Commit new App releases for TrueCharts

Signed-off-by: TrueCharts-Bot <bot@truecharts.org>
This commit is contained in:
TrueCharts-Bot 2022-02-27 23:06:41 +00:00
parent 9e7d313646
commit b83275c69d
27 changed files with 3212 additions and 28 deletions

View File

@ -1,6 +1,19 @@
# Changelog<br>
<a name="statisfactory-0.0.9"></a>
### [statisfactory-0.0.9](https://github.com/truecharts/apps/compare/statisfactory-0.0.8...statisfactory-0.0.9) (2022-02-27)
#### Chore
* rename `web_portal` to `open` ([#1957](https://github.com/truecharts/apps/issues/1957))
#### Fix
* Remove portal button and correct runasuser on gui ([#1979](https://github.com/truecharts/apps/issues/1979))
<a name="statisfactory-0.0.8"></a>
### [statisfactory-0.0.8](https://github.com/truecharts/apps/compare/statisfactory-0.0.7...statisfactory-0.0.8) (2022-02-22)

View File

@ -3,4 +3,4 @@ dependencies:
repository: https://truecharts.org
version: 8.16.1
digest: sha256:36066156858b25e9d81401767dd3c2ce915c3317d8bbccf6581e22812ce45b72
generated: "2022-02-22T23:15:44.459001572Z"
generated: "2022-02-27T23:03:07.411342892Z"

View File

@ -20,7 +20,7 @@ sources:
- https://github.com/wolveix/satisfactory-server
- https://hub.docker.com/r/wolveix/satisfactory-server
type: application
version: 0.0.8
version: 0.0.9
annotations:
truecharts.org/catagories: |
- games

View File

@ -25,30 +25,9 @@ groups:
description: "Addon Configuration"
- name: "Advanced"
description: "Advanced Configuration"
portals:
web_portal:
protocols:
- "$kubernetes-resource_configmap_portal_protocol"
host:
- "$kubernetes-resource_configmap_portal_host"
ports:
- "$kubernetes-resource_configmap_portal_port"
portals: {}
questions:
- variable: portal
group: "Container Image"
label: "Configure Portal Button"
schema:
type: dict
hidden: true
attrs:
- variable: enabled
label: "Enable"
description: "enable the portal button"
schema:
hidden: true
editable: false
type: boolean
default: true
- variable: global
label: "global settings"
group: "Controller"
@ -1599,7 +1578,7 @@ questions:
label: "runAsNonRoot"
schema:
type: boolean
default: true
default: false
- variable: capabilities
label: "Capabilities"
schema:
@ -1639,13 +1618,13 @@ questions:
description: "The UserID of the user running the application"
schema:
type: int
default: 568
default: 0
- variable: runAsGroup
label: "runAsGroup"
description: The groupID this App of the user running the application"
schema:
type: int
default: 568
default: 0
- variable: fsGroup
label: "fsGroup"
description: "The group that should own ALL storage."

View File

@ -264,6 +264,7 @@ hide:
| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| libfdisk1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br></details> |
| libflac8 | CVE-2020-0499 | MEDIUM | 1.3.2-3 | | <details><summary>Expand...</summary><a href="https://android.googlesource.com/platform/external/flac/+/029048f823ced50f63a92e25073427ec3a9bd909%5E%21/#F0">https://android.googlesource.com/platform/external/flac/+/029048f823ced50f63a92e25073427ec3a9bd909%5E%21/#F0</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0499">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0499</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/01/msg00001.html">https://lists.debian.org/debian-lts-announce/2021/01/msg00001.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33W6XZAAEJYRGU3XYHRO7XSYEA7YACUB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33W6XZAAEJYRGU3XYHRO7XSYEA7YACUB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KNZYTAU5UWBVXVJ4VHDWPR66ZVDLQZRE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KNZYTAU5UWBVXVJ4VHDWPR66ZVDLQZRE/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPA5GAEKPXKAHGHHBI4X7AFNI4BMOVG3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPA5GAEKPXKAHGHHBI4X7AFNI4BMOVG3/</a><br><a href="https://source.android.com/security/bulletin/pixel/2020-12-01">https://source.android.com/security/bulletin/pixel/2020-12-01</a><br></details> |
| libflac8 | CVE-2021-0561 | MEDIUM | 1.3.2-3 | | <details><summary>Expand...</summary><a href="https://github.com/xiph/flac/issues/243">https://github.com/xiph/flac/issues/243</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWXBVMPPSL377I7YM55ZYXVKVMYOKES2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWXBVMPPSL377I7YM55ZYXVKVMYOKES2/</a><br><a href="https://source.android.com/security/bulletin/pixel/2021-06-01">https://source.android.com/security/bulletin/pixel/2021-06-01</a><br></details> |
| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | | <details><summary>Expand...</summary><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481</a><br><a href="https://linux.oracle.com/cve/CVE-2019-15847.html">https://linux.oracle.com/cve/CVE-2019-15847.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1864.html">https://linux.oracle.com/errata/ELSA-2020-1864.html</a><br></details> |
| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560</a><br><a href="https://dev.gnupg.org/T5305">https://dev.gnupg.org/T5305</a><br><a href="https://dev.gnupg.org/T5328">https://dev.gnupg.org/T5328</a><br><a href="https://dev.gnupg.org/T5466">https://dev.gnupg.org/T5466</a><br><a href="https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61">https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61</a><br><a href="https://eprint.iacr.org/2021/923">https://eprint.iacr.org/2021/923</a><br><a href="https://linux.oracle.com/cve/CVE-2021-33560.html">https://linux.oracle.com/cve/CVE-2021-33560.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4409.html">https://linux.oracle.com/errata/ELSA-2021-4409.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/</a><br><a href="https://ubuntu.com/security/notices/USN-5080-1">https://ubuntu.com/security/notices/USN-5080-1</a><br><a href="https://ubuntu.com/security/notices/USN-5080-2">https://ubuntu.com/security/notices/USN-5080-2</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
@ -316,6 +317,8 @@ hide:
| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97067">http://www.securityfocus.com/bid/97067</a><br><a href="https://access.redhat.com/errata/RHSA-2018:2486">https://access.redhat.com/errata/RHSA-2018:2486</a><br><a href="https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/">https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/</a><br><a href="https://security.gentoo.org/glsa/201710-25">https://security.gentoo.org/glsa/201710-25</a><br></details> |
| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97067">http://www.securityfocus.com/bid/97067</a><br><a href="https://access.redhat.com/errata/RHSA-2018:2486">https://access.redhat.com/errata/RHSA-2018:2486</a><br><a href="https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/">https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/</a><br><a href="https://security.gentoo.org/glsa/201710-25">https://security.gentoo.org/glsa/201710-25</a><br></details> |
| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="http://seclists.org/fulldisclosure/2021/Feb/14">http://seclists.org/fulldisclosure/2021/Feb/14</a><br><a href="https://bugs.gentoo.org/717920">https://bugs.gentoo.org/717920</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838</a><br><a href="https://linux.oracle.com/cve/CVE-2019-20838.html">https://linux.oracle.com/cve/CVE-2019-20838.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4373.html">https://linux.oracle.com/errata/ELSA-2021-4373.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://support.apple.com/kb/HT211931">https://support.apple.com/kb/HT211931</a><br><a href="https://support.apple.com/kb/HT212147">https://support.apple.com/kb/HT212147</a><br><a href="https://www.pcre.org/original/changelog.txt">https://www.pcre.org/original/changelog.txt</a><br></details> |
| libsasl2-2 | CVE-2022-24407 | CRITICAL | 2.1.27+dfsg-1+deb10u1 | 2.1.27+dfsg-1+deb10u2 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/02/23/4">http://www.openwall.com/lists/oss-security/2022/02/23/4</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407</a><br><a href="https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst">https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst</a><br><a href="https://linux.oracle.com/cve/CVE-2022-24407.html">https://linux.oracle.com/cve/CVE-2022-24407.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0666.html">https://linux.oracle.com/errata/ELSA-2022-0666.html</a><br><a href="https://ubuntu.com/security/notices/USN-5301-1">https://ubuntu.com/security/notices/USN-5301-1</a><br><a href="https://ubuntu.com/security/notices/USN-5301-2">https://ubuntu.com/security/notices/USN-5301-2</a><br><a href="https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28">https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28</a><br></details> |
| libsasl2-modules-db | CVE-2022-24407 | CRITICAL | 2.1.27+dfsg-1+deb10u1 | 2.1.27+dfsg-1+deb10u2 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/02/23/4">http://www.openwall.com/lists/oss-security/2022/02/23/4</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407</a><br><a href="https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst">https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst</a><br><a href="https://linux.oracle.com/cve/CVE-2022-24407.html">https://linux.oracle.com/cve/CVE-2022-24407.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0666.html">https://linux.oracle.com/errata/ELSA-2022-0666.html</a><br><a href="https://ubuntu.com/security/notices/USN-5301-1">https://ubuntu.com/security/notices/USN-5301-1</a><br><a href="https://ubuntu.com/security/notices/USN-5301-2">https://ubuntu.com/security/notices/USN-5301-2</a><br><a href="https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28">https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28</a><br></details> |
| libsdl2-2.0-0 | CVE-2019-13616 | HIGH | 2.0.9+dfsg1-1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00093.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00093.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00094.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00094.html</a><br><a href="https://access.redhat.com/errata/RHSA-2019:3950">https://access.redhat.com/errata/RHSA-2019:3950</a><br><a href="https://access.redhat.com/errata/RHSA-2019:3951">https://access.redhat.com/errata/RHSA-2019:3951</a><br><a href="https://access.redhat.com/errata/RHSA-2020:0293">https://access.redhat.com/errata/RHSA-2020:0293</a><br><a href="https://bugzilla.libsdl.org/show_bug.cgi?id=4538">https://bugzilla.libsdl.org/show_bug.cgi?id=4538</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13616">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13616</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13616.html">https://linux.oracle.com/cve/CVE-2019-13616.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-4024.html">https://linux.oracle.com/errata/ELSA-2019-4024.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/01/msg00024.html">https://lists.debian.org/debian-lts-announce/2021/01/msg00024.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GY6FDFPYUJ7YPY3XB5U75VJHBSVRVIKO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GY6FDFPYUJ7YPY3XB5U75VJHBSVRVIKO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HEH5RO7XZA5DDCO2XOP4QHDEELQQTYV2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HEH5RO7XZA5DDCO2XOP4QHDEELQQTYV2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UITVW4WTOOCECLLWPQCV7VWMU66DN255/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UITVW4WTOOCECLLWPQCV7VWMU66DN255/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VDNX3RVXTWELBXQDNERNVVKDGKDF2MPB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VDNX3RVXTWELBXQDNERNVVKDGKDF2MPB/</a><br><a href="https://ubuntu.com/security/notices/USN-4156-1">https://ubuntu.com/security/notices/USN-4156-1</a><br><a href="https://ubuntu.com/security/notices/USN-4156-2">https://ubuntu.com/security/notices/USN-4156-2</a><br><a href="https://ubuntu.com/security/notices/USN-4238-1">https://ubuntu.com/security/notices/USN-4238-1</a><br><a href="https://usn.ubuntu.com/4156-1/">https://usn.ubuntu.com/4156-1/</a><br><a href="https://usn.ubuntu.com/4156-2/">https://usn.ubuntu.com/4156-2/</a><br><a href="https://usn.ubuntu.com/4238-1/">https://usn.ubuntu.com/4238-1/</a><br></details> |
| libsdl2-2.0-0 | CVE-2019-7572 | HIGH | 2.0.9+dfsg1-1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html</a><br><a href="https://bugzilla.libsdl.org/show_bug.cgi?id=4495">https://bugzilla.libsdl.org/show_bug.cgi?id=4495</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7572">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7572</a><br><a href="https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720">https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7572.html">https://linux.oracle.com/cve/CVE-2019-7572.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4627.html">https://linux.oracle.com/errata/ELSA-2020-4627.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html">https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html">https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/10/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/10/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/10/msg00021.html">https://lists.debian.org/debian-lts-announce/2019/10/msg00021.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/</a><br><a href="https://security.gentoo.org/glsa/201909-07">https://security.gentoo.org/glsa/201909-07</a><br><a href="https://ubuntu.com/security/notices/USN-4156-1">https://ubuntu.com/security/notices/USN-4156-1</a><br><a href="https://ubuntu.com/security/notices/USN-4156-2">https://ubuntu.com/security/notices/USN-4156-2</a><br><a href="https://usn.ubuntu.com/4156-1/">https://usn.ubuntu.com/4156-1/</a><br><a href="https://usn.ubuntu.com/4156-2/">https://usn.ubuntu.com/4156-2/</a><br></details> |
| libsdl2-2.0-0 | CVE-2019-7573 | HIGH | 2.0.9+dfsg1-1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html</a><br><a href="https://bugzilla.libsdl.org/show_bug.cgi?id=4491">https://bugzilla.libsdl.org/show_bug.cgi?id=4491</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7573">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7573</a><br><a href="https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720">https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720</a><br><a href="https://linux.oracle.com/cve/CVE-2019-7573.html">https://linux.oracle.com/cve/CVE-2019-7573.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4627.html">https://linux.oracle.com/errata/ELSA-2020-4627.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html">https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html">https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/10/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/10/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/10/msg00021.html">https://lists.debian.org/debian-lts-announce/2019/10/msg00021.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/</a><br><a href="https://security.gentoo.org/glsa/201909-07">https://security.gentoo.org/glsa/201909-07</a><br><a href="https://ubuntu.com/security/notices/USN-4156-1">https://ubuntu.com/security/notices/USN-4156-1</a><br><a href="https://ubuntu.com/security/notices/USN-4156-2">https://ubuntu.com/security/notices/USN-4156-2</a><br><a href="https://usn.ubuntu.com/4156-1/">https://usn.ubuntu.com/4156-1/</a><br><a href="https://usn.ubuntu.com/4156-2/">https://usn.ubuntu.com/4156-2/</a><br></details> |

View File

@ -0,0 +1,10 @@
# Changelog<br>
<a name="grist-0.0.1"></a>
### grist-0.0.1 (2022-02-27)
#### Feat
* Add grist ([#1972](https://github.com/truecharts/apps/issues/1972))

View File

@ -0,0 +1,8 @@
# Configuration Options
##### Connecting to other apps
If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our "Linking Apps Internally" quick-start guide:
https://truecharts.org/manual/Quick-Start%20Guides/14-linking-apps/
##### Available config options
In the future this page is going to contain an automated list of options available in the installation/edit UI.

View File

@ -0,0 +1,6 @@
dependencies:
- name: common
repository: https://truecharts.org
version: 8.16.0
digest: sha256:fa603eaefc7f57029052919d45fd45424e58a69f707af7b657afd49a4b41a435
generated: "2022-02-27T23:03:07.401170175Z"

View File

@ -0,0 +1,29 @@
apiVersion: v2
appVersion: "latest"
dependencies:
- name: common
repository: https://truecharts.org
version: 8.16.0
description: Grist is a modern relational spreadsheet. It combine the flexibility of a spreadsheet with the robustness of a database to organize your data.
home: https://github.com/truecharts/apps/tree/master/charts/stable/grist
icon: https://truecharts.org/_static/img/appicons/grist-icon.png
keywords:
- grist
- spreadsheet
- database
kubeVersion: '>=1.16.0-0'
maintainers:
- email: info@truecharts.org
name: TrueCharts
url: https://truecharts.org
name: grist
sources:
- https://hub.docker.com/r/gristlabs/grist
- https://github.com/gristlabs/grist-core
- https://support.getgrist.com/
version: 0.0.1
annotations:
truecharts.org/catagories: |
- productivity
truecharts.org/SCALE-support: "true"
truecharts.org/grade: U

View File

@ -0,0 +1,39 @@
# Introduction
Grist is a modern relational spreadsheet. It combine the flexibility of a spreadsheet with the robustness of a database to organize your data.
TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation.
**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)**
## Source Code
* <https://hub.docker.com/r/gristlabs/grist>
* <https://github.com/gristlabs/grist-core>
* <https://support.getgrist.com/>
## Requirements
Kubernetes: `>=1.16.0-0`
## Dependencies
| Repository | Name | Version |
|------------|------|---------|
| https://truecharts.org | common | 8.16.0 |
## Installing the Chart
To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/03-Installing-an-App/).
## Uninstalling the Chart
To remove this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/07-Deleting-an-App/).
## Support
- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Open-Apps/) first.
- See the [Wiki](https://truecharts.org)
- Check our [Discord](https://discord.gg/tVsPTHWTtr)
- Open a [issue](https://github.com/truecharts/apps/issues/new/choose)
---
All Rights Reserved - The TrueCharts Project

View File

@ -0,0 +1,3 @@
Grist is a modern relational spreadsheet. It combine the flexibility of a spreadsheet with the robustness of a database to organize your data.
This App is supplied by TrueCharts, for more information please visit https://truecharts.org

Binary file not shown.

View File

@ -0,0 +1,31 @@
# Default Helm-Values
TrueCharts is primarily build to supply TrueNAS SCALE Apps.
However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file.
Most of our Apps also consume our "common" Helm Chart.
If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart.
You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document.
## Values
| Key | Type | Default | Description |
|-----|------|---------|-------------|
| env.GRIST_DEFAULT_EMAIL | string | `"user@mydomain.com"` | |
| env.HOME_PORT | string | `"{{ .Values.service.api.ports.api.port }}"` | |
| env.PORT | string | `"{{ .Values.service.main.ports.main.port }}"` | |
| image.pullPolicy | string | `"IfNotPresent"` | |
| image.repository | string | `"gristlabs/grist"` | |
| image.tag | string | `"latest@sha256:f28bc8762e602d5a4c0ef368ee3c8abe7b26bc4b90c7ad4ebc21e7b3ac7b3e70"` | |
| persistence.persist.enabled | bool | `true` | |
| persistence.persist.mountPath | string | `"/persist"` | |
| podSecurityContext.runAsGroup | int | `0` | |
| podSecurityContext.runAsUser | int | `0` | |
| securityContext.readOnlyRootFilesystem | bool | `false` | |
| securityContext.runAsNonRoot | bool | `false` | |
| service.api.ports.api.port | int | `10164` | |
| service.api.ports.api.targetPort | int | `10164` | |
| service.main.ports.main.port | int | `10163` | |
| service.main.ports.main.targetPort | int | `10163` | |
All Rights Reserved - The TrueCharts Project

View File

@ -0,0 +1,45 @@
image:
repository: gristlabs/grist
tag: latest@sha256:f28bc8762e602d5a4c0ef368ee3c8abe7b26bc4b90c7ad4ebc21e7b3ac7b3e70
pullPolicy: IfNotPresent
securityContext:
readOnlyRootFilesystem: false
runAsNonRoot: false
podSecurityContext:
runAsUser: 0
runAsGroup: 0
env:
PORT: "{{ .Values.service.main.ports.main.port }}"
HOME_PORT: "{{ .Values.service.api.ports.api.port }}"
GRIST_DEFAULT_EMAIL: "user@mydomain.com"
# https://github.com/gristlabs/grist-core/issues/128
# envValueFrom:
# REDIS_URL:
# secretKeyRef:
# name: rediscreds
# key: url
service:
main:
ports:
main:
port: 10163
targetPort: 10163
api:
ports:
api:
port: 10164
targetPort: 10164
persistence:
persist:
enabled: true
mountPath: "/persist"
# redis:
# enabled: true
# existingSecret: "rediscreds"

File diff suppressed because it is too large Load Diff

File diff suppressed because one or more lines are too long

View File

@ -0,0 +1 @@
{{ include "common.all" . }}

View File

View File

@ -0,0 +1,4 @@
icon_url: https://truecharts.org/_static/img/appicons/grist-icon.png
categories:
- productivity