR+N+K2hv1dIRbp2r;9qK*MH$t%lyMp_ zfYF!P-0>IaEPBKnhSH48NrrHY%FXFKPo!al=eK`V(fo2-m;I{8q+dnid%h&uBV`0h zGLU z){7Iw)pMnqbKofuswkqizN-T~PcrFM+=kH3H=2~vB6U^2%-mA!>}WR>#G1-UFlmCNJrV zR!{XBJINb2^#fmZ+tUiU4Ia&5eI%2tzF*{M=Bd%WLt7J>)Z8mwar2jC_Ae6foTcSO zN%B=}G=Q@_BGda!Rt$EUSn7HimpU&1SbJ7AEsS6Of@&t&R-*F*K>1y+&w~9MkQ=?k za%kjR^6yu>-YsjM^>w3U%Xdkbzi0e(TCYg93!oU~+zfy(r^a$@h^86aRpYH2vvN0p z{wjM*wT@ntugQ&EwLU76G=IF6I^F6vuV#;sKxfN9?WRPYBa|474sA0VOKs#v9xOD) zA~lt3$T!HVgd>a|a705?L*Y4`UN>kK`+4r3+==%dpGN)P4DCPud4)5I!`Ws0FNlh3 zZwc(s|3@RQs{ebFPxaqF&Zi;&Ti0!12n!89Ojanxj6Eh<2wo@>vvnq{1+I4nLpaD1 z#?U$qVG)s#a;Ei42ph5552Z8`wbUG{)|z>)yb#Pph_hT1d+7i5p;u%O05k6?5Iv;N zNsX{_4c;^-`uzi((l>&TBtAtC-oZVM!&4-a5D!*_;}CN!_@ul=);QX%sDS#G*@jFc zDYR7oK}JF*sS0OlMjmLgmT^)^a=%Vd@4@S#oKnx*_DoLynY)Csx% zF-sC&{#lZv6;A_$;^16C`Vu`y(#A5HIpX~sg}z=IJ#>iPq1kvClEApkspx+nV50Fh zh}BL(jx-*?C0a<6VM_5W)|GFi|^Azj|9 zmbWf2$1}_b((_-Va-BtS!dN>j|8K^kRT7dfRY{4Dj&&Mg8mCFd1tY7V4!jI7wKKG> zaBVQ#gZo!F3o4M{C-zGuQ#@ge8`i+njFRZ9zuJhoY(PRj_y`Cn;7ur~M;{OgsUm-$ z;$PO};Mc}$&J?74KCg0y^xR+(5@ODxc7wTAOd zyDwwPI~@b<%KsRQYw;h0$*25}kMe1-|FnIVCLz;zhwJQqlrN19TH*(SFbYY8HzY)2 z9QQQyYSjW-TX_Y9o^fVWRBXxNH=G<5Py3?xq9jF_ZffluKB+|T`&E*i5AliJ1l|gS_Do;0Hd-&4~6UU&eqgSm7SZadGw^|EOE!}F>>FL(fzRtC$ z>CNV16KmoFc4>38eVA^W-EDt37TTIFiy!WTZuS2}kKD)o>|y_9B&6MqzdiE*J-2%Q zt2cB%#eaX4&mYVFgQfO9rXK)kwE86I-^<{G-rwKmE5Ph9`@-2J7%it?=Jio}Zm%*J z@NdpgpUgM}u-go{a)TX4RvlUwv#O!XZRXMrdk3JIa$5c{_9xSlh&G0KhhWYp?CCUq zwH2O5+20Cm5A_<}S716S)p9V~DZvKXt>N#h`o2#eHicKLq$lslrslTj?30r9pZ00g z|JIyF?D%I@v68-L`KMj_-*`Nz)&CoQs{izHK9K+aKv$a;EE>7Wal6G~BsiEF|$3a|D3AjM6>X^ic2X@4xRA^^u-K zjlAAhXV*RP?>~F0LXu63wDi!2D>TTQWElxB))|c#H}Vz?8ZRyvagzW1;w=f*kVbxh zP+ukJkvJgwWOjvluzc}0&4?_sZ=TrdYcrivnP%}xQlUyG*(th=jh`i%r?u)WsxqQ{ zT!xh2ci(t%XD!?0kCZElTW0S)CN7^dvDtg5CwI#SnZaK9Zcg$G(ur%(r z-ts(8d5?KAP{!vZOblY za%L@YSK98*sx-W66b}u1-g8kcV>!=uUZs3v4BBC}X|8hPG zW?L2mTiEj#irbey7b5Vn=%as2^u-o#0 z=nJA+%CV>0jU}n}`|QR-?0vl5*j~W)n|IyQ?YY_|;d^bk_up;}o2}zk+k2x`x~y-q zmRoF}4Yp-VJ=t#hII4#1=?OFqLl!=rqG4?5U3$jHw*R)-{}7w`p0@vId({6MdzJWa zZ#)_gKH2{to*{JdpR1m+Zk zN2MnKwAFGDgIA0iS~CG%{K%9H-7=86iMpwD$DkCgb28z{1(jv#jH=vfQi{_f`7Q~~ zDoxPDyeUVq*(GNGAe$Ui@ov4>a;LSHhQ-@3g$0}~Q)o2$kTa;3|AoB290LE*HCa%` zvyD1FL?D>a^N^$&2{0$&DOxjv%9A87g)r~Ir7`0Khlg9%L0UAgY^z*`T6dOrWPdg| zEcTslB){*o2}@W#;Rq6;9bmX}T)9$kaaPT?3{!1vpM0=P<$m`7HQ@7m3;!MRUuo$d zTK>Buzk2_}cr^MH|M5{iE#&_{aw7sUj^j`m-ExUom%ds-y18+0gEfGnk#i`!iYLHB zlNg00jgpNlw5=tbX--0*3VR63Eq38qvPZY0n!|i)!~FN2+5JA-_CMoE203l-$pCig z|NgM1|4+uB>VJQfPka5}l;1aUg&??|zDXAAB?K3$6av_&oYiawn1$#HV*qWHvz5N` zi&Flg9srW^wlK32p!qOYCzCZ#*XCt2c~n%beeQ60PJThXey`l5Tr5<>{Sx*5r}sa- zUW11Lpxm6Fy?oLC=hrtCXsA+bPeUt0I_TTJdZ7>F0L3bi(&Nf89*5Q58$sI$E;%ps zW&5%lWR8mNT3-NEhgR)z_Ztm;=4Q&<^Cix>O1k}!qgC%)QD3{suBlb?Kb_0kNcGE|55h78sts+Gonnh~{B`EI%pDKAc8jDW1^2*#Ykr*B3o{dq+3@ABCu z|9KicsGDEkO9R-Y|Bu~CHU7uzPvY2ZkD^;u884Hu#Ie5+Rf}A#K z1I2=p#&Dq!z|YO90Q|JKv0d+?!Vm>{rOPiRF_n`To<{nKK5{{gHD=4NJa_c@j;zIS z*!=b%D1dU?{(r<-Oyk9SdjNLqf6w)Y)&1}JlTZ8qV|-fd{~zRXKzNp{xpG}+Nfdz# z8!xtP{Cp*;_P2Pk#r=PsBz)T*Z-izl>2O3`^#H#^8Cj6GU(+~5y?*vT{}cZ2zr15h zJQ$5nW%=wM&aPiwzWU}AT^CfLkZ|dxe*WvP$aFocIxw=}%i$49LA4QmE7nM59e+0LNw}7Gagz9fW=XsvF?SCBH;v~BT5_JU)8peX z379jZJjN^P1j*_+zbls=FO$bUPmb5XvpJ5#zUrkfdg&W2P3QX`gDHLbe6)|^|IU&` zD++-gPv6IG|8Ld*GZ=q5|NS_hXXpxZPO=!ht8xXP$0do;Y)zw3aHSLn_i%!7@C-qw zpt|{+A+{t@goJG;V}5A7I6@hTFsBa$ipm?m<2XEchGL@b@OqwRWKQ3bP!_iOUxyBY zo5GS9-V`XIlw>HPF>wx@i<_Tsc#@HWXXqT3EP8W(gF>3I17|_`G5jmhKX7LM&W_<< z{lju`EdJ47*+YC>0Gi?8ew~8sV+UV2>@hv~!kOXwgD)Ju5`QNdT^xMz{~tUZx~_|zEs*)f9iP7p!fH`9pk?r zJbU&G{b>IF({rthEGS>DXP|}fY)v5PmmT9YWe{?QGjeRa=sAvK!Z}3G2kv0dcm2LQ zIXn;@3CzT9J@`VU6{Ap|7R&tP2*pXHu z(Cc-j*DcfQne>h|yocQYX<;C&q%L_1Dfkm@T97vY=jd=FW<%J~Q zpSC04pW4ZHE#$l1$akyL?QSK1wqB)hewPZ_p=P}gahi-ERemQQCbq;G2@y@zF!(Kp z!M6>AYZ(T&+c2Cs-o)|Ead6Ay;OFB&--==Q>iWgmKQ3Q=gCuW8-z5(Ov1CPrMbLl1 z8AHjMGa3?<%*AhrsoVQuAiVvs%m>1An+HPT-7pgJLFb_u6hk2)Z5xX@eT#1YiDpFT zBah0Ul2&0T3?>N(7EMN0VxTBzD9__XSh=GuW7Whf z<%7;+mx|Aj09XP3dtVe zexoYu0J_J+c65)2Tj*}$5b{Asy2rJ-c1^m6HC`Dd!F?mKVlM<45eq>)mb{e4l;@Ve z8jt;^s2C5=Iv!)&Iv96e2jj{*7?;<+%A|AfNCGU-9OWPw<}<>dSJ$sgM$ zf82TUN6xT9Y-#ennw}7b2(Nh((fD3aouq>M3o|ZWWP~wE^I$)|lhZsHSZN+P!)BUC z&VB>iM6+L_dE^WYn!RBs=5{h|#n46jEi_w%->9?j8&!ng$Pj*mzUOwMdD2S%745gs zY!PCk&O&TdVQiz45Occ;v6FEtrB}4yLbHW=jXE>0QH6PpO3bU9o#UO1TWPqW{o&!h zutzQT&1l=cvGB)HXZ|>JMwRh2`D0;7v>VT1%QZBFHB@KBF-TX6BShnb)A>f(FLGep z37(UYUGNN@QS-nKo&9F7X<*BOXXuQ~f%Ur$tlyF$`F4ghvchYqnC+M52*N8HN8KVnfq``=IEw`FyXV*iUh#GblQNxOe z8X6+XGj#7(yI^wCZWl~Ww(SCoh#GblQNxOe8X6+X>kq1SxU#d*iZYJx;l_B#Siw;Q z2FE&GWH=c#l zJF{fJ!jgT1C3}Y9({3@gG=3*rj9=fzlKsvs*{`rOU?O8I=JZfj)PDXYE*SE1@ zzcU;5D{R;=v0-o8jpkuXnuptHwlG@1Go$q@jMgtP+O9MY+6kA*z|i9)cLOyJ&5828 zGr~EI7p%Axd!A(aSF}#i>zl7oNFHcF?2N&}vHi{*+plnJzr?YGkR-O9Yh1Jk3yQo2$C`PClaPO+BLM5R zT!5}!yBXLv-JtWP8&o#kpuFj7V<l8tai$2a4`SHIZy5+)g?F(mM+bo05 zn`KbhEQ9i98B`cRm;~z;iMdR1NivQjp~cMUVuj_A6x?}6IZAQH2!wo!H747@fQ-F% z?zXXKcef2}J895)Cwa92ahnIk*h#my|9ymRZZ9rh!4Os$IbY}?znMn%B!yEzTU!Q;n^Tav0B-G$?J@jIgZ7Md**q;u@X)EP`FG%E=r#7BQHZ4#VXKnfKB zAEAuI$%7aNfX?YGB1ftij7}z(BQa>n*alX{CeUsi3GtxwNR(u$fMkwDHv?qswG?2U zRe%WuZ8Ucj+EZsRs?a<(Y3{ho-Inw0PWC>@8MQnC9obJn1@X4=?5Ge-ox!j&o+EQS zyD0>tmP*jbt^^4LZ8UdO2&T@!uh2X+Xzu9s7>(Plq0x97uV_{P#DmT>4=ObKCe0@e z4j3J^5zgd|AcA?y+an~s?G9B&W9y-cK+Z;QM{Qv047>`xgGPGyo#VQGB!?omyGAX; zcSiQ`9f7=UJUVI$Q)l2-#=|qmqnoBM@>|mEZ=<gJ5w!zhn7)>xe&lXp)1FPG^E#_^UPYzzOqI^9 zvT2@eRN^8=j6hX8f%(;58^kkAV=F;6ea-8vuXz=H%^NooWS=}SYr~Uv zn{IfrZPVG5s692`CL$|JlxHeY_VA(#k&||A>*2)ewiX!Ki0q^_mjAoSU+zd(Y!51haJfn*R$#ejIChNOcr(oR9 z#vhKyro~eM)-rHw2!UHxVD0qE;n3d#tfc`z989(WYl+#QgqfPF690x(7?PAh>Z4e8 zi)E0>)3W5zv95WWdgygh5A)4kF%djdMQqqZPq?z4WK?Vl;>-BZI&}_1ptTk9fmWge4Z5G+q&v%%)O!k~s=U z#`{c_iB4iYC~_#;9Xb!~IUZBXN!YaOLDh7~Dyg#8Dq04O1gZ&9482-#4=o5JSjHjA zNND8WN$T5a+Wt02tX1jgN`1v6<(br5oio+xZ5Qp}+mk1!mZPd^*ORJ~>h!ve1nP6D z%T*c?h&8vkrmKryg)QYjARcqFs@~=P|!SiCtWA6lInX>p1gVjV2*vTW;|IH=ZLaMwGb1E z66UDsYsr`ow@`t6+bTgmyIY@a?IiVn-xj7OKjSl{6kEpZ%1YC@GrfiY;AHRjv1 z#%vkDofCk^<>;V^WdY>u$+XAo2hio%HK{uwv$S$D`xgl~Q^V47XWIiU#uj~Q+*O|% zm-VS}S)Zyd4H_%0Db13Zu<0Vaff3+zMUu5Vkbfljo@9t^7$+-B{O;JI42`=gL*ueC zG%hJa_T!<7^cl63J|nC28C$fcaaZkWT-Kh(CGE+xX6RK29JW(u{h?Kz9b2@gaaZlB zlAu2>X;0ps-U`2EYMgIRjkD$4cTTylWZaKST-dW0USNdlvs-z5^N>XA6$v6tS9x_& zS=Qwt_*}7^mihR;Js;nej^8;Oe^fTY$0bf|jDx{$wY{Q`w<5f;nJpuWNj>UnQjf|e z^{8Z0H>A;n*B7l*1U0~&4PMD`JHMqV>4Pb0TjwoJbYGh2Ii|cO;+n^@`TS_qHAZ(- z7Q!QEY>s7PjI=zKKTA_dcgs`&-<}FEvWU`AS5aCiGBGNNQhQixWn$fytHj;1N(R$* z+;A|h`EF%ogsd$O&J)>IW}~W{J{m7HrZSjVH5FS)ip~`& zDg`MQ zLGN4|bEwm-{3hh;&AFU@@on?%Re4~{fsp0=X&VfySC9ugi1Dm|QyQjZ! zFmC4%9gM9GQQsEsB2P>r_dIYKv<%H0*h4dYTa1(6ImXGa#5nn8jFU;E z4pA%285D;JhoeXjcDGPA!k8tgbdee)3wh z*et&io8_CaS=)xXvZef%>&f4?o|?5>|9xY#+zO#XlTf#^t>hKB(sL`MW$7v_(AH&O zp`rbP^e{pRlNibCs9=OzrrQqe>9&43sH-$W9hGR`@dlOA@r}`Gi21*gCB^$Mf{3P! zpcH2u4UP~FaSCS>P}Wh{?&3?JOE<$29&FaSUnu$@mnGk6CwSsz6N%>YIN@%Nc)>JtszJy~Gh8FaJ#PTS~Yk7>~*^g0t zTNIVwF^WpOIjszjYYxw(GS~mlnsJn7$pZ}uQuoV9;)CTX3DF!=d7OsVJV{BmqKtv` zhmjbyvuM1L)uQn&0bG99050FDD6ms=80!9NVc9+4Oz;%7ETl!lGlEwUjR^{8Xq`n2 z;e|D%+qXnS`CTKTD#7@^5fP=RXhy@PMRryqD>~$)aWL~Or(FhyG+SqpO7YO?o?gqu zSI?gK>RUXaepgRurJR=UmB)Ql&f`HauLLUFUYT>)eW6 z=NfjMJCy;x7F3$|i`&_#aVtiRYZx^l}~ z{m^LEgF4q{s+4AO3q44nVY4P|^^rQ3N6Odfu#AhpA1*dN(w&Wz(HQK9Mzf^pTw177 zS;#FU&2}_wtn7VKu)OLjad+b~5hypUR{5X{Hj|3nlaLHlir^ld$cFC;f~ftfvw{)M zAh}cKXeW;`q;49q`_pMF`)oS3m}e84*qwA1yOWC8om9oH{j!jfi8gI_{yeoEKTmAp ze9~E*Pb%VkQWfW(B|YPjW@NF(SqS%l!QEgB!qxphjUgklD;xHmwlBQtR!MOgbwyld@7XsVX%! zip2X7;RNn`hSbJ&yk;cKsRRFgzT-#?msOQo%#%!vhmFD}Wogn?S(=m;lu1QTs*$H? zN+L^axq0K7Btx}3WN}INzB8%lI}MX24=NtgxEi@*!?#H>nsil+ zCS}EFQc;X7 zJc*Zs*)ASqD#J0Lx64(UB@Ync1b-0}#&TlC7I~1@_Cv@p+r%8drE2zCMf*){!G05q zsy*qdYKs>uibF|ns0X+JmxChk(t*8P&y4FV#6W-Z?fErY(JWI_J8G3YGaa2&PfHbR z4cBQz1F>{8Ckj*yA*A9}G&HmT1k2MN;-*KU8KcLrSg@^&?W0ksGgjuVXh#@ZO!IzD5s zlK47FU@i(CR1J6KIQsg$7g0&Z z1?_qI@cjwvW8PmTDqKPilOViZL651e%CW+-newh77V=fMM7m$LXIyK|PDLXpj2EFx zR7U(x+f^Q!+6s>-1g%tepYUmwXv>6`D+H`ll}U~xa4(eNxzsf&Py+@Be2t@MBNmCg z8Eo1v;cp80e!ut4`TrRoInT$}FU~H$d*Q6Y57CF~y6$*5g#TUFt^V(g27}MM;lT3- zqmkzhK6AZ+>kdCd?uS68`dKrMv(Mc3?yE}NpXBolU8*DoA*v1zzFx;NN-v_b3}+kA zGj6jrIal#*yBge3NPn+LgmE+@{E?7YYDE$}_>zR;q(m~$HV6kxN*)A?iv&jk zM|rLM#r1zXg0rD(dEJv>W$fVKAL|*(V!{bKMR$My(t~T6`|ceyy)bzD!NEIpP11x> zo@5*J4nZj0JM@NRLRUxc4&L>R&%4rp;xB-BnJ23O9WYD>2e)D{C_@;1OQIEesfI=7 zZXWz_cKzz|)iZqHu6d~ty; zF0Wsl-@g2B=>l{$HKlsAyray`6(^lSlGEvLp0J zRBo$mi=#;Ke})*xafq`}_9}aF&}A&yetr*^fIwGZEtywym2UQj3>?83*-a!I@Z$nYeO`(-#LMGXV+V}xFCPnX* zBUJ$T^*4Y3cbIMvjyH|AC__tsrDAZq^Tkb3^B2oa3tRECoywGQ@Dl? z;7doxIwK)k$05n&0s@4JPMshLCEw1f{hQ9r5*AwZ$ng-P0VS^mu)cyOkphQD5D>=D zoJK^fWWEQ2UniM#GSYaS9OYt{qaVfU43j_!TOs3;fH{UC4bm%FXMJGYN`xt!O<~?w z19tq(K=`nER2;b2?;VOLg9Y?suiwXOzU&?K;v^=$pY)0}22%6}dxXXW;cNlhlR0A1 zG8&TNrp$hS%}CY{F~|LoW-wSqGAu_?BCCzbtti2l23Z4=K0#(7LAnM*^bXCEL`>%0 z97l`@%wH(4;X01%Q&=o*8mo){LTeWfP5TT|_cw^d4>U_+;8G7bqoPly?guQogFR;j z|58psJ`XVPLj5QJs;h}fC_z2aC=%;T8q+*cPQiSdl=sabQ!8DXrOLrqy1MbE^u5C6 zMUlP-QM24;0v43p_V@Rx`3f%M>KLP{|ZBIyFVMfNo26*y8pTy$LunO8iKP*X%W(i*!6NlxUvPUq^ znL;FX9-f#)c=m%2#dOsO0j7ZiGT__L3L!Yv0LZ zlHJpIaY3{4ARqTk;VNLNmI#;|L@%g4nWQ8pp~@pN85#%8>T-_agv*>Nxhim)%9pi< zqxSPES;suZOTA0MfHF9Nj2-w+v@)rQ31`bBscp&*LN5nZNIae;Yq7B5XLZePUU-G_ zC2ZfTB-~RPHsIZgr{@^%V(13+ZtOhosmjYu$WO${^S)a0@%+6#xpXvwS66aWnw6DCU~Sf%0e}0NGoW`{b9qnI zHD^M8qBWQI)pE_{@3mZW4lIf)-eRq#m@k=JAPY#p6x~Q>X909i8$_Z2_4@jy0Q3@C z6t6y{@!m_mVwmI${>{~^T$cQy6#qOdu>X+8hZV9NiQv~XBIOm?Q#+t{Dx~RAPaiq= zPJ71>X?(2T?G=xNG2A=t30PnI}lP_J~bsq{-nNY6-;84=OY>3mLO$~O(W;DXF)EUYu#BuHWg z*OhUUt-+b|Sc;a_C7WzrTm=v(T}RPX649Vy8(+>}CHzX7 zdbKe>lU>LiAt0bsfv7;w%u_D|`eGSmVuZ|77I*+0ASB~pI3Ktk9?hl`cQ~5(gP|Yb6EgG0;p`*`XOmz% zHqg7ks7c5C{()qf5MyAxi5A+<)COF!D*(uvCoI5`q$Ho%zv(6Xcfsny5MlIflF@&Q zcOzj!p)>WOf>W5OTNjDx2C^@d3b1aA#WZi5S4_2=7OTbpzDLJRoz>US&~b|;GzmsH zoOrJ9jz+<3GW2KO+#e4o^I$fZ4MyH19FzHYG8tgc3#Y-z9}a!&j>f@&;1ky!?17bD zN7@qEx|CF-=j?FDf-2(tEKA^AYoSG5e8b}c3ayZ#j#zevvtPGVx~!C}vrVD%8b=2A zWRoA?D`E7x1o64T$tmNi)F-Ei9B(?lI5VCK`!O`Uo4Ue(BiImg+yJk53mQOJZOkj@ z7An9rv|zl`He{#>ZD;!+t1fD&qx(`m*g-kZk|-kCj-eD{8ktR$wp)}iJ=PVO7~#hu zCaWZ7gm3AkQA-0e)+h`5{yo|~d@2%Hjf!qxecw8~0@dP@j4r6jxAz%`_vt8%!D(O86}adXARk=g68;UO@5t6@ zDVw86wy(fUAU@?aggQDY&N!8_#Ne+njr2emM51f+Rb;%ntp~Qw7Q_a<7|jas6@H7< zo7;e|WBh<=1Z$~F7p3>h9SJRxlf}jcx4d-GI$dNqBq)FF>m)-LdEe|v=-xEc#)!~- zul4m{&y{pI1lL*#OX+R6QIl{(8UcMDUyz7!Qh&Vw?Vt--q5=e>ix_OxC1tfe*Pzzt zRP-#wTXlP*$a1kmlB~3`VJ2%Xj7n`We)IZLZ0m9qgg{5eyOx>5k3W^iHYB=PxEP3wnIxk!#KLZsIuDaW zt!A=!`lEc8QsD&VnUj`Ml`kLUi%!MxXz(qg;8_;c>Du ztLz4?@CIdsCD8*xF^iJqex2&`h$NN?DTe!m5x!2<>J4Mopz*4`dZ8mic!GN8(VB6R zeN8jQdx*}#pYtj|{6L@&z&0v1{ekl3x3Xo^TSBNwOr%&-hWtw!-!r?iajX;#nbIwb ziYa%7-H}|}2i3}~Rd4mxIS-8&$I1cG$Ei$N5>wq*4UeBmf4{JU`I6|L4;76~?x^oD zjhpdy&}~gUyMe?r%_~mP*&(|9=P7!9dyc+3L|11wH$PmQqR)T*6*<@HVgQK8{Oz~T z(RtATJ|uqlI!jjS8$ynw=K_AOiFf_*HjNtS&`%*?NWI_O<}D{#jHAn#lWdLyQnxQ( zGom7*sLB||oI_|1956s6h1~a4195Z|r`X$%I3uSBLZN1xRF)#YKVkVI(0F9{tjW9u zQ&c>l1>@1GXmN-lnC5Jw4HO4m<VclA%6Y;WQO!U0#XS8DZ*G@f>*U`|n*GhJDq2pC{m&B0T5=2K`6Mm+)sF zOT3Q{b4oSSY8dAqigXXNWl@e|ldNT3?VQ{41l?KKMV+qN9_y-pE-Fe zI1%N=YdUmDz@po{8wzH#>w<1`Sd`v0+vG1+oe!lqv|j+e-RS%KO6n6l0?kQ!d-7IT zj(}LC1hWlFX>hO2^Espi>+@e>t{)+~N|TJ^m|J$Hj>y>QOAxQB#$=~Ep=j9Eo3O$( z{#?UxOjI55XovNiA2l^wrjKw4B$S7lm_La951Tq!^F#>brlo(j=1C-;83QA^vyMN3 zi?5Q5AIYd7@Xfz}JsguRtVAwg{^{6pD46 za3qAG&bs;gm&kLxVc*@SBOO;}lQ>#)kSkwrZD^gBVNl$VGI_4tqE|?q-Md$4y?3wb zOHtx`i?U_5mGNvkfIjaeXHqIxikXHLBuP!{I9Ppg4Gdbf-Iq77n%Rt2Vl~u1F_Wp0 zyi1cUohL|LXgwD??2Z|&btIENHVty-JE7UZ+fqfA?X*CUhtM>Zx3ID!u{Fhiga?k} z96IO{lB6IulCRbnb zA^1v2Xc;~GO5emUb#uYHR2dtci>LWosq3wdAG6Ia)v2YYrYwvp-#b5~(s)N=NU60w zBjk2Tst`cEQxUG5WGfoW1)5|b$#&Y8VoZIQELM@uMer#NOQa`sLBPdVau9S->DEK%B4X8kd-tyN>K47xjtPUxueh@`Ys74ffo+_ISIX! za29&rWHOtKNiZAF1Aj91JbxApz0ei66$!N3-A#Fk``#vAa9Y$Qac@rn9 z0dVNe^pA^hFPD0bzuWsH~Nl4UX{#4da(jiGt9*Y!1q=dvox_ML-)z(eEM{t`7 zrdv#j4(AFYT6i+5+r89Hi`}l?>r3GK^azl3c-7f#PzwHpx26Z`4r<$JzgCx1HtN#|2h>RWnqdw)92+?9e(E z+v9D7byJSHxq5S+H){sjfsvcD2`Zrtw8~>Uk1$;|SvZ$-@F+jxSd|5V3TZLYFCw^m z{-`j3l=nV=F32l+BMh2To^x2x17lx6mExnLmMt65q3UJI{CRu|oRZXD@i6tu{ zFQ_9CBN7$Icg0GJr*Ojp7p`^M?8H(w^v6feF%;aS*3h)L9-*}YdI>y8;^=Q zmqOml{h7%Io#7EN)A+AnyognZGVN+y4`6= z(PA9cn9D3J&GvR<@S&M2ESkQWM} z>QA(Xf$gF&Yc0917(nZl5?rE#0Q10)8FLY^>wlXbM!L4Qsq72Vbz5?Z# zR{2bkr+tH77-W!KvzxM9Qrgz%Yg$8;@y;K(WSZ(@Hxczvw z>E};>`>CRst8OLS?KWQpmHz;n+evQ4j8Zy51a zI%nwl_1Sm*83rB+2TL2q$?DMbo59>E=cop`#2ksY)KPU3Huzl?o{avR=rqixBMkxI z?uP!GNF2WcT%;My?$DfIxNBq~rT}VqsL~gkWDRE-Ob7KKa4SPP7yv?wDm9{Y{5V>qXN-#f|p2{VJ!Bs|+$iK3w_gszrYe!pXl2?N;6{mVbp-fCaj z!2oe%ucCGLYj4iJ5sG&2bTmFW(%;UZy0r|F>Yet!hkMq(qiltFuxXKC0IF4*p0YTOL&D@|m^jp1GKea7@Zi^UEB|XZS z%yM7>u2Jj;;4!|)2>Yd0vs81vtD?o$K-vP*M~tN{I^7y*XHdB%)~*7qTezLkRdc9a zwU-vrcEzi^yKU;KUcbp3Is?be3ph=}@!0bRzI!q`2~YeHIXO8AXX9DuPRY=l487rr z=Xqg>XBbc2@n|?3dXuR;p3X*OHu833l}FiSG=ZJHEtTe6o?hv;D9D2-io{GVWHKbW ztD=@FTvJ7e%d838ve@GojAM2W(pm0&2>HwfyYYKOA4p6X>kEsJ!e3CIdY$$q4*J{- zzBszM4YQZ}IkazDt7SNjKHYCHWr4j=Y2r(-B2_V8lr2GZQ8TvDcZzDLSI~J=cROo_ z%NYI=5lwKaId8q=p40;{`u6trO1-Hgj&v0jSOenuvH0gEPsBeolDG6bO}(=9(2AuX=U5(r`ICqE3c2k`Ud=xjBXU6nE-QE(v{^L?P3#bUwaf*A=Ku zbX0>&dbj6SV*FShS^~od&7gdGoN(p6%}?rUbCWM%+X!8g5Yv4YXAbFUS7#2kwmgdt z_gbF?rS?JixGS{i_KBBhdCZ<{jaI=nlJY@Tsba3SA-YkIcdSqaIo@`B)fi@8Fz(#azM;L}j(RE@-)QNT+l}1sXz#a@=S26ZL-`px zmPI$2C3{$+nwyF?1GHWnDHi~RnVFZc(nra)Vb1H1@dTwwx{f5jQSI|O2TDkS43s@O z=qpuzO!`yeDhfYVB-4gi5Q50p_=(FVtxSrTq!=Xw^6 zV|`VdeoiALLv=mJ%B)_!zPwP5v)A99-Tb3>Iw;M|l}ht}%}9nWFVJ)G!XYB@L;nG1 zNEdL4Hla+T2s8j%Hg!2%q?GFQH|qn=q~QY@c(vC5-fs^1Uu*Yr8?b&~L} zbEmhycLV%`uM+Sh%HP`f0vnRnb?K44%0uNP=61N8^LFo797-2aF%kW+#i2@_?9zV6-WCry(P~>zPx%E9*KX))=oA}irNj-Lb%~L zxUXp`G*xPu(T~yo2wg$W$;BE+>IYRJCjX_5%hT3{DS>|CbTR9k$qRw@+7~xw{T>?6 zlWZkLUTtScpk24clJj)iwgBi|7q2W;v;}0GgyhOn&!`j-qua@lEX^xkCOG^GM>q~h z1_I%gZl|X}CEdSo9mKp`selI=@q&oMt+d(dG~McfiDhZ-tuR^^)d9FWD(YAZ>L?^^ z1$E>~v{uuxlaTNv0OSqkA&hfb`%6I8Z5(~eyr}}*iMDq~^8Xw0$L;ym9ZdJ#>x-*9 z2T4m`{Ge?96hFoYqucYVQenLX;l)mcN~mK0yuN-3Phnphhf3Rs;y7CnzH8+cW&Moy z73Yd{^p{vY48S}~R#Ja1%I3loa3kCm0Pi5lP~UW;Zcd#9-$oGQNeQ! zG|serx78!jU<{Vu?|k(~zU%FvRjqVuXrxe_9+yPSxmll60W7pBZP_+-VY#5|wie-8 zhApj6N8kI(AQmFj#objI@FRpJ5Xv;uBB65PakKVtUQp3Mu;m`ys-pu~9zqCwZ745v z^{!$pji4cUadQ%)Y#qz0mI_kob`=Q$rrB9!I3QOfqYyfg#G!fJg?pEucy1H)dA76h zu#Z!EEQEcO;IN-t_{V7y_8+|CXL+%%!=Gw6tq5ayL2MDr9~hy&w*@6@{o;>?R1zt1 z+Hmoz*6*-PiYQvXZ}B342$!Z6P}S))Ptqhx7Mq(?7{%v#!K6BR`ocHc8(nUF(_;ri zCdW;K?=yhkFKRgH19i?D1Grmnt=rrGE^jP#lgJ0Jl1Ff`L?oneA;(%?7oxMn1tXEz z$hb8qS#X7VZmD@txme`Xy!qqKxEq7UA$_3X8b`uZxz|;(p;{s1IKNgszZh`q zvBwWIBj3RFfm_Z!%AmR(d=woupL|sMXmRwBzqzx|hJG62Z5-DbxC76fdc(ZF)dZ8_ z{KWN6{FBiM3CI3qIvdYV=9BUKgv^I?Z#J9^XM@3DcH)jE#GQIG?9PT{G#?M9)9Fsk z$0CuH_9QA?ky;z0KC-9Oy+?St2I#;ImJk79V+a@Uiw^I;-&M`*2;? z9S?`_zw5fy|J~ul{mdHdG6pd*BeZ{$!ExYdQ|G4HRCw@%zf{^s>JH YpFW>H@B8^b0RRC1{|VH?N&xl)0O2yo`~Uy| literal 0 HcmV?d00001 diff --git a/incubator/storj-node/0.0.1/helm-values.md b/incubator/storj-node/0.0.1/helm-values.md new file mode 100644 index 00000000000..3b2bdff0b30 --- /dev/null +++ b/incubator/storj-node/0.0.1/helm-values.md @@ -0,0 +1,39 @@ +# Default Helm-Values + +TrueCharts is primarily build to supply TrueNAS SCALE Apps. +However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file. + +Most of our Apps also consume our "common" Helm Chart. +If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart. +You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document. + +## Values + +| Key | Type | Default | Description | +|-----|------|---------|-------------| +| env.ADDRESS | string | `""` | | +| env.EMAIL | string | `""` | | +| env.SETUP | bool | `true` | | +| env.STORAGE | string | `"500GB"` | | +| image.pullPolicy | string | `"IfNotPresent"` | | +| image.repository | string | `"storjlabs/storagenode"` | | +| image.tag | string | `"6e7a89161-v1.49.5-go1.17.5@sha256:62f5c05ffabb0fe5d2e0c556a91c08fe6b47ff20df95f350739fa8c07f628877"` | | +| persistence.identity.enabled | bool | `true` | | +| persistence.identity.mountPath | string | `"/app/identity"` | | +| persistence.storage.enabled | bool | `true` | | +| persistence.storage.mountPath | string | `"/app/config"` | | +| secret.WALLET | string | `"walletaddress"` | | +| service.coretcp.enabled | bool | `true` | | +| service.coretcp.ports.coretcp.enabled | bool | `true` | | +| service.coretcp.ports.coretcp.port | int | `28967` | | +| service.coretcp.ports.coretcp.protocol | string | `"TCP"` | | +| service.coretcp.ports.coretcp.targetPort | int | `28967` | | +| service.coreudp.enabled | bool | `true` | | +| service.coreudp.ports.coreudp.enabled | bool | `true` | | +| service.coreudp.ports.coreudp.port | int | `28967` | | +| service.coreudp.ports.coreudp.protocol | string | `"UDP"` | | +| service.coreudp.ports.coreudp.targetPort | int | `28967` | | +| service.main.ports.main.port | int | `14002` | | +| service.main.ports.main.targetPort | int | `14002` | | + +All Rights Reserved - The TrueCharts Project diff --git a/incubator/storj-node/0.0.1/ix_values.yaml b/incubator/storj-node/0.0.1/ix_values.yaml new file mode 100644 index 00000000000..e69ea5674e0 --- /dev/null +++ b/incubator/storj-node/0.0.1/ix_values.yaml @@ -0,0 +1,44 @@ +image: + repository: storjlabs/storagenode + tag: 6e7a89161-v1.49.5-go1.17.5@sha256:62f5c05ffabb0fe5d2e0c556a91c08fe6b47ff20df95f350739fa8c07f628877 + pullPolicy: IfNotPresent + +secret: + WALLET: "walletaddress" + +env: + SETUP: true + EMAIL: "" + ADDRESS: "" + STORAGE: "500GB" + +service: + main: + ports: + main: + port: 14002 + targetPort: 14002 + coretcp: + enabled: true + ports: + coretcp: + enabled: true + protocol: TCP + port: 28967 + targetPort: 28967 + coreudp: + enabled: true + ports: + coreudp: + enabled: true + protocol: UDP + port: 28967 + targetPort: 28967 + +persistence: + identity: + enabled: true + mountPath: "/app/identity" + storage: + enabled: true + mountPath: "/app/config" diff --git a/incubator/storj-node/0.0.1/questions.yaml b/incubator/storj-node/0.0.1/questions.yaml new file mode 100644 index 00000000000..09b2a9bc4aa --- /dev/null +++ b/incubator/storj-node/0.0.1/questions.yaml @@ -0,0 +1,2860 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + open: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + - variable: controller + group: "Controller" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "Recreate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: arg + label: "arg" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: secret + group: "Container Configuration" + label: "Image Secrets" + schema: + additional_attrs: true + type: dict + attrs: + - variable: WALLET + label: "WALLET" + description: "A wallet address to receive STORJ token payouts for running the node." + schema: + type: string + default: "" + required: true + + - variable: env + group: "Container Configuration" + label: "Image Environment" + schema: + additional_attrs: true + type: dict + attrs: + - variable: SETUP + label: "SETUP (Change to false after first deploy)" + description: "After first deploy, come back to change it to false." + schema: + type: boolean + default: true + - variable: EMAIL + label: "EMAIL" + description: "Email address so that we can notify you when a new version has been released." + schema: + type: string + default: "" + - variable: ADDRESS + label: "ADDRESS" + description: "External IP address or the DDNS you configured and the port you opened on your router" + schema: + type: string + default: "" + required: true + - variable: STORAGE + label: "STORAGE" + description: "How much disk space you want to allocate to the Storj network. Be sure not to over-allocate space! Allow at least 10% extra for overhead" + schema: + type: string + default: "500GB" + required: true + + - variable: TZ + label: "Timezone" + group: "Container Configuration" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: tty + label: "Enable TTY" + description: "Determines whether containers in a pod runs with TTY enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: stdin + label: "Enable STDIN" + description: "Determines whether containers in a pod runs with stdin enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ipFamilyPolicy + label: "IP Family Policy" + description: "(Advanced) Specify the ip policy" + schema: + show_if: [["type", "!=", "Simple"]] + type: string + default: "SingleStack" + enum: + - value: "SingleStack" + description: "SingleStack" + - value: "PreferDualStack" + description: "PreferDualStack" + - value: "RequireDualStack" + description: "RequireDualStack" + - variable: ipFamilies + label: "(advanced) IP families" + description: "(advanced) The ip families that should be used" + schema: + show_if: [["type", "!=", "Simple"]] + type: list + default: [] + items: + - variable: ipFamily + label: "IP family" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 14002 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 14002 + - variable: coretcp + label: "Core TCP Service" + description: "Core TCP Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ipFamilyPolicy + label: "IP Family Policy" + description: "(Advanced) Specify the ip policy" + schema: + show_if: [["type", "!=", "Simple"]] + type: string + default: "SingleStack" + enum: + - value: "SingleStack" + description: "SingleStack" + - value: "PreferDualStack" + description: "PreferDualStack" + - value: "RequireDualStack" + description: "RequireDualStack" + - variable: ipFamilies + label: "(advanced) IP families" + description: "(advanced) The ip families that should be used" + schema: + show_if: [["type", "!=", "Simple"]] + type: list + default: [] + items: + - variable: ipFamily + label: "IP family" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: coretcp + label: "Core TCP Service Port Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 28967 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 28967 + - variable: coreudp + label: "Core UDP Service" + description: "Core UDP Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ipFamilyPolicy + label: "IP Family Policy" + description: "(Advanced) Specify the ip policy" + schema: + show_if: [["type", "!=", "Simple"]] + type: string + default: "SingleStack" + enum: + - value: "SingleStack" + description: "SingleStack" + - value: "PreferDualStack" + description: "PreferDualStack" + - value: "RequireDualStack" + description: "RequireDualStack" + - variable: ipFamilies + label: "(advanced) IP families" + description: "(advanced) The ip families that should be used" + schema: + show_if: [["type", "!=", "Simple"]] + type: list + default: [] + items: + - variable: ipFamily + label: "IP family" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: coreudp + label: "Core UDP Service Port Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 28967 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 28967 + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: externalInterfaces + description: "Add External Interfaces" + label: "Add external Interfaces" + group: "Networking" + schema: + type: list + items: + - variable: interfaceConfiguration + description: "Interface Configuration" + label: "Interface Configuration" + schema: + type: dict + $ref: + - "normalize/interfaceConfiguration" + attrs: + - variable: hostInterface + description: "Please specify host interface" + label: "Host Interface" + schema: + type: string + required: true + $ref: + - "definitions/interface" + - variable: ipam + description: "Define how IP Address will be managed" + label: "IP Address Management" + schema: + type: dict + required: true + attrs: + - variable: type + description: "Specify type for IPAM" + label: "IPAM Type" + schema: + type: string + required: true + enum: + - value: "dhcp" + description: "Use DHCP" + - value: "static" + description: "Use static IP" + show_subquestions_if: "static" + subquestions: + - variable: staticIPConfigurations + label: "Static IP Addresses" + schema: + type: list + items: + - variable: staticIP + label: "Static IP" + schema: + type: ipaddr + cidr: true + - variable: staticRoutes + label: "Static Routes" + schema: + type: list + items: + - variable: staticRouteConfiguration + label: "Static Route Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: destination + label: "Destination" + schema: + type: ipaddr + cidr: true + required: true + - variable: gateway + label: "Gateway" + schema: + type: ipaddr + cidr: false + required: true + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistence + label: "Integrated Persistent Storage" + description: "Integrated Persistent Storage" + group: "Storage and Persistence" + schema: + additional_attrs: true + type: dict + attrs: + - variable: identity + label: "App Identity Storage" + description: "Stores the Identity." + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: storage + label: "File Storage" + description: "File Storage" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "hostPath" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: security + label: "Container Security Settings" + group: "Security and Permissions" + schema: + type: dict + additional_attrs: true + attrs: + - variable: PUID + label: "Process User ID - PUID" + description: "When supported by the container, this sets the User ID running the Application Process. Not supported by all Apps" + schema: + type: int + default: 568 + - variable: UMASK + label: "UMASK" + description: "When supported by the container, this sets the UMASK for tha App. Not supported by all Apps" + schema: + type: string + default: "002" + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: true + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: true + - variable: capabilities + label: "Capabilities" + schema: + additional_attrs: true + type: dict + attrs: + - variable: drop + label: "Drop Capability" + schema: + type: list + default: [] + items: + - variable: dropEntry + label: "" + schema: + type: string + - variable: add + label: "Add Capability" + schema: + type: list + default: [] + items: + - variable: addEntry + label: "" + schema: + type: string + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 568 + - variable: runAsGroup + label: "runAsGroup" + description: The groupID this App of the user running the application" + schema: + type: int + default: 568 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Minimum Resources Required (request)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + + - variable: autoscaling + group: "Advanced" + label: "(Advanced) Horizontal Pod Autoscaler" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: target + label: "Target" + description: "deployment name, defaults to main deployment" + schema: + type: string + default: "" + - variable: minReplicas + label: "Minimum Replicas" + schema: + type: int + default: 1 + - variable: maxReplicas + label: "Maximum Replicas" + schema: + type: int + default: 5 + - variable: targetCPUUtilizationPercentage + label: "Target CPU Utilization Percentage" + schema: + type: int + default: 80 + - variable: targetMemoryUtilizationPercentage + label: "Target Memory Utilization Percentage" + schema: + type: int + default: 80 + - variable: networkPolicy + group: "Advanced" + label: "(Advanced) Network Policy" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: policyType + label: "Policy Type" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ingress" + description: "Ingress" + - value: "egress" + description: "Egress" + - value: "ingress-egress" + description: "Ingress and Egress" + - variable: egress + label: "Egress" + schema: + type: list + default: [] + items: + - variable: egressEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: to + label: "To" + schema: + type: list + default: [] + items: + - variable: toEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: int + - variable: namespaceSelector + label: "namespaceSelector" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + - variable: ingress + label: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: from + label: "From" + schema: + type: list + default: [] + items: + - variable: fromEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: int + - variable: namespaceSelector + label: "namespaceSelector" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + + + - variable: addons + group: "Addons" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: codeserver + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/incubator/storj-node/0.0.1/security.md b/incubator/storj-node/0.0.1/security.md new file mode 100644 index 00000000000..73840821f84 --- /dev/null +++ b/incubator/storj-node/0.0.1/security.md @@ -0,0 +1,136 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: storj-node/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'hostpatch' of Deployment 'RELEASE-NAME-storj-node' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-storj-node' of Deployment 'RELEASE-NAME-storj-node' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'hostpatch' of Deployment 'RELEASE-NAME-storj-node' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-storj-node' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-storj-node' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-storj-node' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-storj-node' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'hostpatch' of Deployment 'RELEASE-NAME-storj-node' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-storj-node' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-storj-node' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-storj-node' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-storj-node' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-storj-node' of Deployment 'RELEASE-NAME-storj-node' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-storj-node' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-storj-node' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-storj-node' of Deployment 'RELEASE-NAME-storj-node' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-storj-node' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-storj-node' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM |
Expand... HostPath volumes must be forbidden.


Deployment 'RELEASE-NAME-storj-node' should not set 'spec.template.volumes.hostPath'
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv023
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-storj-node' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + storjlabs/storagenode:6e7a89161-v1.49.5-go1.17.5@sha256:62f5c05ffabb0fe5d2e0c556a91c08fe6b47ff20df95f350739fa8c07f628877 + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| + + +#### Container: storjlabs/storagenode:6e7a89161-v1.49.5-go1.17.5@sha256:62f5c05ffabb0fe5d2e0c556a91c08fe6b47ff20df95f350739fa8c07f628877 (alpine 3.15.0) + + +**alpine** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/apache/thrift | CVE-2019-0205 | HIGH | v0.12.0 | 0.13.0 |
Expand...http://mail-archives.apache.org/mod_mbox/thrift-dev/201910.mbox/%3CVI1PR0101MB2142E0EA19F582429C3AEBCBB1920%40VI1PR0101MB2142.eurprd01.prod.exchangelabs.com%3E
https://access.redhat.com/errata/RHSA-2020:0804
https://access.redhat.com/errata/RHSA-2020:0805
https://access.redhat.com/errata/RHSA-2020:0806
https://access.redhat.com/errata/RHSA-2020:0811
https://lists.apache.org/thread.html/003ac686189e6ce7b99267784d04bf60059a8c323eeda5a79a0309b8@%3Ccommits.cassandra.apache.org%3E
https://lists.apache.org/thread.html/07bd68ad237a5d513751d6d2731a8828f902c738ea57d85c1a72bad3@%3Cdev.thrift.apache.org%3E
https://lists.apache.org/thread.html/0d058e1bfd11727c4f2e2adf4b6e403a47c38e22431ab20066a1ac79@%3Cdev.thrift.apache.org%3E
https://lists.apache.org/thread.html/1193444c17f499f92cd198d464a2c1ffc92182c83487345a854914b3@%3Cuser.thrift.apache.org%3E
https://lists.apache.org/thread.html/1c18ec6ebfea0a9211992be952e8b33d0fda202c077979b84a5e09a8@%3Cuser.thrift.apache.org%3E
https://lists.apache.org/thread.html/3dfa054b89274c9109c26ed1843ca15a14c03786f4016d26773878ae@%3Cdev.thrift.apache.org%3E
https://lists.apache.org/thread.html/928cae83d20d8d8196c26118f7084aa37573e1d31162381fb9454fb5@%3Cdev.thrift.apache.org%3E
https://lists.apache.org/thread.html/9f7150d0b02e72d1154721a412e80cf797f1b7cfa295fcefc67b1381@%3Ccommits.cassandra.apache.org%3E
https://lists.apache.org/thread.html/a9669756befaeb0f8e08766d3f4d410a0fce85da3a570506f71f0b67@%3Cdev.thrift.apache.org%3E
https://lists.apache.org/thread.html/r0c606d4be9aa163d132edf8edd8eb55e7b9464063b99acbbf6e9e287@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r0d08f5576286f4a042aabde13ecf58979644f6dc210f25aa9a4d469b@%3Cdev.thrift.apache.org%3E
https://lists.apache.org/thread.html/r137753c9df8dd9065bea27a26af49aadc406b5a57fc584fefa008afd@%3Cdev.thrift.apache.org%3E
https://lists.apache.org/thread.html/r1b1a92c229ead94d53b3bcde9e624d002b54f1c6fdb830b9f4da20e1@%3Cdev.thrift.apache.org%3E
https://lists.apache.org/thread.html/r228ac842260c2c516af7b09f3cf4cf76e5b9c002e359954a203ab5a5@%3Cdev.thrift.apache.org%3E
https://lists.apache.org/thread.html/r2832722c31d78bef7526e2c701ba4b046736e4c851473194a247392f@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/r36581cc7047f007dd6aadbdd34e18545ec2c1eb7ccdae6dd47a877a9@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/r3887b48b183b6fa43e59398bd170a99239c0a16264cb5175b5b689d0@%3Ccommits.cassandra.apache.org%3E
https://lists.apache.org/thread.html/r4633082b834eebccd0d322697651d931ab10ca9c51ee7ef18e1f60f4@%3Cdev.thrift.apache.org%3E
https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3@%3Ccommits.cassandra.apache.org%3E
https://lists.apache.org/thread.html/r50bf84c60867574238d18cdad5da9f303b618114c35566a3a001ae08@%3Cdev.hive.apache.org%3E
https://lists.apache.org/thread.html/r53c03e1c979b9c628d0d65e0f49dd9a9f9d7572838727ad11b750575@%3Cuser.cassandra.apache.org%3E
https://lists.apache.org/thread.html/r55609613abab203a1f2c1f3de050b63ae8f5c4a024df0d848d6915ff@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/r569b2b3da41ff45bfacfca6787a4a8728edd556e185b69b140181d9d@%3Cdev.thrift.apache.org%3E
https://lists.apache.org/thread.html/r573029c2f8632e3174b9eea7cd57f9c9df33f2f706450e23fc57750a@%3Ccommits.thrift.apache.org%3E
https://lists.apache.org/thread.html/r67a704213d13326771f46c84bbd84c8281bb93946e155e0e40abcb4c@%3Ccommits.cassandra.apache.org%3E
https://lists.apache.org/thread.html/r73a3c8b80765e3d2430ff51f22b778d0c917919f01815b69ed16cf9d@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r7859e767c90c8f4971dec50f801372aa64e88f143c3e8a265a36f9b4@%3Cuser.cassandra.apache.org%3E
https://lists.apache.org/thread.html/r92b7771afee2625209c36727fefdc77033964e9a1daa81ec3327e625@%3Cuser.cassandra.apache.org%3E
https://lists.apache.org/thread.html/r934f312dd5add7276ac2de684d8b237554ff9f34479a812df5fd6aee@%3Ccommits.cassandra.apache.org%3E
https://lists.apache.org/thread.html/rab740e5c70424ef79fd095a4b076e752109aeee41c4256c2e5e5e142@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rb139fa1d2714822d8c6e6f3bd6f5d5c91844d313201185c409288fd9@%3Ccommits.cassandra.apache.org%3E
https://lists.apache.org/thread.html/rba61c1f3a3b1960a6a694775b1a437751eba0825f30188f69387fe90@%3Cdev.thrift.apache.org%3E
https://lists.apache.org/thread.html/rce0d368a78b42c545f26c2e6e91e2b8a91b27b60d0cb45fe1911d337@%3Cnotifications.thrift.apache.org%3E
https://lists.apache.org/thread.html/re387dc6ca11cb0b0ce4de8e800bb91ca50fee054b80105f5cd34adcb@%3Cdev.thrift.apache.org%3E
https://lists.apache.org/thread.html/rf359e5cc6a185494fc0cfe837fe82f7db2ef49242d35cbf3895aebce@%3Cdev.thrift.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-0205
https://security.gentoo.org/glsa/202107-32
https://www.oracle.com//security-alerts/cpujul2021.html
| +| github.com/apache/thrift | CVE-2019-0210 | HIGH | v0.12.0 | 0.13.0 |
Expand...http://mail-archives.apache.org/mod_mbox/thrift-dev/201910.mbox/%3C277A46CA87494176B1BBCF5D72624A2A%40HAGGIS%3E
https://access.redhat.com/errata/RHSA-2020:0804
https://access.redhat.com/errata/RHSA-2020:0805
https://access.redhat.com/errata/RHSA-2020:0806
https://access.redhat.com/errata/RHSA-2020:0811
https://lists.apache.org/thread.html/r2832722c31d78bef7526e2c701ba4b046736e4c851473194a247392f@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/r36581cc7047f007dd6aadbdd34e18545ec2c1eb7ccdae6dd47a877a9@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/r55609613abab203a1f2c1f3de050b63ae8f5c4a024df0d848d6915ff@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rab740e5c70424ef79fd095a4b076e752109aeee41c4256c2e5e5e142@%3Ccommits.pulsar.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-0210
https://security.gentoo.org/glsa/202107-32
| +| github.com/apache/thrift | CVE-2020-13949 | HIGH | v0.12.0 | v0.14.0 |
Expand...https://github.com/advisories/GHSA-g2fg-mr77-6vrm
https://github.com/apache/hbase/pull/2958
https://lists.apache.org/thread.html/r01b34416677f1ba869525e1b891ac66fa6f88c024ee4d7cdea6b456b@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r02ba8db500d15a5949e9a7742815438002ba1cf1b361bdda52ed40ca@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r02f7771863383ae993eb83cdfb70c3cb65a355c913242c850f61f1b8@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r0372f0af2dad0b76fbd7a6cfdaad29d50384ad48dda475a5026ff9a3@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r08a7bd19470ef8950d58cc9d9e7b02bc69c43f56c601989a7729cce5@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r1084a911dff90b2733b442ee0f5929d19b168035d447f2d25f534fe4@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r117d5d2b08d505b69558a2a31b0a1cf8990cd0385060b147e70e76a9@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r12090c81b67d21a814de6cf54428934a5e5613fde222759bbb05e99b@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r13f40151513ff095a44a86556c65597a7e55c00f5e19764a05530266@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r143ca388b0c83fe659db14be76889d50b453b0ee06f423181f736933@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r1456eab5f3768be69436d5b0a68b483eb316eb85eb3ef6eba156a302@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r1504886a550426d3c05772c47b1a6350c3235e51fd1fdffbec43e974@%3Cuser.thrift.apache.org%3E
https://lists.apache.org/thread.html/r15eed5d21e16a5cce810c1e096ffcffc36cd08c2f78ce2f9b24b4a6a@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r179119bbfb5610499286a84c316f6789c5afbfa5340edec6eb28d027@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/r17cca685ad53bc8300ee7fcfe874cb784a222343f217dd076e7dc1b6@%3Ccommits.camel.apache.org%3E
https://lists.apache.org/thread.html/r18732bb1343894143d68db58fe4c8f56d9cd221b37f1378ed7373372@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r191a9279e2863b68e5496ee4ecd8be0d4fe43b324b934f0d1f106e1d@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r196409cc4df929d540a2e66169104f2b3b258d8bd96b5f083c59ee51@%3Ccommits.camel.apache.org%3E
https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/r1dea91f0562e0a960b45b1c5635b2a47b258b77171334276bcf260a7@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r1fb2d26b81c64ce96c4fd42b9e6842ff315b02c36518213b6c057350@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r20f6f8f8cf07986dc5304baed3bf4d8a1c4cf135ff6fe3640be4d7ec@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r278e96edc4bc13efb2cb1620a73e48f569162b833c6bda3e6ea18b80@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r27b7d3d95ffa8498899ef1c9de553d469f8fe857640a3f6e58dba640@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r286e9a13d3ab0550042997219101cb87871834b8d5ec293b0c60f009@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r298a25228868ebc0943d56c8f3641212a0962d2dbcf1507d5860038e@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r2d180180f37c2ab5cebd711d080d01d8452efa8ad43c5d9cd7064621@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r2ed66a3823990306b742b281af1834b9bc85f98259c870b8ffb13d93@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r2f6a547f226579f542eb08793631d1f2d47d7aed7e2f9d11a4e6af9f@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r3550b61639688e0efbc253c6c3e6358851c1f053109f1c149330b535@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r36581cc7047f007dd6aadbdd34e18545ec2c1eb7ccdae6dd47a877a9@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/r3a1291a7ab8ee43db87cb0253371489810877028fc6e7c68dc640926@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r3de0e0c26d4bd00dd28cab27fb44fba11d1c1d20275f7cce71393dd1@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r3e31ec7e8c39db7553be4f4fd4d27cf27c41f1ba9c985995c4ea9c5a@%3Cnotifications.thrift.apache.org%3E
https://lists.apache.org/thread.html/r3f3e1d562c528b4bafef2dde51f79dd444a4b68ef24920d68068b6f9@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r3f97dbbbb1b2a7324521208bb595392853714e141a37b8f68d395835@%3Cnotifications.thrift.apache.org%3E
https://lists.apache.org/thread.html/r409e296c890753296c544a74d4de0d4a3ce719207a5878262fa2bd71@%3Ccommits.hbase.apache.org%3E
https://lists.apache.org/thread.html/r421a9a76811c1aed7637b5fe5376ab14c09ccdd7b70d5211d6e76d1e@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r43dc2b2e928e9d845b07ac075634cb759d91bb852421dc282f87a74a%40%3Cdev.thrift.apache.org%3E
https://lists.apache.org/thread.html/r449288f6a941a2585262e0f4454fdefe169d5faee33314f6f89fab30@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r4d90b6d8de9697beb38814596d3a0d4994fa9aba1f6731a2c648d3ae@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r4fa53eacca2ac38904f38dc226caebb3f2f668b2da887f2fd416f4a7@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r515e01a30443cfa2dbb355c44c63149869afd684fb7b0344c58fa67b@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r533a172534ae67f6f17c4d33a1b814d3d5ada9ccd4eb442249f33fa2@%3Ccommits.camel.apache.org%3E
https://lists.apache.org/thread.html/r587b4a5bcbc290269df0906bafba074f3fe4e50d4e959212f56fa7ea@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r62aa6d07b23095d980f348d330ed766560f9a9e940fec051f534ce37@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r635133a74fa07ef3331cae49a9a088365922266edd58099a6162a5d3@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r668aed02e287c93403e0b8df16089011ee4a96afc8f479809f1fc07f@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r6990c849aeafe65366794bfd002febd47b7ffa8cf3c059b400bbb11d@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r699c031e6921b0ad0f943848e7ba1d0e88c953619d47908618998f76@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r6ae3c68b0bfe430fb32f24236475276b6302bed625b23f53b68748b5@%3Cuser.thrift.apache.org%3E
https://lists.apache.org/thread.html/r6ba4f0817f98bf7c1cb314301cb7a24ba11a0b3e7a5be8b0ae3190b0@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r6c5b7324274fd361b038c5cc316e99344b7ae20beae7163214fac14d@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r72c3d1582d50b2ca7dd1ee97e81c847a5cf3458be26d42653c39d7a6@%3Ccommits.camel.apache.org%3E
https://lists.apache.org/thread.html/r741364444c3b238ab4a161f67f0d3a8f68acc517a39e6a93aa85d753@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r74eb88b422421c65514c23cb9c2b2216efb9254317ea1b6a264fe6dc@%3Ccommits.hbase.apache.org%3E
https://lists.apache.org/thread.html/r7597683cc8b87a31ec864835225a543dad112d7841bf1f17bf7eb8db@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r7ae909438ff5a2ffed9211e6ab0bd926396fd0b1fc33f31a406ee704@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r812915ecfa541ad2ca65c68a97b2c014dc87141dfaefc4de85049681@%3Ccommits.camel.apache.org%3E
https://lists.apache.org/thread.html/r850522c56c05aa06391546bdb530bb8fc3437f2b77d16e571ae73309@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r869331422580d35b4e65bd74cf3090298c4651bf4f31bfb19ae769da@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r886b6d9a89b6fa0aafbf0a8f8f14351548d6c6f027886a3646dbd075@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r8897a41f50d4eb19b268bde99328e943ba586f77779efa6de720c39f@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/r890b8ec5203d70a59a6b1289420d46938d9029ed706aa724978789be@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r89fdd39965efb7c6d22bc21c286d203252cea476e1782724aca0748e@%3Cuser.thrift.apache.org%3E
https://lists.apache.org/thread.html/r8dfbefcd606af6737b62461a45a9af9222040b62eab474ff2287cf75@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r90b4473950e26607ed77f3d70f120166f6a36a3f80888e4eeabcaf91@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r93f23f74315e009f4fb68ef7fc794dceee42cf87fe6613814dcd8c70@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r950ced188d62320fdb84d9e2c6ba896328194952eff7430c4f55e4b0@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r995b945cc8f6ec976d8c52d42ba931a688b45fb32cbdde715b6a816a@%3Cuser.thrift.apache.org%3E
https://lists.apache.org/thread.html/r9b51e7c253cb0989b4c03ed9f4e5f0478e427473357209ccc4d08ebf@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r9ec75f690dd60fec8621ba992290962705d5b7f0d8fd0a42fab0ac9f@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/ra3f7f06a1759c8e2985ed24ae2f5483393c744c1956d661adc873f2c@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/ra7371efd8363c1cd0f5331aafd359a808cf7277472b8616d7b392128@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/ra9f7c755790313e1adb95d29794043fb102029e803daf4212ae18063@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/race178e9500ab8a5a6112667d27c48559150cadb60f2814bc67c40af@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/rad635e16b300cf434280001ee6ecd2ed2c70987bf16eb862bfa86e02@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/rada9d2244a66ede0be29afc5d5f178a209f9988db56b9b845d955741@%3Ccommits.hbase.apache.org%3E
https://lists.apache.org/thread.html/rae95c2234b6644bfd666b2671a1b42a09f38514d0f27cca3c7d5d55a@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/raea1bb8cf2eb39c5e10543f547bdbbdbb563c2ac6377652f161d4e37@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/rb3574bc1036b577b265be510e6b208f0a5d5d84cd7198347dc8482df@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/rb44ec04e5a9b1f87fef97bb5f054010cbfaa3b8586472a3a38a16fca@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/rb51977d392b01434b0b5df5c19b9ad5b6178cfea59e676c14f24c053@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/rb91c32194eb5006f0b0c8bcdbd512c13495a1b277d4d51d45687f036@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rbc5cad06a46d23253a3c819229efedecfc05f89ef53f5fdde77a86d6@%3Cuser.thrift.apache.org%3E
https://lists.apache.org/thread.html/rbfbb81e7fb5d5009caf25798f02f42a7bd064a316097303ba2f9ed76@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/rc48ab5455bdece9a4afab53ca0f1e4f742d5baacb241323454a87b4e@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/rc7a241e0af086b226ff9ccabc4a243d206f0f887037994bfd8fcaaeb@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/rc7a79b08822337c68705f16ee7ddcfd352313b836e78a4b86c7a7e3d@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/rc896ce7761999b088f3adabcb99dde2102b6a66130b8eec6c8265eab@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/rcace846f74ea9e2af2f7c30cef0796724aa74089f109c8029b850163@%3Cdev.hive.apache.org%3E
https://lists.apache.org/thread.html/rcae4c66f67e701db44d742156dee1f3e5e4e07ad7ce10c740a76b669@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/rcdf62ecd36e39e4ff9c61802eee4927ce9ecff1602eed1493977ef4c@%3Cuser.thrift.apache.org%3E
https://lists.apache.org/thread.html/rd0734d91f16d5b050f0bcff78b4719300042a34fadf5e52d0edf898e@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rd370fdb419652c5219409b315a6349b07a7e479bd3f151e9a5671774@%3Ccommits.hbase.apache.org%3E
https://lists.apache.org/thread.html/rd49d53b146d94a7d3a135f6b505589655ffec24ea470e345d31351bb@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/rd78cdd87d84499a404202f015f55935db3658bd0983ecec81e6b18c6@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/rdc8e0f92d06decaee5db58de4ded16d80016a7db2240a8db17225c49@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/rdcf00186c34d69826d9c6b1f010136c98b00a586136de0061f7d267e@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/rf568168e7f83871969928c0379813da6d034485f8b20fa73884816d6@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/rf603d25213cfff81d6727c259328846b366fd32a43107637527c9768@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/rf65df763f630163a3f620887efec082080555cee1adb0b8eaf2c7ddb@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/rf741d08c7e0ab1542c81ea718467422bd01159ed284796a36ad88311@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/rf75979ae0ffd526f3afa935a8f0ee13c82808ea8b2bc0325eb9dcd90@%3Ccommits.camel.apache.org%3E
https://lists.apache.org/thread.html/rfbb01bb85cdc2022f3b96bdc416dbfcb49a2855b3a340aa88b2e1de9@%3Ccommits.druid.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-13949
https://security.gentoo.org/glsa/202107-32
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| golang.org/x/text | CVE-2021-38561 | UNKNOWN | v0.3.6 | 0.3.7 |
Expand...
| + diff --git a/incubator/storj-node/0.0.1/templates/common.yaml b/incubator/storj-node/0.0.1/templates/common.yaml new file mode 100644 index 00000000000..a6613c2ce21 --- /dev/null +++ b/incubator/storj-node/0.0.1/templates/common.yaml @@ -0,0 +1 @@ +{{ include "common.all" . }} diff --git a/incubator/storj-node/0.0.1/values.yaml b/incubator/storj-node/0.0.1/values.yaml new file mode 100644 index 00000000000..e69de29bb2d diff --git a/incubator/storj-node/item.yaml b/incubator/storj-node/item.yaml new file mode 100644 index 00000000000..35d3208847b --- /dev/null +++ b/incubator/storj-node/item.yaml @@ -0,0 +1,4 @@ +icon_url: https://truecharts.org/_static/img/appicons/storj-node.png +categories: +- media +