From c6de4f0ca14e0a7e05f2e74cc9024b370ef3dbc8 Mon Sep 17 00:00:00 2001 From: TrueCharts-Bot Date: Wed, 30 Jun 2021 20:52:55 +0000 Subject: [PATCH] Commit new App releases for TrueCharts Signed-off-by: TrueCharts-Bot --- deprecated/nzbhydra/6.2.5/Chart.lock | 2 +- develop/prototype-gui/1.3.6/Chart.lock | 2 +- incubator/airsonic/1.2.5/Chart.lock | 2 +- incubator/appdaemon/3.2.6/Chart.lock | 2 +- incubator/bazarr/6.2.5/Chart.lock | 2 +- incubator/calibre-web/6.2.5/Chart.lock | 2 +- incubator/deluge/6.2.5/Chart.lock | 2 +- incubator/fireflyiii/4.3.6/Chart.lock | 2 +- incubator/freshrss/6.2.5/Chart.lock | 2 +- incubator/gaps/6.2.5/Chart.lock | 2 +- incubator/grocy/6.2.5/Chart.lock | 2 +- incubator/haste-server/1.2.5/Chart.lock | 2 +- incubator/heimdall/6.2.5/Chart.lock | 2 +- incubator/lazylibrarian/6.2.5/Chart.lock | 2 +- incubator/lychee/6.2.5/Chart.lock | 2 +- incubator/mealie/1.2.5/Chart.lock | 2 +- incubator/mosquitto/1.2.5/Chart.lock | 2 +- incubator/navidrome/6.2.5/Chart.lock | 2 +- incubator/node-red/6.2.5/Chart.lock | 2 +- incubator/nzbget/6.2.5/Chart.lock | 2 +- incubator/organizr/6.2.6/Chart.lock | 2 +- incubator/podgrab/4.2.5/Chart.lock | 2 +- incubator/prowlarr/1.2.5/Chart.lock | 2 +- incubator/qbittorrent/6.2.5/Chart.lock | 2 +- incubator/readarr/6.2.5/Chart.lock | 2 +- incubator/reg/1.2.4/Chart.lock | 2 +- incubator/sabnzbd/6.2.5/Chart.lock | 2 +- incubator/thelounge/1.2.5/Chart.lock | 2 +- incubator/tvheadend/7.2.5/Chart.lock | 2 +- incubator/unifi/6.2.5/Chart.lock | 2 +- incubator/unpackerr/1.2.5/Chart.lock | 2 +- stable/collabora-online/6.2.5/Chart.lock | 2 +- stable/deepstack-cpu/4.2.5/Chart.lock | 2 +- stable/emby/6.2.5/Chart.lock | 2 +- stable/esphome/6.2.5/Chart.lock | 2 +- stable/handbrake/6.2.5/Chart.lock | 2 +- stable/home-assistant/6.2.5/Chart.lock | 2 +- stable/jackett/6.2.5/Chart.lock | 2 +- stable/jellyfin/6.2.5/Chart.lock | 2 +- stable/kms/6.2.5/Chart.lock | 2 +- stable/lidarr/6.2.5/Chart.lock | 2 +- stable/ombi/6.2.5/Chart.lock | 2 +- stable/plex/5.2.5/Chart.lock | 2 +- stable/radarr/6.2.5/Chart.lock | 2 +- stable/sonarr/6.2.5/Chart.lock | 2 +- stable/syncthing/6.2.5/Chart.lock | 2 +- stable/tautulli/6.2.5/Chart.lock | 2 +- stable/traefik/6.3.12/CONFIG.md | 8 + stable/traefik/6.3.12/Chart.lock | 6 + stable/traefik/6.3.12/Chart.yaml | 29 ++ stable/traefik/6.3.12/LICENSE | 202 +++++++++ stable/traefik/6.3.12/README.md | 55 +++ stable/traefik/6.3.12/app-readme.md | 3 + stable/traefik/6.3.12/charts/common-6.4.3.tgz | Bin 0 -> 23367 bytes stable/traefik/6.3.12/crds/ingressroute.yaml | 12 + .../traefik/6.3.12/crds/ingressroutetcp.yaml | 12 + .../traefik/6.3.12/crds/ingressrouteudp.yaml | 13 + stable/traefik/6.3.12/crds/middlewares.yaml | 12 + .../6.3.12/crds/serverstransports.yaml | 12 + stable/traefik/6.3.12/crds/tlsoptions.yaml | 12 + stable/traefik/6.3.12/crds/tlsstores.yaml | 13 + .../traefik/6.3.12/crds/traefikservices.yaml | 12 + stable/traefik/6.3.12/ix_values.yaml | 329 ++++++++++++++ stable/traefik/6.3.12/questions.yaml | 385 ++++++++++++++++ stable/traefik/6.3.12/templates/_helpers.tpl | 62 +++ .../traefik/6.3.12/templates/_podtemplate.tpl | 265 +++++++++++ .../6.3.12/templates/custom/common.yaml | 0 .../custom/middleware-namespace.yaml | 7 + .../custom/middlewares/basic-middleware.yaml | 57 +++ .../custom/middlewares/basicauth.yaml | 29 ++ .../custom/middlewares/forwardauth.yaml | 23 + .../6.3.12/templates/custom/portal.yaml | 45 ++ .../traefik/6.3.12/templates/daemonset.yaml | 40 ++ .../dashboard-hook-ingressroute.yaml | 28 ++ .../traefik/6.3.12/templates/deployment.yaml | 47 ++ stable/traefik/6.3.12/templates/gateway.yaml | 33 ++ .../6.3.12/templates/gatewayclass.yaml | 9 + stable/traefik/6.3.12/templates/hpa.yaml | 20 + .../6.3.12/templates/ingressclass.yaml | 23 + .../6.3.12/templates/poddisruptionbudget.yaml | 22 + .../6.3.12/templates/rbac/clusterrole.yaml | 112 +++++ .../templates/rbac/clusterrolebinding.yaml | 19 + .../templates/rbac/podsecuritypolicy.yaml | 68 +++ .../traefik/6.3.12/templates/rbac/role.yaml | 61 +++ .../6.3.12/templates/rbac/rolebinding.yaml | 19 + .../6.3.12/templates/rbac/serviceaccount.yaml | 15 + stable/traefik/6.3.12/templates/service.yaml | 114 +++++ .../traefik/6.3.12/templates/tlsoption.yaml | 14 + stable/traefik/6.3.12/test_values.yaml | 426 ++++++++++++++++++ stable/traefik/6.3.12/values.yaml | 0 stable/transmission/6.2.5/Chart.lock | 2 +- stable/truecommand/6.2.5/Chart.lock | 2 +- stable/vaultwarden/3.3.6/Chart.lock | 2 +- stable/zwavejs2mqtt/6.2.5/Chart.lock | 2 +- 94 files changed, 2724 insertions(+), 51 deletions(-) create mode 100644 stable/traefik/6.3.12/CONFIG.md create mode 100644 stable/traefik/6.3.12/Chart.lock create mode 100644 stable/traefik/6.3.12/Chart.yaml create mode 100644 stable/traefik/6.3.12/LICENSE create mode 100644 stable/traefik/6.3.12/README.md create mode 100644 stable/traefik/6.3.12/app-readme.md create mode 100644 stable/traefik/6.3.12/charts/common-6.4.3.tgz create mode 100644 stable/traefik/6.3.12/crds/ingressroute.yaml create mode 100644 stable/traefik/6.3.12/crds/ingressroutetcp.yaml create mode 100644 stable/traefik/6.3.12/crds/ingressrouteudp.yaml create mode 100644 stable/traefik/6.3.12/crds/middlewares.yaml create mode 100644 stable/traefik/6.3.12/crds/serverstransports.yaml create mode 100644 stable/traefik/6.3.12/crds/tlsoptions.yaml create mode 100644 stable/traefik/6.3.12/crds/tlsstores.yaml create mode 100644 stable/traefik/6.3.12/crds/traefikservices.yaml create mode 100644 stable/traefik/6.3.12/ix_values.yaml create mode 100644 stable/traefik/6.3.12/questions.yaml create mode 100644 stable/traefik/6.3.12/templates/_helpers.tpl create mode 100644 stable/traefik/6.3.12/templates/_podtemplate.tpl create mode 100644 stable/traefik/6.3.12/templates/custom/common.yaml create mode 100644 stable/traefik/6.3.12/templates/custom/middleware-namespace.yaml create mode 100644 stable/traefik/6.3.12/templates/custom/middlewares/basic-middleware.yaml create mode 100644 stable/traefik/6.3.12/templates/custom/middlewares/basicauth.yaml create mode 100644 stable/traefik/6.3.12/templates/custom/middlewares/forwardauth.yaml create mode 100644 stable/traefik/6.3.12/templates/custom/portal.yaml create mode 100644 stable/traefik/6.3.12/templates/daemonset.yaml create mode 100644 stable/traefik/6.3.12/templates/dashboard-hook-ingressroute.yaml create mode 100644 stable/traefik/6.3.12/templates/deployment.yaml create mode 100644 stable/traefik/6.3.12/templates/gateway.yaml create mode 100644 stable/traefik/6.3.12/templates/gatewayclass.yaml create mode 100644 stable/traefik/6.3.12/templates/hpa.yaml create mode 100644 stable/traefik/6.3.12/templates/ingressclass.yaml create mode 100644 stable/traefik/6.3.12/templates/poddisruptionbudget.yaml create mode 100644 stable/traefik/6.3.12/templates/rbac/clusterrole.yaml create mode 100644 stable/traefik/6.3.12/templates/rbac/clusterrolebinding.yaml create mode 100644 stable/traefik/6.3.12/templates/rbac/podsecuritypolicy.yaml create mode 100644 stable/traefik/6.3.12/templates/rbac/role.yaml create mode 100644 stable/traefik/6.3.12/templates/rbac/rolebinding.yaml create mode 100644 stable/traefik/6.3.12/templates/rbac/serviceaccount.yaml create mode 100644 stable/traefik/6.3.12/templates/service.yaml create mode 100644 stable/traefik/6.3.12/templates/tlsoption.yaml create mode 100644 stable/traefik/6.3.12/test_values.yaml create mode 100644 stable/traefik/6.3.12/values.yaml diff --git a/deprecated/nzbhydra/6.2.5/Chart.lock b/deprecated/nzbhydra/6.2.5/Chart.lock index 1bef70bd4e9..e6c18bf7ab0 100644 --- a/deprecated/nzbhydra/6.2.5/Chart.lock +++ b/deprecated/nzbhydra/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:36:19.059027569Z" +generated: "2021-06-30T20:52:35.886180143Z" diff --git a/develop/prototype-gui/1.3.6/Chart.lock b/develop/prototype-gui/1.3.6/Chart.lock index 38615d37aae..df3005d738f 100644 --- a/develop/prototype-gui/1.3.6/Chart.lock +++ b/develop/prototype-gui/1.3.6/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:36:17.794105276Z" +generated: "2021-06-30T20:52:34.592135652Z" diff --git a/incubator/airsonic/1.2.5/Chart.lock b/incubator/airsonic/1.2.5/Chart.lock index d1c6b2f5164..cc89235fee0 100644 --- a/incubator/airsonic/1.2.5/Chart.lock +++ b/incubator/airsonic/1.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:34.113744567Z" +generated: "2021-06-30T20:51:51.480568249Z" diff --git a/incubator/appdaemon/3.2.6/Chart.lock b/incubator/appdaemon/3.2.6/Chart.lock index 031351272e7..9f672bbc200 100644 --- a/incubator/appdaemon/3.2.6/Chart.lock +++ b/incubator/appdaemon/3.2.6/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:35.409872484Z" +generated: "2021-06-30T20:51:52.824564573Z" diff --git a/incubator/bazarr/6.2.5/Chart.lock b/incubator/bazarr/6.2.5/Chart.lock index 1821c252844..fdc265c744c 100644 --- a/incubator/bazarr/6.2.5/Chart.lock +++ b/incubator/bazarr/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:36.804208384Z" +generated: "2021-06-30T20:51:54.072845678Z" diff --git a/incubator/calibre-web/6.2.5/Chart.lock b/incubator/calibre-web/6.2.5/Chart.lock index d6749d262a5..4f929c8dffd 100644 --- a/incubator/calibre-web/6.2.5/Chart.lock +++ b/incubator/calibre-web/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:38.15813557Z" +generated: "2021-06-30T20:51:55.346954285Z" diff --git a/incubator/deluge/6.2.5/Chart.lock b/incubator/deluge/6.2.5/Chart.lock index ddb4ddf5a21..ada40d325c0 100644 --- a/incubator/deluge/6.2.5/Chart.lock +++ b/incubator/deluge/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:39.555904977Z" +generated: "2021-06-30T20:51:56.66326217Z" diff --git a/incubator/fireflyiii/4.3.6/Chart.lock b/incubator/fireflyiii/4.3.6/Chart.lock index 8a2133e12d1..80d94b8b59e 100644 --- a/incubator/fireflyiii/4.3.6/Chart.lock +++ b/incubator/fireflyiii/4.3.6/Chart.lock @@ -6,4 +6,4 @@ dependencies: repository: https://charts.bitnami.com/bitnami version: 10.5.1 digest: sha256:465e7b131ee731b148c277a3ef6895af062a39143161e9035a7f8b0841b06e85 -generated: "2021-06-30T20:35:43.424340401Z" +generated: "2021-06-30T20:52:00.638700776Z" diff --git a/incubator/freshrss/6.2.5/Chart.lock b/incubator/freshrss/6.2.5/Chart.lock index 02332eb78db..4a7f0311411 100644 --- a/incubator/freshrss/6.2.5/Chart.lock +++ b/incubator/freshrss/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:47.750535162Z" +generated: "2021-06-30T20:52:04.880233553Z" diff --git a/incubator/gaps/6.2.5/Chart.lock b/incubator/gaps/6.2.5/Chart.lock index 41d1078c9f9..554491e9679 100644 --- a/incubator/gaps/6.2.5/Chart.lock +++ b/incubator/gaps/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:49.031805704Z" +generated: "2021-06-30T20:52:06.152431575Z" diff --git a/incubator/grocy/6.2.5/Chart.lock b/incubator/grocy/6.2.5/Chart.lock index 6f066a8f8f3..c085ca2eab8 100644 --- a/incubator/grocy/6.2.5/Chart.lock +++ b/incubator/grocy/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:50.362962492Z" +generated: "2021-06-30T20:52:07.521868562Z" diff --git a/incubator/haste-server/1.2.5/Chart.lock b/incubator/haste-server/1.2.5/Chart.lock index 1937198e33a..cc47914dac6 100644 --- a/incubator/haste-server/1.2.5/Chart.lock +++ b/incubator/haste-server/1.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:51.607957385Z" +generated: "2021-06-30T20:52:08.811238572Z" diff --git a/incubator/heimdall/6.2.5/Chart.lock b/incubator/heimdall/6.2.5/Chart.lock index 71fa6678e94..d3f24f7de38 100644 --- a/incubator/heimdall/6.2.5/Chart.lock +++ b/incubator/heimdall/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:52.914693314Z" +generated: "2021-06-30T20:52:10.119879036Z" diff --git a/incubator/lazylibrarian/6.2.5/Chart.lock b/incubator/lazylibrarian/6.2.5/Chart.lock index 92d4f627a10..242ec883542 100644 --- a/incubator/lazylibrarian/6.2.5/Chart.lock +++ b/incubator/lazylibrarian/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:54.245958201Z" +generated: "2021-06-30T20:52:11.382314418Z" diff --git a/incubator/lychee/6.2.5/Chart.lock b/incubator/lychee/6.2.5/Chart.lock index 6ca9cf36646..5f744565712 100644 --- a/incubator/lychee/6.2.5/Chart.lock +++ b/incubator/lychee/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:55.556404579Z" +generated: "2021-06-30T20:52:12.690562882Z" diff --git a/incubator/mealie/1.2.5/Chart.lock b/incubator/mealie/1.2.5/Chart.lock index 95559336e64..507e5f2a86f 100644 --- a/incubator/mealie/1.2.5/Chart.lock +++ b/incubator/mealie/1.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:56.862755067Z" +generated: "2021-06-30T20:52:14.004826209Z" diff --git a/incubator/mosquitto/1.2.5/Chart.lock b/incubator/mosquitto/1.2.5/Chart.lock index 7ba6abea37e..e4c3b5a5348 100644 --- a/incubator/mosquitto/1.2.5/Chart.lock +++ b/incubator/mosquitto/1.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:58.172938728Z" +generated: "2021-06-30T20:52:15.299173927Z" diff --git a/incubator/navidrome/6.2.5/Chart.lock b/incubator/navidrome/6.2.5/Chart.lock index be0faa76caf..556a9cf0185 100644 --- a/incubator/navidrome/6.2.5/Chart.lock +++ b/incubator/navidrome/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:59.56358147Z" +generated: "2021-06-30T20:52:16.536289442Z" diff --git a/incubator/node-red/6.2.5/Chart.lock b/incubator/node-red/6.2.5/Chart.lock index 33e0ac34c29..60770cc38ca 100644 --- a/incubator/node-red/6.2.5/Chart.lock +++ b/incubator/node-red/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:36:00.797198476Z" +generated: "2021-06-30T20:52:17.842128621Z" diff --git a/incubator/nzbget/6.2.5/Chart.lock b/incubator/nzbget/6.2.5/Chart.lock index 9b624ae08e2..bc58a302eb5 100644 --- a/incubator/nzbget/6.2.5/Chart.lock +++ b/incubator/nzbget/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:36:02.081554851Z" +generated: "2021-06-30T20:52:19.085700682Z" diff --git a/incubator/organizr/6.2.6/Chart.lock b/incubator/organizr/6.2.6/Chart.lock index 2334497af35..3ab38d9a519 100644 --- a/incubator/organizr/6.2.6/Chart.lock +++ b/incubator/organizr/6.2.6/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:36:03.357770178Z" +generated: "2021-06-30T20:52:20.405787784Z" diff --git a/incubator/podgrab/4.2.5/Chart.lock b/incubator/podgrab/4.2.5/Chart.lock index 86bffac1479..65f5f0e1f73 100644 --- a/incubator/podgrab/4.2.5/Chart.lock +++ b/incubator/podgrab/4.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:36:04.650925389Z" +generated: "2021-06-30T20:52:21.667215041Z" diff --git a/incubator/prowlarr/1.2.5/Chart.lock b/incubator/prowlarr/1.2.5/Chart.lock index 6119100f428..425d6062fbf 100644 --- a/incubator/prowlarr/1.2.5/Chart.lock +++ b/incubator/prowlarr/1.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:36:05.921537804Z" +generated: "2021-06-30T20:52:22.959075333Z" diff --git a/incubator/qbittorrent/6.2.5/Chart.lock b/incubator/qbittorrent/6.2.5/Chart.lock index c1da4050bc4..c67307614f1 100644 --- a/incubator/qbittorrent/6.2.5/Chart.lock +++ b/incubator/qbittorrent/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:36:07.177079448Z" +generated: "2021-06-30T20:52:24.218408468Z" diff --git a/incubator/readarr/6.2.5/Chart.lock b/incubator/readarr/6.2.5/Chart.lock index a58e9bf9b5c..f3cbf624b55 100644 --- a/incubator/readarr/6.2.5/Chart.lock +++ b/incubator/readarr/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:36:08.420114165Z" +generated: "2021-06-30T20:52:25.51940356Z" diff --git a/incubator/reg/1.2.4/Chart.lock b/incubator/reg/1.2.4/Chart.lock index e40302297cf..b7c42f96170 100644 --- a/incubator/reg/1.2.4/Chart.lock +++ b/incubator/reg/1.2.4/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:36:09.686585471Z" +generated: "2021-06-30T20:52:26.744188228Z" diff --git a/incubator/sabnzbd/6.2.5/Chart.lock b/incubator/sabnzbd/6.2.5/Chart.lock index e221e1dd4ce..a48d94923f5 100644 --- a/incubator/sabnzbd/6.2.5/Chart.lock +++ b/incubator/sabnzbd/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:36:10.995857344Z" +generated: "2021-06-30T20:52:28.067366013Z" diff --git a/incubator/thelounge/1.2.5/Chart.lock b/incubator/thelounge/1.2.5/Chart.lock index 8223413b3e9..cca7a67a0e0 100644 --- a/incubator/thelounge/1.2.5/Chart.lock +++ b/incubator/thelounge/1.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:36:12.376828375Z" +generated: "2021-06-30T20:52:29.350419189Z" diff --git a/incubator/tvheadend/7.2.5/Chart.lock b/incubator/tvheadend/7.2.5/Chart.lock index 9d6d3670270..7fec5f1d4f8 100644 --- a/incubator/tvheadend/7.2.5/Chart.lock +++ b/incubator/tvheadend/7.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:36:13.835142375Z" +generated: "2021-06-30T20:52:30.737058821Z" diff --git a/incubator/unifi/6.2.5/Chart.lock b/incubator/unifi/6.2.5/Chart.lock index 66c5e46e718..4cfd4eaa6a2 100644 --- a/incubator/unifi/6.2.5/Chart.lock +++ b/incubator/unifi/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:36:15.215253586Z" +generated: "2021-06-30T20:52:31.996406156Z" diff --git a/incubator/unpackerr/1.2.5/Chart.lock b/incubator/unpackerr/1.2.5/Chart.lock index 21160b46b16..895cbf757ea 100644 --- a/incubator/unpackerr/1.2.5/Chart.lock +++ b/incubator/unpackerr/1.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:36:16.529353085Z" +generated: "2021-06-30T20:52:33.323856984Z" diff --git a/stable/collabora-online/6.2.5/Chart.lock b/stable/collabora-online/6.2.5/Chart.lock index 3c40118f34a..9d811ef79ba 100644 --- a/stable/collabora-online/6.2.5/Chart.lock +++ b/stable/collabora-online/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:00.4689675Z" +generated: "2021-06-30T20:51:18.637885519Z" diff --git a/stable/deepstack-cpu/4.2.5/Chart.lock b/stable/deepstack-cpu/4.2.5/Chart.lock index 28508e745e0..cf1b846f72b 100644 --- a/stable/deepstack-cpu/4.2.5/Chart.lock +++ b/stable/deepstack-cpu/4.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:01.783026601Z" +generated: "2021-06-30T20:51:20.090624489Z" diff --git a/stable/emby/6.2.5/Chart.lock b/stable/emby/6.2.5/Chart.lock index e7ce2b4b6f4..621ed6d324e 100644 --- a/stable/emby/6.2.5/Chart.lock +++ b/stable/emby/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:03.117480509Z" +generated: "2021-06-30T20:51:21.381724018Z" diff --git a/stable/esphome/6.2.5/Chart.lock b/stable/esphome/6.2.5/Chart.lock index b0b0bcbe7c2..8ebbcd66bec 100644 --- a/stable/esphome/6.2.5/Chart.lock +++ b/stable/esphome/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:04.392035019Z" +generated: "2021-06-30T20:51:22.662697807Z" diff --git a/stable/handbrake/6.2.5/Chart.lock b/stable/handbrake/6.2.5/Chart.lock index 72d8467ad3d..b7c85bf17fd 100644 --- a/stable/handbrake/6.2.5/Chart.lock +++ b/stable/handbrake/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:05.711528429Z" +generated: "2021-06-30T20:51:23.96585125Z" diff --git a/stable/home-assistant/6.2.5/Chart.lock b/stable/home-assistant/6.2.5/Chart.lock index e0ef4fd2524..c724357a341 100644 --- a/stable/home-assistant/6.2.5/Chart.lock +++ b/stable/home-assistant/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:07.017356582Z" +generated: "2021-06-30T20:51:25.219516961Z" diff --git a/stable/jackett/6.2.5/Chart.lock b/stable/jackett/6.2.5/Chart.lock index 7eca64f39d6..e44134ba598 100644 --- a/stable/jackett/6.2.5/Chart.lock +++ b/stable/jackett/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:08.284013902Z" +generated: "2021-06-30T20:51:26.47862433Z" diff --git a/stable/jellyfin/6.2.5/Chart.lock b/stable/jellyfin/6.2.5/Chart.lock index 689d8d87cc4..faa1ecf27ce 100644 --- a/stable/jellyfin/6.2.5/Chart.lock +++ b/stable/jellyfin/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:09.625561987Z" +generated: "2021-06-30T20:51:27.831121705Z" diff --git a/stable/kms/6.2.5/Chart.lock b/stable/kms/6.2.5/Chart.lock index f39413fc6f3..8ccc7b5988b 100644 --- a/stable/kms/6.2.5/Chart.lock +++ b/stable/kms/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:10.955630288Z" +generated: "2021-06-30T20:51:29.108352369Z" diff --git a/stable/lidarr/6.2.5/Chart.lock b/stable/lidarr/6.2.5/Chart.lock index aa24b0ebef1..05b191d3277 100644 --- a/stable/lidarr/6.2.5/Chart.lock +++ b/stable/lidarr/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:12.376333151Z" +generated: "2021-06-30T20:51:30.431700288Z" diff --git a/stable/ombi/6.2.5/Chart.lock b/stable/ombi/6.2.5/Chart.lock index 4473b7254be..695eedb7190 100644 --- a/stable/ombi/6.2.5/Chart.lock +++ b/stable/ombi/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:13.874868981Z" +generated: "2021-06-30T20:51:31.689947433Z" diff --git a/stable/plex/5.2.5/Chart.lock b/stable/plex/5.2.5/Chart.lock index aae873cd4ae..e5e8fd66a56 100644 --- a/stable/plex/5.2.5/Chart.lock +++ b/stable/plex/5.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:15.242929959Z" +generated: "2021-06-30T20:51:33.044824387Z" diff --git a/stable/radarr/6.2.5/Chart.lock b/stable/radarr/6.2.5/Chart.lock index a047893e959..fc650da7c74 100644 --- a/stable/radarr/6.2.5/Chart.lock +++ b/stable/radarr/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:16.521831005Z" +generated: "2021-06-30T20:51:34.333334847Z" diff --git a/stable/sonarr/6.2.5/Chart.lock b/stable/sonarr/6.2.5/Chart.lock index c868148f1f5..76e49389dc2 100644 --- a/stable/sonarr/6.2.5/Chart.lock +++ b/stable/sonarr/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:17.874268391Z" +generated: "2021-06-30T20:51:35.590992586Z" diff --git a/stable/syncthing/6.2.5/Chart.lock b/stable/syncthing/6.2.5/Chart.lock index 1200dae78f3..d975c15403d 100644 --- a/stable/syncthing/6.2.5/Chart.lock +++ b/stable/syncthing/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:19.188884264Z" +generated: "2021-06-30T20:51:36.881717869Z" diff --git a/stable/tautulli/6.2.5/Chart.lock b/stable/tautulli/6.2.5/Chart.lock index b898a9f457d..172233765ea 100644 --- a/stable/tautulli/6.2.5/Chart.lock +++ b/stable/tautulli/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:20.547830587Z" +generated: "2021-06-30T20:51:38.19099624Z" diff --git a/stable/traefik/6.3.12/CONFIG.md b/stable/traefik/6.3.12/CONFIG.md new file mode 100644 index 00000000000..6d760c18421 --- /dev/null +++ b/stable/traefik/6.3.12/CONFIG.md @@ -0,0 +1,8 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our "Linking Apps Together" guide: +https://truecharts.org/manual/linking/ + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/stable/traefik/6.3.12/Chart.lock b/stable/traefik/6.3.12/Chart.lock new file mode 100644 index 00000000000..4e5682df9f9 --- /dev/null +++ b/stable/traefik/6.3.12/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org/ + version: 6.4.3 +digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 +generated: "2021-06-30T20:51:39.456417906Z" diff --git a/stable/traefik/6.3.12/Chart.yaml b/stable/traefik/6.3.12/Chart.yaml new file mode 100644 index 00000000000..9a30f03d807 --- /dev/null +++ b/stable/traefik/6.3.12/Chart.yaml @@ -0,0 +1,29 @@ +apiVersion: v2 +appVersion: '2.4' +dependencies: +- name: common + repository: https://truecharts.org/ + version: 6.4.3 +deprecated: false +description: A Traefik based Reverse Proxy and Certificate Manager +home: https://github.com/truecharts/apps/tree/master/charts/stable/traefik +icon: https://raw.githubusercontent.com/traefik/traefik/v2.3/docs/content/assets/img/traefik.logo.png +keywords: +- traefik +- ingress +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: truecharts.org +- email: kjeld@schouten-lebbing.nl + name: Ornias1993 + url: truecharts.org +name: traefik +sources: +- https://github.com/traefik/traefik +- https://github.com/traefik/traefik-helm-chart +- https://traefik.io/ +type: application +upstream_version: v9.19.2 +version: 6.3.12 diff --git a/stable/traefik/6.3.12/LICENSE b/stable/traefik/6.3.12/LICENSE new file mode 100644 index 00000000000..907ff83212c --- /dev/null +++ b/stable/traefik/6.3.12/LICENSE @@ -0,0 +1,202 @@ + Apache License + Version 2.0, January 2004 + http://www.apache.org/licenses/ + + TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION + + 1. Definitions. + + "License" shall mean the terms and conditions for use, reproduction, + and distribution as defined by Sections 1 through 9 of this document. + + "Licensor" shall mean the copyright owner or entity authorized by + the copyright owner that is granting the License. + + "Legal Entity" shall mean the union of the acting entity and all + other entities that control, are controlled by, or are under common + control with that entity. For the purposes of this definition, + "control" means (i) the power, direct or indirect, to cause the + direction or management of such entity, whether by contract or + otherwise, or (ii) ownership of fifty percent (50%) or more of the + outstanding shares, or (iii) beneficial ownership of such entity. + + "You" (or "Your") shall mean an individual or Legal Entity + exercising permissions granted by this License. + + "Source" form shall mean the preferred form for making modifications, + including but not limited to software source code, documentation + source, and configuration files. + + "Object" form shall mean any form resulting from mechanical + transformation or translation of a Source form, including but + not limited to compiled object code, generated documentation, + and conversions to other media types. + + "Work" shall mean the work of authorship, whether in Source or + Object form, made available under the License, as indicated by a + copyright notice that is included in or attached to the work + (an example is provided in the Appendix below). + + "Derivative Works" shall mean any work, whether in Source or Object + form, that is based on (or derived from) the Work and for which the + editorial revisions, annotations, elaborations, or other modifications + represent, as a whole, an original work of authorship. For the purposes + of this License, Derivative Works shall not include works that remain + separable from, or merely link (or bind by name) to the interfaces of, + the Work and Derivative Works thereof. + + "Contribution" shall mean any work of authorship, including + the original version of the Work and any modifications or additions + to that Work or Derivative Works thereof, that is intentionally + submitted to Licensor for inclusion in the Work by the copyright owner + or by an individual or Legal Entity authorized to submit on behalf of + the copyright owner. For the purposes of this definition, "submitted" + means any form of electronic, verbal, or written communication sent + to the Licensor or its representatives, including but not limited to + communication on electronic mailing lists, source code control systems, + and issue tracking systems that are managed by, or on behalf of, the + Licensor for the purpose of discussing and improving the Work, but + excluding communication that is conspicuously marked or otherwise + designated in writing by the copyright owner as "Not a Contribution." + + "Contributor" shall mean Licensor and any individual or Legal Entity + on behalf of whom a Contribution has been received by Licensor and + subsequently incorporated within the Work. + + 2. Grant of Copyright License. Subject to the terms and conditions of + this License, each Contributor hereby grants to You a perpetual, + worldwide, non-exclusive, no-charge, royalty-free, irrevocable + copyright license to reproduce, prepare Derivative Works of, + publicly display, publicly perform, sublicense, and distribute the + Work and such Derivative Works in Source or Object form. + + 3. Grant of Patent License. Subject to the terms and conditions of + this License, each Contributor hereby grants to You a perpetual, + worldwide, non-exclusive, no-charge, royalty-free, irrevocable + (except as stated in this section) patent license to make, have made, + use, offer to sell, sell, import, and otherwise transfer the Work, + where such license applies only to those patent claims licensable + by such Contributor that are necessarily infringed by their + Contribution(s) alone or by combination of their Contribution(s) + with the Work to which such Contribution(s) was submitted. If You + institute patent litigation against any entity (including a + cross-claim or counterclaim in a lawsuit) alleging that the Work + or a Contribution incorporated within the Work constitutes direct + or contributory patent infringement, then any patent licenses + granted to You under this License for that Work shall terminate + as of the date such litigation is filed. + + 4. Redistribution. You may reproduce and distribute copies of the + Work or Derivative Works thereof in any medium, with or without + modifications, and in Source or Object form, provided that You + meet the following conditions: + + (a) You must give any other recipients of the Work or + Derivative Works a copy of this License; and + + (b) You must cause any modified files to carry prominent notices + stating that You changed the files; and + + (c) You must retain, in the Source form of any Derivative Works + that You distribute, all copyright, patent, trademark, and + attribution notices from the Source form of the Work, + excluding those notices that do not pertain to any part of + the Derivative Works; and + + (d) If the Work includes a "NOTICE" text file as part of its + distribution, then any Derivative Works that You distribute must + include a readable copy of the attribution notices contained + within such NOTICE file, excluding those notices that do not + pertain to any part of the Derivative Works, in at least one + of the following places: within a NOTICE text file distributed + as part of the Derivative Works; within the Source form or + documentation, if provided along with the Derivative Works; or, + within a display generated by the Derivative Works, if and + wherever such third-party notices normally appear. The contents + of the NOTICE file are for informational purposes only and + do not modify the License. You may add Your own attribution + notices within Derivative Works that You distribute, alongside + or as an addendum to the NOTICE text from the Work, provided + that such additional attribution notices cannot be construed + as modifying the License. + + You may add Your own copyright statement to Your modifications and + may provide additional or different license terms and conditions + for use, reproduction, or distribution of Your modifications, or + for any such Derivative Works as a whole, provided Your use, + reproduction, and distribution of the Work otherwise complies with + the conditions stated in this License. + + 5. Submission of Contributions. Unless You explicitly state otherwise, + any Contribution intentionally submitted for inclusion in the Work + by You to the Licensor shall be under the terms and conditions of + this License, without any additional terms or conditions. + Notwithstanding the above, nothing herein shall supersede or modify + the terms of any separate license agreement you may have executed + with Licensor regarding such Contributions. + + 6. Trademarks. This License does not grant permission to use the trade + names, trademarks, service marks, or product names of the Licensor, + except as required for reasonable and customary use in describing the + origin of the Work and reproducing the content of the NOTICE file. + + 7. Disclaimer of Warranty. Unless required by applicable law or + agreed to in writing, Licensor provides the Work (and each + Contributor provides its Contributions) on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or + implied, including, without limitation, any warranties or conditions + of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A + PARTICULAR PURPOSE. You are solely responsible for determining the + appropriateness of using or redistributing the Work and assume any + risks associated with Your exercise of permissions under this License. + + 8. Limitation of Liability. In no event and under no legal theory, + whether in tort (including negligence), contract, or otherwise, + unless required by applicable law (such as deliberate and grossly + negligent acts) or agreed to in writing, shall any Contributor be + liable to You for damages, including any direct, indirect, special, + incidental, or consequential damages of any character arising as a + result of this License or out of the use or inability to use the + Work (including but not limited to damages for loss of goodwill, + work stoppage, computer failure or malfunction, or any and all + other commercial damages or losses), even if such Contributor + has been advised of the possibility of such damages. + + 9. Accepting Warranty or Additional Liability. While redistributing + the Work or Derivative Works thereof, You may choose to offer, + and charge a fee for, acceptance of support, warranty, indemnity, + or other liability obligations and/or rights consistent with this + License. However, in accepting such obligations, You may act only + on Your own behalf and on Your sole responsibility, not on behalf + of any other Contributor, and only if You agree to indemnify, + defend, and hold each Contributor harmless for any liability + incurred by, or claims asserted against, such Contributor by reason + of your accepting any such warranty or additional liability. + + END OF TERMS AND CONDITIONS + + APPENDIX: How to apply the Apache License to your work. + + To apply the Apache License to your work, attach the following + boilerplate notice, with the fields enclosed by brackets "[]" + replaced with your own identifying information. (Don't include + the brackets!) The text should be enclosed in the appropriate + comment syntax for the file format. We also recommend that a + file or class name and description of purpose be included on the + same "printed page" as the copyright notice for easier + identification within third-party archives. + + Copyright 2020 Containous + Copyright 2020 Traefik Labs + + Licensed under the Apache License, Version 2.0 (the "License"); + you may not use this file except in compliance with the License. + You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + + Unless required by applicable law or agreed to in writing, software + distributed under the License is distributed on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + See the License for the specific language governing permissions and + limitations under the License. diff --git a/stable/traefik/6.3.12/README.md b/stable/traefik/6.3.12/README.md new file mode 100644 index 00000000000..d00a60858d3 --- /dev/null +++ b/stable/traefik/6.3.12/README.md @@ -0,0 +1,55 @@ +# Introduction + +![Version: 6.1.2](https://img.shields.io/badge/Version-6.1.2-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 2.4](https://img.shields.io/badge/AppVersion-2.4-informational?style=flat-square) + +A Traefik based Reverse Proxy and Certificate Manager + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://truecharts.org/ | common | 6.3.4 | + +## Installing the Chart + +To install the chart with the release name `traefik` + +- Open TrueNAS SCALE +- Go to Apps +- Click "Install" for this specific Apps +- Fill out the configuration form + +## Uninstalling the Chart + +To uninstall the `traefik` deployment + +- Open TrueNAS SCALE +- Go to Apps +- Go to "Installed Apps" +- Expand the menu in the top-right corner of this App +- Click "Remove" for this specific Apps + +The command removes all the Kubernetes components associated with the chart **including storage volumes** _(Except hostPath Storage)_ and deletes the release. + +## Support + +- See the [Wiki](https://truecharts.org) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +- Ask a [question](https://github.com/truecharts/apps/discussions) + +---------------------------------------------- +Autogenerated from chart metadata using [helm-docs v1.5.0](https://github.com/norwoodj/helm-docs/releases/v1.5.0) +All Rights Reserved - The TrueCharts Project diff --git a/stable/traefik/6.3.12/app-readme.md b/stable/traefik/6.3.12/app-readme.md new file mode 100644 index 00000000000..753f84f7068 --- /dev/null +++ b/stable/traefik/6.3.12/app-readme.md @@ -0,0 +1,3 @@ +A Traefik based Reverse Proxy and Certificate Manager +This App is supplied by TrueCharts, for more information please visit https://truecharts.org +A Traefik based Reverse Proxy and Certificate Manager diff --git a/stable/traefik/6.3.12/charts/common-6.4.3.tgz b/stable/traefik/6.3.12/charts/common-6.4.3.tgz new file mode 100644 index 0000000000000000000000000000000000000000..68b8b94c6c11b0bdfe043de30abdba8d6b258252 GIT binary patch literal 23367 zcmV)bK&ihUiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0POvJcic9TI110dzy1^$+Sy3?so8p$r=Qh4tC5_F96@3liSI zS@M_VKkMu3>$}_A?EmZQ>-PWG_qI0wva!9sySK5vyRp6Vm-UU!?cKez(un>A5`0m>;s#8z z0-O~UV#B8#OtTppgDD|-IUbEJF_~5uVU*2Aq^MBD%8X#1mm^XjG@8MZpkgH6^MN?P z5k(|Hz&RwaC_@gaDp3(-DM2Y=P^;12?)Lin-pw$xUn0q57)mQ%pgt)#3?EmFf@ZW83UY7vj3_9hgoqs03e05y&3}m zsET9^tbz*4)vqXt|Er9qSw&DfOwh#zPA|hWQLug}QVh$Dzx{2?1B(|Etspl!8p|dQ z=CVDz;dZz+=-2;Z{?B1jq4I$QK>PgPUfX#)x^hf;zI#L9peO>l~-^cVmI zpsqQf6T8Tg1QiMlO5sI<7^M1ZH~`{9%qNG9v@Qzh{0Q0iA7O%HkTE${0$5Ob@+7;N zp_HtF7@}F0mWY6?040G0O{%0sWB>r4Vs&AYQE5gX2brY|d0lX%!5Jw81EAL$gWFF! zzyw~PWD!`rf)3`mnq8oRc2tZ?T%Z`_Sxf~}f${`LupEPp7LHZV_AE^k=T zZ?gg%DPqbsFlXH4GJ`SmEs6>R2?8rIn!qX{s{p1kc$*~&PA}i(F(jfRD6CV_np5Ni z_CtDv5=2lFL=Bz;J7TP$U;w^Mvx1HlT+(lnema&49Rz)$HNWPug=q#qfGUM^h!Z;2 zSS{`MB4Em@xa0uXUshGEYpuFDEQp*ip#G(%$6MZ`6i9*Qn96=I#U;s#8<5}`Cal-_ zhwu6O*Yx!mYz+o@1~2Og%YM-zl9ia2D1IoHLIo6TSvuav7w#E7nCqmiw@15s!Ue*VP)0v4BLOJ(|*)f}|V*F1{{c@`g7 zb8_IBlA`$QdfM@l2XPD__&zJ}Z;*P&nYksukzt;PmvTAKo5~ z!R%(3!?L7WxM=Phh*N;lIWDr4iN-lBFdg4z2+jnP!;>{Nvr9)s+WHZ&7K#nh}Cd{%muKDo76hDUv zu5prp3&aZzVLZbrrQ3j|Z>cy&QwU(M(>Gjwm1PjP4aG7zGil zjH09LI=zNP3=U3S(aNU?DKm>&Lq&=RDnp!&;w&mh1eRCj2&ccIhzw&$;1K3auF%dI zX}vm>y*fl6@~lL|Jd20aTqB($ahgH;VGts@M=5 zRwc=1ATMxMU~&VZ1eScoiScBD3Ob|-l@V-kU)*r{5=~KDQJF969nxyY38KIrHJ z?NCg>G%MMfLWe!U>E%GakW2SZQvOF9pLK*k; z>QY-_QV1sC==fCfrCbx^sVbz@PveY~LS%s%ya5F&vt*7yS|(X`RpkJeC7qR73d(GT zz(3Vgqfo27WV9SIuv{hqpo>8I48;g#$dn{w(|rtr4Y|C$WTJE=lnX|lSg0s**~Bf2 z*?<ARMCXx zkXk)vZC&@(P{26GVq`~m##94w;yWp_3#6tB8v*=7kDRX)rq`f{{tY29?eyFf{HJ>UhD()wC}0=a{3TE-0p07-*p(Y>r)7Ks6N zz_k(6Z(-QsTrWJQpU$b=qB8Xwms9#yNNxJA0NHh_fS)MXe5I%@2LZdJ#xeKc(8iIQ z98ujoWeOt~>1vg!2{qdsoE@G7>^=8}oE@Ij2wqL7<#Tp+A~4{RD%7zu)!AI2-$(SH zQzdFvd6RQUrm~I;^(YY5FI5BNFQwU2zHmK3j^6BX;94j^y_$&SD?t&}ozEpF zSx>BSGC7WEmc*rmD7;zHuyDfmjU2!z=i>&jX^&xYgc5jjilQuy%Q4s#A9GY-Cerxp zjdk&!;2Fv)(kMTHIH?MBHZ4#|=^cZeLG3Y!A->a4SF_AL*45_+8SD!B(`a90w3}>O z@^E(p|H8)mDPIv59_?Z!agX&<2fE~uE?_^6^F_wF&a@?uau?`(jPb3GvHa{AIHQEk z5KK!zEi+gG2xjmDo>enS)Xq0s>-!r!>(pAMb=fGQM1m>@7u>mn37Zt9dqVAa=gscA zQ>&F-tN6}#Be}{rcm@t?g;JG_U`ka;7{}ZfMfF8CBxB6>k702GuFwrA@eC)hkQ(OK zR9*gBf(gC)nbx>jIcJ~EV)&?N~w6zj29h4T!VARQO-H;9pav0ZY&K9M9TI!>pEFM##Y%A zS}rd#l0{h(YTr()oWams=jU_@J744fKc#=19iE&s$I|(`qmy&JI$!PRC$aA3@Hz#M zE}r$)LK=fhMCzG`Q-TUQl-|94&AzgETKi_S)^mc#47$}MWyRMMlWo_qrdo;xcTgI$ zn6;Yww5JGY&KdS4G<)~F27OL@tQ7k?u~<2^Zcs7?r)o2q8SDCTiqn!H7=vu0;i09^ zbB2QTMo4>DY*0`R#bWBo?TwOmoi5JU3SQG*Q*Dn2$vh?{vlyMIF`$;U*BOle0TY-; zs9?QxEX(PFu+%wqUssv(ic!eSCrley&ooKt*tsy{^s+!@*=J?0i{5W(7I6Gavna5@ z(kyD2OS9SsY?WG~>V4N{0mdh_B$fwXn-z207U$QvBvcWc;W$pvH7rmmXC5gan&2z_ z%hijLK`L`d$1mSQg%!!@k{7`wxe<^L*b6h8eeP}jKB z4q{!Ce-!vm7|U>SQ}f`gsL=7jDL6emc>Pk*T94tC66I{yb=4q;(wJ2Qu-zx&mY+%N zD2<0zDb|V!{(#~)byc~v4(YtX>F@%UIMP_H&7VI6*EMk5S^EI$o0N>EB$OkY?Vyc8 zdWq8yo}wfvhcIH>=5#g%526rC4Oh^`cIf&{%4gs$2VUy?I4pYfZ>)e0Q0>hHti7@& z&nziE%}P>Ba9tX*FZCehq<^24gmQop1-?f~y+lB4E=4-=HYzc=+7Qv)m z$!wyiVO|qO0n|DQ{ZwnEHDxD|OheF*B%qA{k@1fE9#|+>Om!N%>}#RA;P3ljBiz^? zt~Vf^G27&Xg((^zHDj@XNeWoQNaT{bKx~IMLiJFfXe=mvle9NvrZ)A1tSPnD(tq~) z)E+J&_(w*jVh5WA3Q+ODM;7gYyvSHo2Q+(!_XkP1IN+$%{x~1L#;6&Rq|_+l;V~+H zh3S?MeE05E?RGI`dV~ssCsgf}{wUf%5lqk_Dv04eGl%~(InrE%*j9~lI#xwOFBTKnY?Sr8pJTQ#iA%N(o(L-ktsf#E2<$mZn9}tVPS>pEc!5 zqt;TYe*R^^G0;|MyK9TK^r48euy;{-Z|XV}RPNpVntt=Ery4zK`%lCiG-x&4#Vq=% z3|qa%yh0C^SI0yf-LCtdDqpWwP5ES8q0RX`S_5d7lba)4tg(qig)^mtyFoQ?PCnOF zo=H|jDnK)5LAWPB9s&_?NDKXhlZ1(7rqiT1Dl)tf$}Ly5D4b&z{ifjm#Pn~H@rlHp zx>-`qkkqEk4Rg8b>R}=0qyMDjyw4`@$rQck)&G9JCW?ws4O;T+;n!k%mpZ14ikRKO z-@l<0afFOG9(V+v0kP?!wW<}YX_aD44n z!YRoLc!|KF3Rx1S`2=4Y0GL%&A{GaEK0IFo@l6V6IHF4ij~u4V#HHj|?5M`X%NLo}(0$yj8qW&H7c!JPs%ZD;gQAY-n=O zX_X|@Iy4}$^^$ElF#jl71JN{7ri80C9H$P0>v=beP~YjqGt?)|K`9FzQWy;RO;!~{22!Kpov@3eEd5m;-D1|oxdGrj)B<-Q zD65Mh-@r*rIV_dZ64w(}x^w_0B`C6t>xgA_p{5S)%3)buF#Sd|tXK@tn@m4nB4rz~ zhUc5wCeMUk!4_*CraH@Fq^3#jAG#1*YNCsH-^Hl-s{p!?--g2&)f5gng{2H;8d54s z?zMrcX=Csf!T6^F6Z8XJKg}&J$OT|FQ8da{Q1b3}1|k)%ML=Nh@Os4%bT zDgF)dkN;rUf8;DX2NMJdoh+9ka$PWFjme@2rgD|6eaZMYJ_~0I91yJ$eNc}yadHGa zlOv96I3mnBn*dnr88Z=+f4|chEA;Wjs{2 zxEL`pnzt%6LUi_2XVktn<>9$RbMDeZW;aJV>Qg;VSXQKFFjdW{9FL|bx{{m1q_`1k zkx8kfiSktQX~bDnQS(PAzgZy_Op_hl>J9?0a>SUifNCT?sLjzOq8aM3b*^`5MZ9(FPbUMHS>fR z->eSgUyhJ)!pI_7BKC>PCD6uTGCFFwqt$_iM04c4EBUH;kYHFMbqG%g0F;sf^S2{J zq7nBu4#5oOIhAp*PNbun7m}w+mU7Af#_>=PFeDk{H6qcF(J-Xbnf*D0obu7?Kx>DZ zhd3XDVB>F_;l}QZa3kDUU+1G;QOZwX3_&1Wj!`xX(F>VFcioFm049pNNV&Y z81ZAdrRR7+IFMD;iSB3MCj_dpf=O}%3KV6t8A@a3f6>AR>wr&Do$n51AVF|0_DxwJ z86E5q&Z?5bj;0yb9CKBPijW7O!KBOpPN}?Oo5oWr)JpEUD?w4ERA&2_}S{ zm45cDCT0zkRWzjpyum4^{Txc;IL?%PEZd@0t5V)x&dy1eB-u4iFFE*xPUAHI<6o}Ma!N%r`H<-PXJ=?Fw=T7zDd_?{abB#@HxwB*E|JmNyd&>Xu zD9`Qf=$nB!sY{BRJflla?J%T+LuLD6(?0~S2tOoLpfpAWGx{s~SHdj}Ig-Eyq?(pI zInP}%GSNdg_-6F!)8O`Y$isvX2spA3CP@H>pQ!kwUq|17H>kK2M{2SNCSn6Y25_aZ zPAdNvONIQKkp>E+!*WA2YY4!+C|v-CPBfbSDoh@rqnH5nZ&z6sJs#BQ1p-;iO`2XX1Rp_))0hhB z^%@!T+;$?Ac}%+S)#dJkPSfQB(2mh4+KSTvGl4h(D|vxaG6BJHMgSDaO>AOTzA9G( zAE~Q)r^(K4_I!hCrg)<=oaWF$wY!cOX1&Xc{bpL;S-~3hY+tw@<_`3bGhCKb=k<}`WitA}Lpooj1QipiR5(e{8}Yd%z58jd|7yN1O$+E+ z|2KEnt@VFrYj5Xi{eO&yt^Z8tS1~(OC?IAr(B=Zw#(*8jouV1~Wup3<(^oY%7jQ%Z*N%phYdF zA~ejq2J`QxY~0p`GqZUdQd~r(8H)qS*y(C7EGi|~Pd%c}qiSeHLTV2u8H}A|wh^fZ z_-SC~u{2c6v6rEYIs_*`WSRdr_iPmElu!V{oStTy;;rZSZq*SEJCSv`iMkpk6neh40*f48-CB`ZM4 z(wBlzOM|Ld;K;FR(xg?Y@z3CgcUn$W*7+@Zgb9&Tqr*C7=~cU-ST9U&KPjV6%IKd+ z8Exu+@=VF{_JF$dzs-$3TmM_%+j`Rf9^;|XTU7tpV8hm4SrGV)r0?%prHSk;>!5!}_aUfrr8yvEv+W#0DQcHg3 zFeo?$TKLs@$WYD6;cDGF*%?;r1VQ_jnCNVYIDaea>-B1wSLmj6G~pwd;G!fB;3j~fHrBq}O|n1m z)71a+dGyHfKU;hD{Xg5A8&CS*qdd(2r|W+w^=Ts!;mv}W+x0=eSC56oX!AZt#SsG-FDE zxl(e-`;PC9byQnMWGi`n-k7Fmr$@8v6X0Df<|Tg@ZKg$OwHXWSa`bQwtgfRFg;D|2 zDo`Z~q5Lq*Z&=+`eI3&ckbE9>8XdAPPJTS}j6l#_plNBPUaX*h*O@W{HU-#s9^S)V ztP1miRnre++Pe004XK4*2tI)A8MsA9DEb3Jn@AWf7qG>C>QOi{z0Y&*N3zwB*MhLX^1X zKhIVAX#U^L?R7i;e`kH?Y5qUT)6oBAdfYqe`zoTi%>k?uMfddo%KTZHHYQ(LI;|YM z9!HP(tm#n_j?4e6r~fc?DC-tFrtr4;hz+#;eZ;aceSO4c>pFeJcXJV|4mQ#CRoUw5 zi@G2OnhVm-&dmpF*Pv{3JD$oR+2wU?8H={pv12ecypD>72XZ=Uq&HBu`5a|E-REer z^z-=~RSTY6j(2&y>%X`la~Wztr~bcZ$N%qcZ#~8TKgy%&|N4ouh3x?IxLUhCpqE|5 zE-1bnwE;Kh`^2&tuDX)6VWTUxm4E`WHahjD=-IEV%=WjpwSP)Ugu1lM z*U7$9aWFqT11#E1VqE2aYE{5T@b4{-e#!jHir{ILisbCm1D^qD01Z+U@#0j!r3=B0jjhWIGy7mR?)xVdg zq5lg<-RS-IS%H7cQUa5cEIz16#zHWQJJ@jur2zs-%k^^GU}|1q9c{U2J||5ObL zkZ1f#8$Kxfc0i>PY4cX|i}`l-qn!jkuqcA{RP_>WsDSEt+sZF5`;6=hS+2s(P6}yUAbecRcCF6XY&lk30n_}Bktile)_1H1hH^qaZGE40cmCCDiFwZf~>YYL?lFL$HWX9`vCg)#&I+g>wZgwha)b+2+5ecVtiKRdw0Zl zgDd;yImy8M+5*cJfg%DyPU{$x%Q{$Jg~)WrIEAZv2MGoJw08FT`qJi*MNflM=Jytk zIY?+S&QYib21k&J35Z=kEmN-M(a9vzz9UfPizHHrhQ@^pZCr5)K(Y&gn$ST4TZp-ZHWgs@4_#DyF zs@MLe;2K?&D5?sil3({jqYue(qoa(?9Ho;;N|urCOB=-X>L3x=w_kH8%{#F*?zpQo zoHuMc%E}Kx693Mjm0`lJ3c%33UE2VnDu?_=6KxBM?Ff>ba_hNo>#UJ(ff8TCbR@FS zFI>L8b)>JblUOiLiL4b|%m(;FgbEV4F}Y+SOR7;{80{m5HC8L9n(f=u_Jwl;e!tGx zj7*+87(Em>mP_pHUN#52r-bBn2R7~{ud#&uI&-a`%;NxTNpom$jw~LzP{5~ z**X}b%?NQP6?FuRdZo0uv`LRnkye%cHncwnP1epTw(pY%4S)Q6BWw-_xpeB9Qk*51ary zvdBYZg}!59R?jrG7$AZBsA!#qoHbQ6pLds$Xdgiws)HTH7?af0GCE`EmW6?01C zEL8?fTl}XU6j&g-E|3$3Zw!vn92MeIeZ%!wGYmNIOGNlhtUAlJr5Vpy@E%NZoTBko zxTSrg42QO!GX$dxoQ}$=^>!FpFFran12MhcuYu>&oaL3V2U$a*h^E;_+OeCx__@TOUw5Oh;-E3<`IW}cOKl+EwDIl+rX2g{&KhASA7F0gk zm8m@brn5zC*5!FNB3>K7FXpu4cFeRx-*+@`El-p^99Eo`RzY`v)Ut^|J`2S z*s%Biw|1WFzejnzwwSzFZz%7v(+x28O}Z2sAN1QNm%TS^f&5Gxq-rajo0>8D&q~%_aV| z(k4qi%ZMbt;Ulj3whvZ#Y6)Iwm3v3MFnhS)2F7NfHG9NZVMBWrtbi1W7HRF#HuR(i zxCM$tPFW@HNo_#X2Lb(VO(uSc>Twn`mt>%~RT7}j$uJcqEh9H8z={r@JI>{p4Zc4+ zI|*2$+sm9b_FT=uzwfDh*B&yVOZr+nMJGkCtoMb2-_gZtUTQm7HWp17+-cM?^nF?; zr=p|!0_fNjG8o2ZnyZ)vb~qdk+^HpaxaS*~JG>$sVD0d5?MQol9TJq}w{XcD!%A&h zaSj<|} zY0>|emIu5;|KHl&wDW)O>~25h|9+Hb;rQP=KlqRJdF%&?23D!VZ{4A~_U^!KpIF^n zcciX&OQ{j7YufdOiT^yGM~m%0-7Y1x_qI-)#_~kCN(RGV)oht0wi(PSzqF#XnNYVz z1#4!75lCTSbr-9l(Pf@5>&_u(YXI)ZFo{m*Q&uS4V0UvP8A5j&gl0`E6M`(wPDu^__uErdx3;n|WYYJU&dLD^`_1R8Y}=ia@fRP4S{EqbZ_%Vy;8iTHmdV-s$+jN>+%Bc4D{% zhe=fuRJ=L~R>2C}0ahPZg_n@$nNS6r-4V%8yuA8p=pt63+gp^zHMK$^Ge~=#!T29A zfoX(_KqrNbE>X%kJhX}upZU(9%vHQi`I2Yl&k8u1;D|>m@siF@=BX5a@7C?zV$4khAq- z?96Vjj%FAukU=tiW$tYbE!TXghuQOFGiC^WSijVB8QIsQDQvE-Cu1M1bpy<^^X2?{ zc6g%giq$(6XNM;P*Ji1;m(jUT)&{}AQCFx}VF!O!>b#~>)T-@8aXXq^337c$adlNS zQohof(A;-yF=aiuO8r_vYZA_F@H<{pKw!CroB{UBMzHeP~E}`}P$>*mqsM!Vxcg?+Vuy z*TG7HQWI8dMrpo`F{@b;NZBh*(tibCmH!I<8mMD@+)rtXt%dG>QLCfT;I>;|SPlKk z7qLWq=KEea;ZK*nEa_>;{{&x*B28$OUKhI6pw(3itEQK6G2RA@K;DSD zHIAGFE}yD!eKp*MbV$NE#0k$X^c<{$fE1N*72oOZ(dTydgS!NVap!~SWFtwb0>(&E zhLJE(+^u59Z}d-e!&{}DLi`9WcDGR)nVV)5;uX4SgIM4>B&aXQ+uz4Qg{S91o{sf@ z8R;K806GBh1V@mtFp5YdQ$?}g;Irhk zw&B%dJ#*~(tx$*ZRz1`?*_3IbkeEbt?zITFC!O+3e%$)s6jB9H+wgx#|Nr{#=8oB)D5tPMF@RB#Y018Q5>y{4*I99uWH1iP9Ekw_B1;lsbr&#= z50ZQekExe=20zB6#(p4Cfn0691H^?&rq*uNh83um*xV!1jcw_T|BX z&HoHyvTgnw30m(V06O>o8u$P1?QLv6&Hu-E*!(|8lI$A%v${aSg(mL(&UmO`jMC6M z^_^LKuWC^GmXr*a2oLp28s1RimorrZWW_C7iZ9UiFkzk-SzchOywq+%w#8=OUa(NB z^xVXCqj-31AVdyMFGDJj_)Q|Ff4fApIVujbSZEcYlKcddE$+YpSBwW>35Oe-Mic3h_%wiOn69v zga>&p<@={k1DNMl#PeKBK;Nw5JC4+ZGlMC-MDg%~@4ToJR;P6W-=>&76)m_AXB%u7 zI_c}U_FlWMvRRiMTudWmwoGn}JxSL;^3x{&`Otar^IzNBn~nRww)Xa(yU8p6XMWWc|vi}&MCnKieObDP-Zj43^*>;c{fflN@5;nnBW;E zD5iEDnc@lOJ~}?7WpR4Rvfr+TgI5z!@D+dq5!r4_F&fxAOu#ix5^5q=C8e_j zkP$DaZ67jqkdQWP($=^l$MtT!3%(T>fh}pQHNZ8;Tce0I=49)-#~nWgAgkN;y!Z^V ztyI=`1ZKGRwRlj~_aZRXPz|gIP(g{iOap;gNlRD#Rpa=2--uFWBJw%NtM!|SK+HsK zh*NnebVoY8*)SJ#hL>X6S%+{GdamUw&>E^q9PxLpnHDHdV1z*Me*+M_4;Gg%vQ@TN z7b@#P6tO(zB%`hCXh~_*Iksl6=C(BphWt>l(R(WGdS?jXst;;vCKYK6U3EZG{1Nm8 z@lvYVOOinUxp zM~%<7=J7^9V2EZ}S|Sfz_VpAk47MbYph=Z5z%IzAqJRtbuqBk900`zV!7;FLu6$Ll z20n^hQu$A5=(Oqo@&Nb)`+wGVoBIFG-jo05Q647U-k{==uMh-+7@9vyv+JEENKvq0b1o_2q4`2*7ErRh6i4R9VSpnACb7uW6^jn$fn$b?sSI z62=dzBV8AmAe$;3odHTk28AG~gRCVr2Bt4Y{b8rAyZ>pgdH>Va_S62~ zqdd3#Mu)R00yBuy`f?L#iN!!Ab5WYjHzPG*?Tw;(nWf+kB{UJI4?5hG`uPzyKg4}0 z#+5c>raH^5d|DtZP@a{TWW|kUxi`GMW*q`AS4{^ndw)_TiIyyA_#ZD*SsG{WLi=Cvy>%VkivJlaa@LMd@N z+jx1Wj0Fak1W!voK?E54_scMn>7(|r{^s~>0HZ=uFZt!B7Tl{ zGpncWVH9BOix`d8^~25n`nJes{V1R%%{yiU)Q^%iHDg}5sM3f+>HIY=iA4~5)jWPG zOLNmq{o=?Sq#MN@T(lrq7g{z4vam3M6Yc^la}?pp4MRBMASPKsyB!x0GZQJCSxF4?lHyOUC=)`IYrSb@=nS`9+)3n8m5vSNiB)nEGB6SMx+du!MG7 zHUTr3tHg=`YW_wUpKSGrIb`)NM}&I_(ul;Gbj3pZ2=N3tUXIgVMt+lZkvr|LSFKVlSiLukX#qIW1V_J9z zqKoVTbx=L}W&pU|%C9LsD=Kt+a0*x&Rd9(?R6v4a@ZHHffYV9F8%aybj#8;*+3Xtt zc~9A`NFN|R%48G)+d`ohoq3p*BB&Dqv7-951~s64zzjhBRg)A}(MWo$I_SAoY5_&1 z#j@(zIOT z6C=auwcuqB?@X0tAL*eV8?lDtS3(?ADHb3Sx z8d`oqS3-B)o_441^JD@vQviZyootAkV2-5$|~I;i7&D9y)?P z(AuK{r7*B>z_;duwLk^(Ei+=H2zA+_jV8n$A8W*{*{ibND!_X+VvY@4g4`yX8M~ z#ysTt@2#!9hWy{%dAk4YQ64V;Ss#lm$kg^vvP&HGllsC}H++D*o^6=&o{7LnEM#NU z7a*sa;@IwW(TX{w81q#L8wvEjc9{_nZNe$wR-$Ubp;N>=J z1Bvp}EV^oMg`1^~mNE51kfjX+IuhH-lMtAL6(&b0fj6fp%F?(rSVgBw=qLo*NtfWM z!d4aNY+9glnk8`)wq2qpV1j2TtB99m^LtOAIVv#ouexCxpWP69D&y`yKlk$c*`H4R zPv73VqZZg@|L^Wv`9C%{)_0%m|3`V4iOR24ZSw&5Geh`xiEVTLIi0y5*1&U2(9Cy@ zudZ^;D4-L%Y>fA719ZeB1cS9|yA063K`_lqRw<|h0RwiCFvDxa{yQ-3i((Rr=h%_H zE6d8)5L!St?-ek~XNnF3CzZ366zL$?9lp%WSMPX?Q(c5XtfQkCpG;AyQC(ISbtUm* zYy|pw0!lO(1%mMpX>ucXuKBMHC|-w&-j)5%l4uaEaW;>Pkh6Jxb?})Kc1~u_BNBQU zNzy~Z_sKPEh?58X{wwmj3cy0IPWUa}v3i2oKq+Dti zbT@e!WU2ZdP3?lsmT=V8mT z@;V=U6JEfp!8ak9(Z90-Uk<+ce+SRNkFda5Rf1PXFUvug7ul~UB7+de2#$F1BKvg^ z&dVr^(dhReCB*!H`|{xE&C75WKLn2U`M1YZ=exaj~+%ML}+PS}INw^b_kt$7s|fO1w;h#dhg2ZL|E`97PW z9A2XFH{XE&l(;W3nN}BJl+8w@s1Ofq8Noa+N2EY#G=n8U#fWq0?}Nd!XW$LQG8A<% z_z1*J4=-m_7x@U@6$$t__y~r>;Sliu$v@cp8VmRc*nbS@Tdu^-P)dod(|C=+`QP_9 z!j0W^xXs-wf1uXZ-F*9{%(Zod5ibqvVg8 z6S-eme=&9=M;4H|?Eqg|NC+TEB9HuV@D0t!ibPgv`SO;}XvLHVvkMJaZxVop+=#|UAHik4InuWj1-*O*xcIO=v`F?wHP#<9iH??Zp3EZxgDf2 z%*ElGSFM!H`z#_>9g%vTdu=p?4LtKa4HsOmWHo++-nTe08 z6=jx=MCoCa;C=ub3n|;4bJye=Um3>Pb=rpmvV4{IDs72j<1z;r#|@q8_~qIAgQGXE zj@`s|fwOh3)Bibr|K^9IcduVM;WcH1V5GD3H7?L)1&jE;-ERZ(4S=f`B_z{qhDNGJ zFL;gq-w4;k&GpUo^%t9a8U%Sh%Qu~iOOITVsfs)w<*wdA_v%>}e%-q0nb|I_c~WPr zRORbqovtN-oxiLLI}Sm5*6bExDRV(Mc_K3S_^Z}Ac06S!_yb!hPEaw!Whr>-B(jmg z*Rv?;Ckvfa>jz(bB3P;5YFQIk!}x$MptJYY(EI4)ZL0Vk74Q41+5MF2PUY7+nd>am zXE+##K|RFi+aFvb31JkWvV4=-fZrk*|5RXten=zD-gQ9e>Rv~cI>^TC9R9f#TZwn z*f_&_9VG|Dg`UAdMY1}J7`sfIXTF{x0%J%Zs7gxv&r_7lhH(~^V7?LV=-X!6?oyf+ z*I5?-I#Q)a;*yne#H+1-rp;m%|67uBq|R8sr@zC?Y&kgE_kXuGx7O|b-<{2!r~J>4 z@`&ILwF``AOtP)8D64=D1Dsw4gTem^+BQqs=%Hh~N-+s|U9Egc3Phr5!3yHZ&8Vy} zLBU{kFkq5ESw3f|B&YNn6%AEHz%7Htiihk2`^~m>fy5VnkCGXCHTX0bOabv44&|ye z0xPTr_@)VX6`Uec3?yV|cb|aP)1Ju8=j5qU#k0r&fEh zljCBpq!kIBk;0Pc!~AD1u(^_5m6sMO7I^{Vq#&uiYSNJKk=N8fE*4cg_ZD^+I{ zEO=KR>2Fy^lNH8g5{Vlh)+m2hjjDLUYX5bgezL&URD26@a-3bSprQz07DZO9teRk~ zQ@ORn@C{7y1n~sZI(_ne8GeVzihd`~8VH(`*d*tmEK$KPb3e|=%UMotR+=cynsq+3 zHSnI_L}6D5sg1u9aIIeGD_qB~D+jCL;S?uvfzlNZ0y!nd`x?@p*MAY<#b63n2X;r0 zD72^5etW-YjNn|biLiQ!hv_z<&0zsxL@JmZK>}I!@5YRmPhCzh(#Gjy5D-KE{TjGJ zH}$};0Xir%F*3^b0b~h)R?PPdYDj;rtcEL`_|+x_&6Dj-R{pz!36JGjY4*vQMUOoZ z)L*M&%J&u22gPN14=L>x(G>1I3^ad#xy0VonUIYh|+n;|K4XG-)EEeD4pw~l%Z)f z;8td<8;e{@s-}yaZ<7o*+U6l=Ld))NhnszfmSBzLT`}?&P52*FlI}CHoMti4!_}i5HT1?PS_6TFn-;M!=#76h zYqq(I!W|&{_EDdmG@tt{`F}H z;~7rRdk`rAQ4+Nko!2+Xe1ktQ63ykHL0&_WFF@~FqjLM0Y%l)*oV zt2Z|21p$6Ce|B_Ila{*I8jqtJ9gQ(&n)R)V$3Ffxhq=FUgM(d_HI6;$>3<$Qo$5*+ zHJy&mRxO>@y|a@3GM)F-(QDoF4a~WMc!gFPv$(1B`W5z<>AZ)&uI?7=sj;&-xI*CK zw`@ryZ(#1gBPz-K8@&F{JXP~Awo>n`P3;#Meg`~u3*a61ehp+-I-2^RS`-4{oPdG!Y7KZ{=Y1?($~OSGY0rt>uu;W8~K+5`97 zfAAYqBD9=8RQ+xkTf77t!hH-amtn<0i~&>Y*Bp??AP96#iME)3b?e#u;xVaAoW4AK z`|_;TZ1~q&!IbDpQTedzGX77tI&yCHTp2~Dtm&&n&BzA1s+1UJJysF5gqn2qTuMBP zQY)-4Qd#(X+5(+>_Ht?}4QxpuU{!W1b6K zUkwgfv?McW%q2!&5O~xW#Ue7Avp+=`o$x@d0arouSo1zzCE82UANw!XU##ms46Ui+ z44~auTBBEcF z5MRiWsn>kG6_bhZmi3Zf9pr`MZ=#9e=k;GYDtcBtIf~an1E8SLSmW-9M2vqw5;@5< zL@ka7eyhbkSighfU?Dc%dzyJ~wSvO-x4jn$_fR70BRBeqZ6!B^#xULo=L(5-OlNG5 zYjuaC{)p9)8&PHr7){Y46@bdSC(j?5@Dhk;KVdTE%l;dc!FWLwTI%BwKX2jiAIYO( zW1xjq(feiLL;~77|d?iAC5sNk}U_b8-Xb>3Qe<;Ns}bxgAV@SJ=*l*OKnGe@5e3cCh5th?`Z`_Av%yXrt~JRS19cuz*Q8#`ET_$_ zk#1yE7I<;7kH&_WY?n3FbW%y8(KBb`NrNE{^o1#QFB3K=7*Zb=l`~MpYH#7l&A0cKVTi{dx#@|A~(0UJ!Ef1cgs=)Su(?D1~daBcKkp1i@m9bZ!i{05`BJLBG) zF>p2Z=4&)#peL}>&4nX~W?6cQS`Pjh*IVt!tU{^p%`ZlWR$p(dqRzcp(jY@`&Jy`? zDlYFj^@T0igy^?@-Hj3xg1u$dIF;llMVZGwD$L*sgNQGBzeCgR%-Pk)+sjNiR1{5R zuRx?KQjZ1)9?W2z^)eHUQ+KkX?r1O0+#v~c(Ad%srvw!f7@^xwxB46rg2x!F@?AZp z`N0dzJWdcnD-72faJFi-VaHu*gN_l|KT5>Q&?}pHJ)HNSTl;x>4E=wa75F!5$|vvh zEPf9wl9ds>w>i*p|HJy`-iCeu-_G{#lm7o0&zGYAf3Jq#NfsZdfwyd9pbO2P$ujWp zqMw=2$;hV7(9L`Lr*Jq)#22tcKdQ}H?I^aWPpLGbl0Mzn@TecJ3F2vq+ZZ`x`MjFY zeLG<|eJgXh>5nS_?G60UTGnmuxQ|wOAF6|xx@J2Uq%vNw_xi>e@2bVAsK>#A#F#oc z?+h!LdCkTAG1yphF?tNP+)d-=#3>?l=9G)KP@HVm8VZb2&hx_U3&MphVwIWI^zUys zKGu!ce-W%Mm5+)XCnvW(oP6=8J#N*{MhQH<(Y~)`8gxEcwMdxx%()BZtmD}<;NxXY zwOijFV+8R6jd0?-W7Gzq8?821mVvGw*B*3rf%`{Twe(7lAgO)}@f$=69DS~pxW)Y^ zlbM=Ubz{Nf^78QH-8+I4{2NOmd4h@vr37B0KJvMrMD}6W-(B|!S=ENI)ri|5%Bx@u zcGsIHQME?BL9?v5dEj=nAlcu$OVefyU@!)IzSbRPvkRQ|QxERnIgit7*`aHoodHiP z-~CsFAQ=V(DY>W=|c&3QBkfP zq_GTIc9P^zwB#m@9|-LzY+UWM&u?>LOAWuusdshbil+S$pPQ!k(ZM6`&GId0w*XLSS*zR-=nkCZmkgq>xNyQnAlJj?7!Znh?(W z3?)zAF!u5MK70eN;i9iC425Ul&=L7qjP|gJG1|u+`jOfguEc7+Ch)^dUX8hu!X|_N zELOMZhn^=W1gjTuGs}f~5x25Mlp}gxlz3YuNE+u>CEZ3ZXfglshbGZVfB0)lEPh|p zRRUWxsIJdw&_USZX#V7Ay?Nf3Dl=__vRP$v$tHo2oKL=XE-lh*eilH@XmOIc{S?5b zd-=T^!^RET>;87@v6OImL)HD`SG@|YK+&ePiX!ZM_q}&=J5);UsCNrfjZ}NXv_-oV zweGS|Ig(GX5nJDgwf|zhQ#-haDzOA*lq+5KlGdlbY&~68_Vao)-UAd%!m_cswcT%p zH9Oo-f@7eL0Y&q)ye@Bfz3Z~M)FpE{OG;kg87ywt0yf@PYeidf3tde54$66!2MwE` z@d8FyD286R_gjmfkQ1QTA;weFvLeX89{j=An50y3& z#b>Wi<*Ro8l{Xq}k;IZM+JM)8b@uwS)njy0WOE$fDI@niR%Mc?HJSdg@37xmE0&6D z`~1(Lqqb)eWE>GsA43!HWBm>U&Lo;{dUTc_XLVN3FOKD(hiM*8@iL#s2erTuJ?|Kz zzHIfpNI$>R19yO)?OkM!ebV*rr|Y#W?sVC>habgAJ(08pw~?eg%~8~?CUP(>9s`n; zba3h51aQ*<(g9|1UyF{IqVgtUu=OXkuD0c2@aRyDrq#2#&Fj&Yf#EL6S?@^3GMz8| z#@f@_uP^p7;y-d!%y3!K?tcGkcCoBDkdF9|-QCR{EB<45XMOJ}{^K#8FD3rtq#kvZ}*bpy+8R`O+D2>nq+;aEd*+p$yFV8Ig@9d)0EdB|T zshxUmVdF!~FZvpngf8RE_si4K^(xQO639G{J?nItIgTnS)7AcH0pd!e54uJ0$rkO8 z$Sm(?fwCTR1}pqo?2=!z3!hE$eU@Dbd*r{f3(FQ6!ir==ZRu~_=cN;F5!*zg>VBtP z{D8V$f34Dqr>rXv(%8xgyxd#t1seY?$ud63nh$?$$#QoYaW|RNCRv_E)GxIhK<}K8)I|ybm?)AJnG7T!Dq8zI1yY>e=_v({CUy4BQDXeW;L`Mqm zj#kv4>Xc`QEQ8hX6u}~@b9;8BJzWS(pM9 zclTmCf%d($-LEFO;oMV8I?QG>n8sbFfopZ9rw+1+?y-Q*vAC|Wn2xcCZqZ+-SVWgt zK!;ddcUV+s=&LK-<4Cwyu@)oKuUHFLfY#h^vqEayLeTq^?5?yU0(q-8KDxl^sGQPO zdKj^_dYWCQVE7j7?7kT9?7jekq5n#oU+B2|mwmai=lHaQ095%p(FiEoOlLF6if-cd^GJ**^D=IG*Gk|ywQh!nWG#UAA`CXA!`Lek- z;b8Z7cXuC)MZ3GZ9u~1LcW2StDm^IQm8e)YlL`rV|8IZ$+heflZ-4unXC$dFOJLJM z8b8peYGatM&LfXR%1HM}RA27S;*(1ppH$c%x73HPD4mBV?_M4Gc*wqg_v+~P$FV09 z`teQZhcj*?KB`)bT2Z2}0V`Fi4g*#eTi6~InZ>1qdZ^G{=a!aBfIDC0pbAK zu>8s50UWI89T(8bMrV9LJLBn}$8dI!7y-YBpkMgBdK@~4;27->+i7bMb*xo(U(m1wqM8>exVUCqM)+sZ zSo3+*GqPAsDWc7&z__ay6ZF5|o-SF~7<8Q;9=v`zq)7av;SWPmXBg2} zL!UHa!&1rRhaq^_Lg*TQ7Ml_J$ZvDyBfiLjd?cQ-U^vznwrQC%-8Nc7^Y0L=iE4> z3bXrW$Z6fgh9xAR($`L~-?E*5=e*Ow%EXp_YM*A^A7j>;n_Jo#xZgB9O3RZh!O_i^ zG6_4TVQ`pKB|*ivxUj5VDo|3+l6y{`UO4VI?+q04Ow_S;&FUMNRxr_gicV~??7{ux zEOp`%@1MlMA66WwF>pU&a1h6sk_MAQwH1C}_hU=+p+M0pA5IA*IO^DBfDXD<*sSD~ z^piCS7*li2ETjpjn-tD)q~}U$5OCf~fGMHiR2tHjK_Ybqe&Pm)chqe8MR|L)K`8!uJ=jRHn=H(rm%z@F=dc{Tu z_Y!lxwegkQrol zLgOQk{Gb|q6D(^{cAZ|sB0e~I+Iito&lr;ho_lU_D1CA6 zI&H+NuoXf(NRFsB%t2My*9UUZ($x^{0WZ zJ4{LyZHt%kB5n-GZX*2HeSuM(*o}(aT;K!BjD*l9UtlJ9@1(<+xgPvtI)7fH?2o4b zh=BY%DFNPVCS^3ewI0sBiy;5Prng#z1p)4xAsZ0zL2pyac=f=G_)B3VdQL?@$TAMxChEOb4zG9X4T^C!11dEjV%-yH1Y9TI){=EK6yDQEzyWHt+O_Nc~;oi3>9OGogki$~W zhyffdJ1mY9XbJxY(mULdpk&h$+O8(%(wncy^l?B#-Nl3jBNr$lVgKIE3UwrGy4zYN zlSMQ>%MW7^jL0nCXxfA-F9j{aJX>ufUSl#HGMo=e=Vp^mS>lWV3XX7rB0@!ZcZ&qH zKbhmwl?|+!BusValLPa~f%)XXd{_sjan^_Tef!EWcT~_N?~u*WG5A`9y?<@csC&`A zR&KN((#R^ueP~~Atbd2C55|!W6Un_SCh;^3C%wIz%YM0Kg)ihrpx+wIB*}vkyqyk z_+N~H^LV1Z?v0+JUhm&K1_Cv4T7um*x3wG;W?g;Ra8>jhNnMiLgwy6NGfLX7GZT#0 zk5>E2)q-Hu6zx>|&h2Z2@~qWhb@!SsN8F2pxwvZ5r0rG{Cs+NQ?yBB;mkBULw;U6G zX0bt`Rp`E)*4+ZPeN{7MO{Yq~EXLWwX7Z3G!01ml5ZlsCFV>Aahv7{B>^TwEgGgrX`pIM$G}%;oDEz_?e`<2doXve)+Dv|;qG%ce z1tL|EdNh3S#YyWsd6vAgTBC%H0qHrg%Ijtp8-)w_jy&caH|ccLb?(%bEBgC_uZOh{ zNj-%YIs4{c!cK~eWKovfa~1P0U=n`cw0iEfMnV~b;Oy|kih0Zv9AQG=dyb6y#8EDw z?sJ%nVEg{;>|{aVr?9cQi=#VTY(X&4oi2#)-O=5dN$a|?@h@Mlq<#{Y%NCci^L^4x z4x0PRvV%0u2)jjM2@1JanrT=ppm&#T8q7vm!~+PoKIoPy-TLBNns_r1Hah7xAO%Dd zd=-id%EPPb0u?DDs0?u?J)1)RFUx3(m^l(m3CT+pIszU@T6(zkBrZRbxYYWiRcNYh zJXlxgn?zq1Dhour=xxwI^bB*MW2vTfjf+8N(1}i-C-B53VqrdsK$-fbd-J2SFAua9 zO=cuK%?q58$x5Kn_EibejDSg2rE##PF~PIr(z@2odGd+|dUej-pyE|JhY5}av&}95 iUzJ_dEOkHU>3Mpdo~Nhp^Zx|^0RR72-nd2pZ~_1i{MDua literal 0 HcmV?d00001 diff --git a/stable/traefik/6.3.12/crds/ingressroute.yaml b/stable/traefik/6.3.12/crds/ingressroute.yaml new file mode 100644 index 00000000000..9422be3c878 --- /dev/null +++ b/stable/traefik/6.3.12/crds/ingressroute.yaml @@ -0,0 +1,12 @@ +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + name: ingressroutes.traefik.containo.us +spec: + group: traefik.containo.us + version: v1alpha1 + names: + kind: IngressRoute + plural: ingressroutes + singular: ingressroute + scope: Namespaced diff --git a/stable/traefik/6.3.12/crds/ingressroutetcp.yaml b/stable/traefik/6.3.12/crds/ingressroutetcp.yaml new file mode 100644 index 00000000000..b50eb9dcc46 --- /dev/null +++ b/stable/traefik/6.3.12/crds/ingressroutetcp.yaml @@ -0,0 +1,12 @@ +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + name: ingressroutetcps.traefik.containo.us +spec: + group: traefik.containo.us + version: v1alpha1 + names: + kind: IngressRouteTCP + plural: ingressroutetcps + singular: ingressroutetcp + scope: Namespaced diff --git a/stable/traefik/6.3.12/crds/ingressrouteudp.yaml b/stable/traefik/6.3.12/crds/ingressrouteudp.yaml new file mode 100644 index 00000000000..d7c2624b576 --- /dev/null +++ b/stable/traefik/6.3.12/crds/ingressrouteudp.yaml @@ -0,0 +1,13 @@ +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + name: ingressrouteudps.traefik.containo.us + +spec: + group: traefik.containo.us + version: v1alpha1 + names: + kind: IngressRouteUDP + plural: ingressrouteudps + singular: ingressrouteudp + scope: Namespaced diff --git a/stable/traefik/6.3.12/crds/middlewares.yaml b/stable/traefik/6.3.12/crds/middlewares.yaml new file mode 100644 index 00000000000..513b36f5d8a --- /dev/null +++ b/stable/traefik/6.3.12/crds/middlewares.yaml @@ -0,0 +1,12 @@ +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + name: middlewares.traefik.containo.us +spec: + group: traefik.containo.us + version: v1alpha1 + names: + kind: Middleware + plural: middlewares + singular: middleware + scope: Namespaced diff --git a/stable/traefik/6.3.12/crds/serverstransports.yaml b/stable/traefik/6.3.12/crds/serverstransports.yaml new file mode 100644 index 00000000000..689a57f71bd --- /dev/null +++ b/stable/traefik/6.3.12/crds/serverstransports.yaml @@ -0,0 +1,12 @@ +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + name: serverstransports.traefik.containo.us +spec: + group: traefik.containo.us + version: v1alpha1 + names: + kind: ServersTransport + plural: serverstransports + singular: serverstransport + scope: Namespaced diff --git a/stable/traefik/6.3.12/crds/tlsoptions.yaml b/stable/traefik/6.3.12/crds/tlsoptions.yaml new file mode 100644 index 00000000000..a0c2573fb93 --- /dev/null +++ b/stable/traefik/6.3.12/crds/tlsoptions.yaml @@ -0,0 +1,12 @@ +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + name: tlsoptions.traefik.containo.us +spec: + group: traefik.containo.us + version: v1alpha1 + names: + kind: TLSOption + plural: tlsoptions + singular: tlsoption + scope: Namespaced diff --git a/stable/traefik/6.3.12/crds/tlsstores.yaml b/stable/traefik/6.3.12/crds/tlsstores.yaml new file mode 100644 index 00000000000..f9a40052ba6 --- /dev/null +++ b/stable/traefik/6.3.12/crds/tlsstores.yaml @@ -0,0 +1,13 @@ +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + name: tlsstores.traefik.containo.us + +spec: + group: traefik.containo.us + version: v1alpha1 + names: + kind: TLSStore + plural: tlsstores + singular: tlsstore + scope: Namespaced diff --git a/stable/traefik/6.3.12/crds/traefikservices.yaml b/stable/traefik/6.3.12/crds/traefikservices.yaml new file mode 100644 index 00000000000..59fa4839477 --- /dev/null +++ b/stable/traefik/6.3.12/crds/traefikservices.yaml @@ -0,0 +1,12 @@ +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + name: traefikservices.traefik.containo.us +spec: + group: traefik.containo.us + version: v1alpha1 + names: + kind: TraefikService + plural: traefikservices + singular: traefikservice + scope: Namespaced diff --git a/stable/traefik/6.3.12/ix_values.yaml b/stable/traefik/6.3.12/ix_values.yaml new file mode 100644 index 00000000000..b8247bf1ca9 --- /dev/null +++ b/stable/traefik/6.3.12/ix_values.yaml @@ -0,0 +1,329 @@ +# Default values for Traefik +image: + name: traefik + # defaults to appVersion + tag: v2.4 + pullPolicy: IfNotPresent + +# +# Configure the deployment +# +deployment: + enabled: true + # Can be either Deployment or DaemonSet + kind: Deployment + # Number of pods of the deployment (only applies when kind == Deployment) + replicas: 1 + # Additional deployment annotations (e.g. for jaeger-operator sidecar injection) + annotations: {} + # Additional deployment labels (e.g. for filtering deployment by custom labels) + labels: {} + # Additional pod annotations (e.g. for mesh injection or prometheus scraping) + podAnnotations: {} + # Additional Pod labels (e.g. for filtering Pod by custom labels) + podLabels: {} + # Additional containers (e.g. for metric offloading sidecars) + additionalContainers: [] + # https://docs.datadoghq.com/developers/dogstatsd/unix_socket/?tab=host + # - name: socat-proxy + # image: alpine/socat:1.0.5 + # args: ["-s", "-u", "udp-recv:8125", "unix-sendto:/socket/socket"] + # volumeMounts: + # - name: dsdsocket + # mountPath: /socket + # Additional volumes available for use with initContainers and additionalContainers + additionalVolumes: [] + # - name: dsdsocket + # hostPath: + # path: /var/run/statsd-exporter + # Additional initContainers (e.g. for setting file permission as shown below) + initContainers: [] + # The "volume-permissions" init container is required if you run into permission issues. + # Related issue: https://github.com/traefik/traefik/issues/6972 + # - name: volume-permissions + # image: busybox:1.31.1 + # command: ["sh", "-c", "chmod -Rv 600 /data/*"] + # volumeMounts: + # - name: data + # mountPath: /data + # Custom pod DNS policy. Apply if `hostNetwork: true` + # dnsPolicy: ClusterFirstWithHostNet + # Additional imagePullSecrets + imagePullSecrets: [] + # - name: myRegistryKeySecretName + +# Pod disruption budget +podDisruptionBudget: + enabled: false + # maxUnavailable: 1 + # minAvailable: 0 + +# Use ingressClass. Ignored if Traefik version < 2.3 / kubernetes < 1.18.x +ingressClass: + # true is not unit-testable yet, pending https://github.com/rancher/helm-unittest/pull/12 + enabled: false + isDefaultClass: false + # Use to force a networking.k8s.io API Version for certain CI/CD applications. E.g. "v1beta1" + fallbackApiVersion: + +# Activate Pilot integration +pilot: + enabled: false + token: "" + # Toggle Pilot Dashboard + # dashboard: false + +# Enable experimental features +experimental: + plugins: + enabled: false + kubernetesGateway: + enabled: false + appLabelSelector: "traefik" + certificates: [] + # - group: "core" + # kind: "Secret" + # name: "mysecret" + +# Create an IngressRoute for the dashboard +ingressRoute: + dashboard: + enabled: true + # Additional ingressRoute annotations (e.g. for kubernetes.io/ingress.class) + annotations: {} + # Additional ingressRoute labels (e.g. for filtering IngressRoute by custom labels) + labels: {} + +rollingUpdate: + maxUnavailable: 1 + maxSurge: 1 + + +# +# Configure providers +# +providers: + kubernetesCRD: + enabled: true + namespaces: [] + # - "default" + kubernetesIngress: + enabled: true + # labelSelector: environment=production,method=traefik + namespaces: [] + # - "default" + # IP used for Kubernetes Ingress endpoints + publishedService: + enabled: false + # Published Kubernetes Service to copy status from. Format: namespace/servicename + # By default this Traefik service + # pathOverride: "" + +# +# Add volumes to the traefik pod. The volume name will be passed to tpl. +# This can be used to mount a cert pair or a configmap that holds a config.toml file. +# After the volume has been mounted, add the configs into traefik by using the `additionalArguments` list below, eg: +# additionalArguments: +# - "--providers.file.filename=/config/dynamic.toml" +# - "--ping" +# - "--ping.entrypoint=web" +volumes: [] +# - name: public-cert +# mountPath: "/certs" +# type: secret +# - name: '{{ printf "%s-configs" .Release.Name }}' +# mountPath: "/config" +# type: configMap + +# Additional volumeMounts to add to the Traefik container +additionalVolumeMounts: [] + # For instance when using a logshipper for access logs + # - name: traefik-logs + # mountPath: /var/log/traefik + +# Logs +# https://docs.traefik.io/observability/logs/ +logs: + # Traefik logs concern everything that happens to Traefik itself (startup, configuration, events, shutdown, and so on). + general: + # By default, the logs use a text format (common), but you can + # also ask for the json format in the format option + # format: json + # By default, the level is set to ERROR. Alternative logging levels are DEBUG, PANIC, FATAL, ERROR, WARN, and INFO. + level: INFO + access: + # To enable access logs + enabled: false + # By default, logs are written using the Common Log Format (CLF). + # To write logs in JSON, use json in the format option. + # If the given format is unsupported, the default (CLF) is used instead. + # format: json + # To write the logs in an asynchronous fashion, specify a bufferingSize option. + # This option represents the number of log lines Traefik will keep in memory before writing + # them to the selected output. In some cases, this option can greatly help performances. + # bufferingSize: 100 + # Filtering https://docs.traefik.io/observability/access-logs/#filtering + filters: {} + # statuscodes: "200,300-302" + # retryattempts: true + # minduration: 10ms + # Fields + # https://docs.traefik.io/observability/access-logs/#limiting-the-fieldsincluding-headers + fields: + general: + defaultmode: keep + names: {} + # Examples: + # ClientUsername: drop + headers: + defaultmode: drop + names: {} + # Examples: + # User-Agent: redact + # Authorization: drop + # Content-Type: keep + +globalArguments: + - "--global.checknewversion" + +# +# Configure Traefik static configuration +# Additional arguments to be passed at Traefik's binary +# All available options available on https://docs.traefik.io/reference/static-configuration/cli/ +## Use curly braces to pass values: `helm install --set="additionalArguments={--providers.kubernetesingress.ingressclass=traefik-internal,--log.level=DEBUG}"` +additionalArguments: + - "--metrics.prometheus" + - "--ping" + - "--serverstransport.insecureskipverify=true" + +# Environment variables to be passed to Traefik's binary +env: [] +# - name: SOME_VAR +# value: some-var-value +# - name: SOME_VAR_FROM_CONFIG_MAP +# valueFrom: +# configMapRef: +# name: configmap-name +# key: config-key +# - name: SOME_SECRET +# valueFrom: +# secretKeyRef: +# name: secret-name +# key: secret-key + +envFrom: [] + +# TLS Options are created as TLSOption CRDs +# https://doc.traefik.io/traefik/https/tls/#tls-options +# Example: +tlsOptions: + default: + sniStrict: false + minVersion: VersionTLS12 + curvePreferences: + - CurveP521 + - CurveP384 + cipherSuites: + - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 + - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 + - TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 + - TLS_AES_128_GCM_SHA256 + - TLS_AES_256_GCM_SHA384 + - TLS_CHACHA20_POLY1305_SHA256 + +# Options for the main traefik service, where the entrypoints traffic comes +# from. +service: + enabled: true + type: LoadBalancer + # Additional annotations (e.g. for cloud provider specific config) + annotations: {} + # Additional service labels (e.g. for filtering Service by custom labels) + labels: {} + # Additional entries here will be added to the service spec. Cannot contains + # type, selector or ports entries. + spec: {} + # externalTrafficPolicy: Cluster + # loadBalancerIP: "1.2.3.4" + # clusterIP: "2.3.4.5" + loadBalancerSourceRanges: [] + # - 192.168.0.1/32 + # - 172.16.0.0/16 + externalIPs: [] + # - 1.2.3.4 + +## Create HorizontalPodAutoscaler object. +## +autoscaling: + enabled: false +# minReplicas: 1 +# maxReplicas: 10 +# metrics: +# - type: Resource +# resource: +# name: cpu +# targetAverageUtilization: 60 +# - type: Resource +# resource: +# name: memory +# targetAverageUtilization: 60 + +# Enable persistence using Persistent Volume Claims +# ref: http://kubernetes.io/docs/user-guide/persistent-volumes/ +# After the pvc has been mounted, add the configs into traefik by using the `additionalArguments` list below, eg: +# additionalArguments: +# - "--certificatesresolvers.le.acme.storage=/data/acme.json" +# It will persist TLS certificates. +persistence: + enabled: false + name: data + accessMode: ReadWriteOnce + size: 128Mi + path: /data + +# Whether Role Based Access Control objects like roles and rolebindings should be created +rbac: + enabled: true + + # If set to false, installs ClusterRole and ClusterRoleBinding so Traefik can be used across namespaces. + # If set to true, installs namespace-specific Role and RoleBinding and requires provider configuration be set to that same namespace + namespaced: false + +# Enable to create a PodSecurityPolicy and assign it to the Service Account via RoleBinding or ClusterRoleBinding +podSecurityPolicy: + enabled: false + +# The service account the pods will use to interact with the Kubernetes API +serviceAccount: + # If set, an existing service account is used + # If not set, a service account is created automatically using the fullname template + name: "" + +# Additional serviceAccount annotations (e.g. for oidc authentication) +serviceAccountAnnotations: {} + +affinity: {} +# # This example pod anti-affinity forces the scheduler to put traefik pods +# # on nodes where no other traefik pods are scheduled. +# # It should be used when hostNetwork: true to prevent port conflicts +# podAntiAffinity: +# requiredDuringSchedulingIgnoredDuringExecution: +# - labelSelector: +# matchExpressions: +# - key: app +# operator: In +# values: +# - {{ template "traefik.name" . }} +# topologyKey: failure-domain.beta.kubernetes.io/zone +nodeSelector: {} +tolerations: [] + +# Pods can have priority. +# Priority indicates the importance of a Pod relative to other Pods. +priorityClassName: "" + +# Set the container security context +# To run the container with ports below 1024 this will need to be adjust to run as root +securityContext: + capabilities: + drop: [ALL] diff --git a/stable/traefik/6.3.12/questions.yaml b/stable/traefik/6.3.12/questions.yaml new file mode 100644 index 00000000000..fe39b424f9c --- /dev/null +++ b/stable/traefik/6.3.12/questions.yaml @@ -0,0 +1,385 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Advanced" + description: "Advanced Configuration" +portals: + web_portal: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" + path: "/dashboard/" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + + - variable: middlewares + label: "" + group: "Middlewares" + schema: + type: dict + attrs: + - variable: basicAuth + label: "basicAuth" + schema: + type: list + default: [] + items: + - variable: basicAuthEntry + label: "" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + default: "" + - variable: users + label: "Users" + schema: + type: list + default: [] + items: + - variable: usersEntry + label: "" + schema: + type: dict + attrs: + - variable: username + label: "Username" + schema: + type: string + required: true + default: "" + - variable: password + label: "Password" + schema: + type: string + required: true + default: "" + + + - variable: forwardAuth + label: "forwardAuth" + schema: + type: list + default: [] + items: + - variable: basicAuthEntry + label: "" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + default: "" + - variable: address + label: "Address" + schema: + type: string + required: true + default: "" + - variable: trustForwardHeader + label: "trustForwardHeader" + schema: + type: boolean + default: false + - variable: authResponseHeadersRegex + label: "authResponseHeadersRegex" + schema: + type: string + default: "" + - variable: authResponseHeaders + label: "authResponseHeaders" + schema: + type: list + default: [] + items: + - variable: authResponseHeadersEntry + label: "" + schema: + type: string + default: "" + - variable: authRequestHeaders + label: "authRequestHeaders" + schema: + type: list + default: [] + items: + - variable: authRequestHeadersEntry + label: "" + schema: + type: string + default: "" + + - variable: hostNetwork + group: "Networking and Services" + label: "Enable Host Networking" + schema: + type: boolean + default: false + + - variable: ports + label: "(Advanced) Traefik Entrypoints" + group: "Networking and Services" + schema: + type: dict + attrs: + - variable: traefik + label: "traefik internal" + schema: + type: dict + attrs: + - variable: port + label: "Internal Port" + description: "(advanced) Port inside the container network" + schema: + type: int + required: true + hidden: true + default: 9000 + - variable: expose + label: "Expose to Outside" + description: "Port to the outside of all(!) nodes" + schema: + type: boolean + default: true + - variable: exposedPort + label: "Outside Port" + description: "Port on the outside" + schema: + type: int + show_if: [["expose", "=", true]] + default: 9000 + - variable: protocol + label: "Protocol" + description: "TCP or UDP reverse proxying?" + schema: + type: string + default: "TCP" + - variable: web + label: "web" + schema: + type: dict + attrs: + - variable: port + label: "Internal Port" + description: "(advanced) Port inside the container network" + schema: + type: int + required: true + hidden: true + default: 9080 + - variable: expose + label: "Expose to Outside" + description: "Port to the outside of all(!) nodes" + schema: + type: boolean + default: true + - variable: exposedPort + label: "Outside Port" + description: "Port to the outside of all(!) nodes" + schema: + type: int + show_if: [["expose", "=", true]] + required: true + default: 9080 + - variable: protocol + label: "Protocol" + description: "TCP or UDP reverse proxying?" + schema: + type: string + required: true + default: "TCP" + hidden: true + - variable: redirectEnable + label: "Enable Redirect" + schema: + type: boolean + default: true + show_subquestions_if: true + subquestions: + - variable: redirectTo + label: "Target Entrypoint" + description: "Select the Target Entrypoint to redirect to" + schema: + type: string + required: true + default: "websecure" + - variable: websecure + label: "websecure" + schema: + type: dict + attrs: + - variable: port + label: "Internal Port" + description: "(advanced) Port inside the container network" + schema: + type: int + required: true + hidden: true + default: 9443 + - variable: expose + label: "Expose to Outside" + description: "Port to the outside of all(!) nodes" + schema: + type: boolean + default: true + - variable: exposedPort + label: "Outside Port" + description: "Port to the outside of all(!) nodes" + schema: + type: int + show_if: [["expose", "=", true]] + required: true + default: 9443 + - variable: protocol + label: "Protocol" + description: "TCP or UDP reverse proxying?" + schema: + type: string + required: true + default: "TCP" + hidden: true + - variable: tls + label: "tls" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + + - variable: securityContext + group: "Security and Permissions" + label: "Security Context" + schema: + type: dict + attrs: + - variable: privileged + label: "Enable privileged mode for Common-Chart based charts" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: true + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 65532 + - variable: runAsGroup + label: "runAsGroup" + description: The groupID this App of the user running the application" + schema: + type: int + default: 65532 + + + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + type: dict + attrs: + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 65532 + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + + - variable: resources + group: "Resources and Devices" + label: "" + schema: + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + schema: + type: string + default: "2000m" + - variable: memory + label: "Memory RAM" + schema: + type: string + default: "2Gi" + - variable: requests + label: "Advanced Request minimum resources required" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + schema: + type: string + default: "10m" + - variable: memory + label: "Memory RAM" + schema: + type: string + default: "50Mi" diff --git a/stable/traefik/6.3.12/templates/_helpers.tpl b/stable/traefik/6.3.12/templates/_helpers.tpl new file mode 100644 index 00000000000..f7b055fa82e --- /dev/null +++ b/stable/traefik/6.3.12/templates/_helpers.tpl @@ -0,0 +1,62 @@ +{{/* vim: set filetype=mustache: */}} + +{{/* +Expand the name of the chart. +*/}} +{{- define "traefik.name" -}} +{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" -}} +{{- end -}} + +{{/* +Create chart name and version as used by the chart label. +*/}} +{{- define "traefik.chart" -}} +{{- printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" -}} +{{- end -}} + +{{/* +Create a default fully qualified app name. +We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec). +If release name contains chart name it will be used as a full name. +*/}} +{{- define "traefik.fullname" -}} +{{- if .Values.fullnameOverride -}} +{{- .Values.fullnameOverride | trunc 63 | trimSuffix "-" -}} +{{- else -}} +{{- $name := default .Chart.Name .Values.nameOverride -}} +{{- if contains $name .Release.Name -}} +{{- .Release.Name | trunc 63 | trimSuffix "-" -}} +{{- else -}} +{{- printf "%s-%s" .Release.Name $name | trunc 63 | trimSuffix "-" -}} +{{- end -}} +{{- end -}} +{{- end -}} + +{{/* +The name of the service account to use +*/}} +{{- define "traefik.serviceAccountName" -}} +{{- default (include "traefik.fullname" .) .Values.serviceAccount.name -}} +{{- end -}} + +{{/* +Construct the path for the providers.kubernetesingress.ingressendpoint.publishedservice. +By convention this will simply use the / to match the name of the +service generated. +Users can provide an override for an explicit service they want bound via `.Values.providers.kubernetesIngress.publishedService.pathOverride` +*/}} +{{- define "providers.kubernetesIngress.publishedServicePath" -}} +{{- $defServiceName := printf "%s/%s" .Release.Namespace (include "traefik.fullname" .) -}} +{{- $servicePath := default $defServiceName .Values.providers.kubernetesIngress.publishedService.pathOverride }} +{{- print $servicePath | trimSuffix "-" -}} +{{- end -}} + +{{/* +Construct a comma-separated list of whitelisted namespaces +*/}} +{{- define "providers.kubernetesIngress.namespaces" -}} +{{- default .Release.Namespace (join "," .Values.providers.kubernetesIngress.namespaces) }} +{{- end -}} +{{- define "providers.kubernetesCRD.namespaces" -}} +{{- default .Release.Namespace (join "," .Values.providers.kubernetesCRD.namespaces) }} +{{- end -}} diff --git a/stable/traefik/6.3.12/templates/_podtemplate.tpl b/stable/traefik/6.3.12/templates/_podtemplate.tpl new file mode 100644 index 00000000000..9e8fe8aca34 --- /dev/null +++ b/stable/traefik/6.3.12/templates/_podtemplate.tpl @@ -0,0 +1,265 @@ +{{- define "traefik.podTemplate" }} + metadata: + annotations: + {{- with .Values.deployment.podAnnotations }} + {{- toYaml . | nindent 8 }} + {{- end }} + labels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + helm.sh/chart: {{ template "traefik.chart" . }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/instance: {{ .Release.Name }} + {{- with .Values.deployment.podLabels }} + {{- toYaml . | nindent 8 }} + {{- end }} + spec: + {{- with .Values.deployment.imagePullSecrets }} + imagePullSecrets: + {{- toYaml . | nindent 8 }} + {{- end }} + serviceAccountName: {{ include "traefik.serviceAccountName" . }} + terminationGracePeriodSeconds: 60 + hostNetwork: {{ .Values.hostNetwork }} + {{- with .Values.deployment.dnsPolicy }} + dnsPolicy: {{ . }} + {{- end }} + {{- with .Values.deployment.initContainers }} + initContainers: + {{- toYaml . | nindent 6 }} + {{- end }} + containers: + - image: "{{ .Values.image.name }}:{{ default .Chart.AppVersion .Values.image.tag }}" + imagePullPolicy: {{ .Values.image.pullPolicy }} + name: {{ template "traefik.fullname" . }} + resources: + {{- with .Values.resources }} + {{- toYaml . | nindent 10 }} + {{- end }} + readinessProbe: + httpGet: + path: /ping + port: {{ default .Values.ports.traefik.port .Values.ports.traefik.healthchecksPort }} + failureThreshold: 1 + initialDelaySeconds: 10 + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 2 + livenessProbe: + httpGet: + path: /ping + port: {{ default .Values.ports.traefik.port .Values.ports.traefik.healthchecksPort }} + failureThreshold: 3 + initialDelaySeconds: 10 + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 2 + ports: + {{- range $name, $config := .Values.ports }} + {{- if $config }} + - name: {{ $name | quote }} + containerPort: {{ $config.port }} + {{- if $config.hostPort }} + hostPort: {{ $config.hostPort }} + {{- end }} + {{- if $config.hostIP }} + hostIP: {{ $config.hostIP }} + {{- end }} + protocol: {{ default "TCP" $config.protocol | quote }} + {{- end }} + {{- end }} + {{- with .Values.securityContext }} + securityContext: + {{- toYaml . | nindent 10 }} + {{- end }} + volumeMounts: + - name: {{ .Values.persistence.name }} + mountPath: {{ .Values.persistence.path }} + {{- if .Values.persistence.subPath }} + subPath: {{ .Values.persistence.subPath }} + {{- end }} + - name: tmp + mountPath: /tmp + {{- $root := . }} + {{- range .Values.volumes }} + - name: {{ tpl (.name) $root }} + mountPath: {{ .mountPath }} + readOnly: true + {{- end }} + {{- if .Values.experimental.plugins.enabled }} + - name: plugins + mountPath: "/plugins-storage" + {{- end }} + {{- if .Values.additionalVolumeMounts }} + {{- toYaml .Values.additionalVolumeMounts | nindent 10 }} + {{- end }} + args: + {{- with .Values.globalArguments }} + {{- range . }} + - {{ . | quote }} + {{- end }} + {{- end }} + {{- range $name, $config := .Values.ports }} + {{- if $config }} + - "--entryPoints.{{$name}}.address=:{{ $config.port }}/{{ default "tcp" $config.protocol | lower }}" + {{- end }} + {{- end }} + - "--api.dashboard=true" + - "--ping=true" + {{- if .Values.providers.kubernetesCRD.enabled }} + - "--providers.kubernetescrd" + {{- end }} + {{- if .Values.providers.kubernetesIngress.enabled }} + - "--providers.kubernetesingress" + {{- if and .Values.service.enabled .Values.providers.kubernetesIngress.publishedService.enabled }} + - "--providers.kubernetesingress.ingressendpoint.publishedservice={{ template "providers.kubernetesIngress.publishedServicePath" . }}" + {{- end }} + {{- if .Values.providers.kubernetesIngress.labelSelector }} + - "--providers.kubernetesingress.labelSelector={{ .Values.providers.kubernetesIngress.labelSelector }}" + {{- end }} + {{- end }} + {{- if .Values.experimental.kubernetesGateway.enabled }} + - "--providers.kubernetesgateway" + - "--experimental.kubernetesgateway" + {{- end }} + {{- if and .Values.rbac.enabled .Values.rbac.namespaced }} + {{- if .Values.providers.kubernetesCRD.enabled }} + - "--providers.kubernetescrd.namespaces={{ template "providers.kubernetesCRD.namespaces" . }}" + {{- end }} + {{- if .Values.providers.kubernetesIngress.enabled }} + - "--providers.kubernetesingress.namespaces={{ template "providers.kubernetesIngress.namespaces" . }}" + {{- end }} + {{- end }} + {{- range $entrypoint, $config := $.Values.ports }} + {{- if $config.redirectTo }} + {{- $toPort := index $.Values.ports $config.redirectTo }} + - "--entrypoints.{{ $entrypoint }}.http.redirections.entryPoint.to=:{{ $toPort.exposedPort }}" + - "--entrypoints.{{ $entrypoint }}.http.redirections.entryPoint.scheme=https" + {{- end }} + {{- if $config.tls }} + {{- if $config.tls.enabled }} + - "--entrypoints.{{ $entrypoint }}.http.tls=true" + {{- if $config.tls.options }} + - "--entrypoints.{{ $entrypoint }}.http.tls.options={{ $config.tls.options }}" + {{- end }} + {{- if $config.tls.certResolver }} + - "--entrypoints.{{ $entrypoint }}.http.tls.certResolver={{ $config.tls.certResolver }}" + {{- end }} + {{- if $config.tls.domains }} + {{- range $index, $domain := $config.tls.domains }} + {{- if $domain.main }} + - "--entrypoints.{{ $entrypoint }}.http.tls.domains[{{ $index }}].main={{ $domain.main }}" + {{- end }} + {{- if $domain.sans }} + - "--entrypoints.{{ $entrypoint }}.http.tls.domains[{{ $index }}].sans={{ join "," $domain.sans }}" + {{- end }} + {{- end }} + {{- end }} + {{- end }} + {{- end }} + {{- end }} + {{- with .Values.logs }} + {{- if .general.format }} + - "--log.format={{ .general.format }}" + {{- end }} + {{- if ne .general.level "ERROR" }} + - "--log.level={{ .general.level | upper }}" + {{- end }} + {{- if .access.enabled }} + - "--accesslog=true" + {{- if .access.format }} + - "--accesslog.format={{ .access.format }}" + {{- end }} + {{- if .access.bufferingsize }} + - "--accesslog.bufferingsize={{ .access.bufferingsize }}" + {{- end }} + {{- if .access.filters }} + {{- if .access.filters.statuscodes }} + - "--accesslog.filters.statuscodes={{ .access.filters.statuscodes }}" + {{- end }} + {{- if .access.filters.retryattempts }} + - "--accesslog.filters.retryattempts" + {{- end }} + {{- if .access.filters.minduration }} + - "--accesslog.filters.minduration={{ .access.filters.minduration }}" + {{- end }} + {{- end }} + - "--accesslog.fields.defaultmode={{ .access.fields.general.defaultmode }}" + {{- range $fieldname, $fieldaction := .access.fields.general.names }} + - "--accesslog.fields.names.{{ $fieldname }}={{ $fieldaction }}" + {{- end }} + - "--accesslog.fields.headers.defaultmode={{ .access.fields.headers.defaultmode }}" + {{- range $fieldname, $fieldaction := .access.fields.headers.names }} + - "--accesslog.fields.headers.names.{{ $fieldname }}={{ $fieldaction }}" + {{- end }} + {{- end }} + {{- end }} + {{- if .Values.pilot.enabled }} + - "--pilot.token={{ .Values.pilot.token }}" + {{- end }} + {{- if hasKey .Values.pilot "dashboard" }} + - "--pilot.dashboard={{ .Values.pilot.dashboard }}" + {{- end }} + {{- with .Values.additionalArguments }} + {{- range . }} + - {{ . | quote }} + {{- end }} + {{- end }} + {{- with .Values.env }} + env: + {{- toYaml . | nindent 10 }} + {{- end }} + {{- with .Values.envFrom }} + envFrom: + {{- toYaml . | nindent 10 }} + {{- end }} + {{- if .Values.deployment.additionalContainers }} + {{- toYaml .Values.deployment.additionalContainers | nindent 6 }} + {{- end }} + volumes: + - name: {{ .Values.persistence.name }} + {{- if .Values.persistence.enabled }} + persistentVolumeClaim: + claimName: {{ default (include "traefik.fullname" .) .Values.persistence.existingClaim }} + {{- else }} + emptyDir: {} + {{- end }} + - name: tmp + emptyDir: {} + {{- $root := . }} + {{- range .Values.volumes }} + - name: {{ tpl (.name) $root }} + {{- if eq .type "secret" }} + secret: + secretName: {{ tpl (.name) $root }} + {{- else if eq .type "configMap" }} + configMap: + name: {{ tpl (.name) $root }} + {{- end }} + {{- end }} + {{- if .Values.deployment.additionalVolumes }} + {{- toYaml .Values.deployment.additionalVolumes | nindent 8 }} + {{- end }} + {{- if .Values.experimental.plugins.enabled }} + - name: plugins + emptyDir: {} + {{- end }} + {{- with .Values.affinity }} + affinity: + {{- toYaml . | nindent 8 }} + {{- end }} + {{- with .Values.tolerations }} + tolerations: + {{- toYaml . | nindent 8 }} + {{- end }} + {{- with .Values.nodeSelector }} + nodeSelector: + {{- toYaml . | nindent 8 }} + {{- end }} + {{- if .Values.priorityClassName }} + priorityClassName: {{ .Values.priorityClassName }} + {{- end }} + {{- with .Values.podSecurityContext }} + securityContext: + {{- toYaml . | nindent 8 }} + {{- end }} +{{ end -}} diff --git a/stable/traefik/6.3.12/templates/custom/common.yaml b/stable/traefik/6.3.12/templates/custom/common.yaml new file mode 100644 index 00000000000..e69de29bb2d diff --git a/stable/traefik/6.3.12/templates/custom/middleware-namespace.yaml b/stable/traefik/6.3.12/templates/custom/middleware-namespace.yaml new file mode 100644 index 00000000000..16156ee5e12 --- /dev/null +++ b/stable/traefik/6.3.12/templates/custom/middleware-namespace.yaml @@ -0,0 +1,7 @@ +apiVersion: v1 +kind: Namespace +metadata: + name: traefikmiddlewares + namespace: traefikmiddlewares + annotations: + "helm.sh/hook": pre-install diff --git a/stable/traefik/6.3.12/templates/custom/middlewares/basic-middleware.yaml b/stable/traefik/6.3.12/templates/custom/middlewares/basic-middleware.yaml new file mode 100644 index 00000000000..d81132ed5a1 --- /dev/null +++ b/stable/traefik/6.3.12/templates/custom/middlewares/basic-middleware.yaml @@ -0,0 +1,57 @@ +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: compress + namespace: traefikmiddlewares +spec: + compress: {} +--- +# Here, an average of 300 requests per second is allowed. +# In addition, a burst of 200 requests is allowed. +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: basic-ratelimit + namespace: traefikmiddlewares +spec: + rateLimit: + average: 300 + burst: 200 +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: basic-secure-headers + namespace: traefikmiddlewares +spec: + headers: + accessControlAllowMethods: + - GET + - OPTIONS + - HEAD + - PUT + accessControlMaxAge: 100 + # sslRedirect: true + # stsSeconds: 63072000 + # stsIncludeSubdomains: false + # stsPreload: false + # forceSTSHeader: true + contentTypeNosniff: true + browserXssFilter: true + sslForceHost: true + referrerPolicy: same-origin + customResponseHeaders: + X-Robots-Tag: 'none' + server: '' +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: chain-basic + namespace: traefikmiddlewares +spec: + chain: + middlewares: + - name: basic-ratelimit + - name: basic-secure-headers + - name: compress diff --git a/stable/traefik/6.3.12/templates/custom/middlewares/basicauth.yaml b/stable/traefik/6.3.12/templates/custom/middlewares/basicauth.yaml new file mode 100644 index 00000000000..4e0f326a2f4 --- /dev/null +++ b/stable/traefik/6.3.12/templates/custom/middlewares/basicauth.yaml @@ -0,0 +1,29 @@ +{{ range $index, $middlewareData := .Values.middlewares.basicAuth }} +--- +{{- $users := list }} +{{ range $index, $userdata := $middlewareData.users }} + {{ $users = append $users ( htpasswd $userdata.username $userdata.password ) }} +{{ end }} + +apiVersion: v1 +kind: Secret +metadata: + name: {{printf "%v-%v" $middlewareData.name "secret" }} + namespace: traefikmiddlewares +type: Opaque +stringData: + users: | + {{- range $index, $user := $users }} + {{ printf "%s" $user }} + {{- end }} +--- +# Declaring the user list +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: {{ $middlewareData.name }} + namespace: traefikmiddlewares +spec: + basicAuth: + secret: {{printf "%v-%v" $middlewareData.name "secret" }} +{{ end }} diff --git a/stable/traefik/6.3.12/templates/custom/middlewares/forwardauth.yaml b/stable/traefik/6.3.12/templates/custom/middlewares/forwardauth.yaml new file mode 100644 index 00000000000..bb90d33775e --- /dev/null +++ b/stable/traefik/6.3.12/templates/custom/middlewares/forwardauth.yaml @@ -0,0 +1,23 @@ +{{ range $index, $middlewareData := .Values.middlewares.forwardAuth }} +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: {{ $middlewareData.name }} + namespace: traefikmiddlewares +spec: + forwardAuth: + address: {{ $middlewareData.address }} + {{- if $middlewareData.authResponseHeaders }} + authResponseHeaders: {{ $middlewareData.authResponseHeaders }} + {{- end }} + {{- if $middlewareData.authRequestHeaders }} + authRequestHeaders: {{ $middlewareData.authRequestHeaders }} + {{- end }} + {{- if $middlewareData.authResponseHeadersRegex }} + authResponseHeadersRegex: {{ $middlewareData.authResponseHeadersRegex }} + {{- end }} + {{- if $middlewareData.trustForwardHeader }} + trustForwardHeader: true + {{- end }} +{{ end }} diff --git a/stable/traefik/6.3.12/templates/custom/portal.yaml b/stable/traefik/6.3.12/templates/custom/portal.yaml new file mode 100644 index 00000000000..92e80f287a2 --- /dev/null +++ b/stable/traefik/6.3.12/templates/custom/portal.yaml @@ -0,0 +1,45 @@ +{{- if .Values.portal }} +{{- if .Values.portal.enabled }} +{{- $ingr := dict -}} +{{- $host := "$node_ip" }} +{{- $port := 443 }} +{{- $protocol := "https" }} +{{- $portProtocol := "" }} +{{- $path := "/dashboard/" }} + +{{- if $ingr }} + {{- if $ingr.enabled }} + {{- range $ingr.hosts }} + {{- if .hostTpl }} + {{ $host = ( tpl .hostTpl $ ) }} + {{- else if .host }} + {{ $host = .host }} + {{- else }} + {{ $host = "$node_ip" }} + {{- end }} + {{- if .paths }} + {{- $path = (first .paths).path }} + {{- end }} + {{- end }} + {{- end }} +{{- end }} + +{{- if eq $host "$node_ip" }} + {{- $port = .Values.ports.traefik.exposedPort }} + {{- $protocol = "http" }} +{{- end }} + +--- + +apiVersion: v1 +kind: ConfigMap +metadata: + name: portal +data: + protocol: {{ $protocol }} + host: {{ $host | quote }} + port: {{ $port | quote }} + path: {{ $path | quote }} + url: {{ ( printf "%v://%v:%v%v" $protocol $host $port $path ) | quote }} +{{- end }} +{{- end }} diff --git a/stable/traefik/6.3.12/templates/daemonset.yaml b/stable/traefik/6.3.12/templates/daemonset.yaml new file mode 100644 index 00000000000..469e105c358 --- /dev/null +++ b/stable/traefik/6.3.12/templates/daemonset.yaml @@ -0,0 +1,40 @@ +{{- if and .Values.deployment.enabled (eq .Values.deployment.kind "DaemonSet") -}} + {{- with .Values.additionalArguments -}} + {{- range . -}} + {{- if contains ".acme." . -}} + {{- fail (printf "ACME functionality is not supported when running Traefik as a DaemonSet") -}} + {{- end -}} + {{- end -}} + {{- end -}} + {{- if eq (default .Chart.AppVersion .Values.image.tag) "latest" }} + {{- fail "\n\n ERROR: latest tag should not be used" }} + {{- end }} + +--- +apiVersion: apps/v1 +kind: DaemonSet +metadata: + name: {{ template "traefik.fullname" . }} + labels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + helm.sh/chart: {{ template "traefik.chart" . }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/instance: {{ .Release.Name }} + {{- with .Values.deployment.labels }} + {{- toYaml . | nindent 4 }} + {{- end }} + annotations: + {{- with .Values.deployment.annotations }} + {{- toYaml . | nindent 4 }} + {{- end }} +spec: + selector: + matchLabels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + app.kubernetes.io/instance: {{ .Release.Name }} + updateStrategy: + type: RollingUpdate + rollingUpdate: + maxUnavailable: {{ .Values.rollingUpdate.maxUnavailable }} + template: {{ template "traefik.podTemplate" . }} +{{- end -}} diff --git a/stable/traefik/6.3.12/templates/dashboard-hook-ingressroute.yaml b/stable/traefik/6.3.12/templates/dashboard-hook-ingressroute.yaml new file mode 100644 index 00000000000..ec278c26910 --- /dev/null +++ b/stable/traefik/6.3.12/templates/dashboard-hook-ingressroute.yaml @@ -0,0 +1,28 @@ +{{- if .Values.ingressRoute.dashboard.enabled -}} +apiVersion: traefik.containo.us/v1alpha1 +kind: IngressRoute +metadata: + name: {{ template "traefik.fullname" . }}-dashboard + annotations: + helm.sh/hook: "post-install,post-upgrade" + {{- with .Values.ingressRoute.dashboard.annotations }} + {{- toYaml . | nindent 4 }} + {{- end }} + labels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + helm.sh/chart: {{ template "traefik.chart" . }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/instance: {{ .Release.Name }} + {{- with .Values.ingressRoute.dashboard.labels }} + {{- toYaml . | nindent 4 }} + {{- end }} +spec: + entryPoints: + - traefik + routes: + - match: PathPrefix(`/dashboard`) || PathPrefix(`/api`) + kind: Rule + services: + - name: api@internal + kind: TraefikService +{{- end -}} diff --git a/stable/traefik/6.3.12/templates/deployment.yaml b/stable/traefik/6.3.12/templates/deployment.yaml new file mode 100644 index 00000000000..494087cfd0a --- /dev/null +++ b/stable/traefik/6.3.12/templates/deployment.yaml @@ -0,0 +1,47 @@ +{{- if and .Values.deployment.enabled (eq .Values.deployment.kind "Deployment") -}} + {{- if gt (int .Values.deployment.replicas) 1 -}} + {{- with .Values.additionalArguments -}} + {{- range . -}} + {{- if contains ".acme." . -}} + {{- fail (printf "You can not enable acme if you set more than one traefik replica") -}} + {{- end -}} + {{- end -}} + {{- end -}} + {{- end -}} + {{- if eq (default .Chart.AppVersion .Values.image.tag) "latest" }} + {{- fail "\n\n ERROR: latest tag should not be used" }} + {{- end }} + +--- +apiVersion: apps/v1 +kind: Deployment +metadata: + name: {{ template "traefik.fullname" . }} + labels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + helm.sh/chart: {{ template "traefik.chart" . }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/instance: {{ .Release.Name }} + {{- with .Values.deployment.labels }} + {{- toYaml . | nindent 4 }} + {{- end }} + annotations: + {{- with .Values.deployment.annotations }} + {{- toYaml . | nindent 4 }} + {{- end }} +spec: + {{- if not .Values.autoscaling.enabled }} + replicas: {{ default 1 .Values.deployment.replicas }} + {{- end }} + selector: + matchLabels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + app.kubernetes.io/instance: {{ .Release.Name }} + strategy: + type: RollingUpdate + rollingUpdate: + {{- with .Values.rollingUpdate }} + {{- toYaml . | nindent 6 }} + {{- end }} + template: {{ template "traefik.podTemplate" . }} +{{- end -}} diff --git a/stable/traefik/6.3.12/templates/gateway.yaml b/stable/traefik/6.3.12/templates/gateway.yaml new file mode 100644 index 00000000000..85194211fe5 --- /dev/null +++ b/stable/traefik/6.3.12/templates/gateway.yaml @@ -0,0 +1,33 @@ +{{- if .Values.experimental.kubernetesGateway.enabled }} +--- +apiVersion: networking.x-k8s.io/v1alpha1 +kind: Gateway +metadata: + name: traefik-gateway + namespace: default +spec: + gatewayClassName: traefik + listeners: + - port: {{ .Values.ports.web.port }} + protocol: HTTP + routes: + kind: HTTPRoute + selector: + matchLabels: + app: {{ .Values.experimental.kubernetesGateway.appLabelSelector }} + + {{- range $index, $cert:= .Values.experimental.kubernetesGateway.certificates }} + - port: {{ $.Values.ports.websecure.port }} + protocol: HTTPS + tls: + certificateRef: + name: {{ $cert.name }} + group: {{ $cert.group }} + kind: {{ $cert.kind }} + routes: + kind: HTTPRoute + selector: + matchLabels: + app: {{ $.Values.experimental.kubernetesGateway.appLabelSelector }} + {{- end }} +{{- end }} diff --git a/stable/traefik/6.3.12/templates/gatewayclass.yaml b/stable/traefik/6.3.12/templates/gatewayclass.yaml new file mode 100644 index 00000000000..61bf007db1e --- /dev/null +++ b/stable/traefik/6.3.12/templates/gatewayclass.yaml @@ -0,0 +1,9 @@ +{{- if .Values.experimental.kubernetesGateway.enabled }} +--- +kind: GatewayClass +apiVersion: networking.x-k8s.io/v1alpha1 +metadata: + name: traefik +spec: + controller: traefik.io/gateway-controller +{{- end }} diff --git a/stable/traefik/6.3.12/templates/hpa.yaml b/stable/traefik/6.3.12/templates/hpa.yaml new file mode 100644 index 00000000000..bf37117de6a --- /dev/null +++ b/stable/traefik/6.3.12/templates/hpa.yaml @@ -0,0 +1,20 @@ +{{- if .Values.autoscaling.enabled }} +apiVersion: autoscaling/v2beta1 +kind: HorizontalPodAutoscaler +metadata: + name: {{ template "traefik.fullname" . }} + labels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + helm.sh/chart: {{ template "traefik.chart" . }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/instance: {{ .Release.Name }} +spec: + scaleTargetRef: + apiVersion: apps/v1 + kind: Deployment + name: {{ template "traefik.fullname" . }} + minReplicas: {{ .Values.autoscaling.minReplicas }} + maxReplicas: {{ .Values.autoscaling.maxReplicas }} + metrics: +{{ toYaml .Values.autoscaling.metrics | indent 4 }} +{{- end }} diff --git a/stable/traefik/6.3.12/templates/ingressclass.yaml b/stable/traefik/6.3.12/templates/ingressclass.yaml new file mode 100644 index 00000000000..7c62458c82e --- /dev/null +++ b/stable/traefik/6.3.12/templates/ingressclass.yaml @@ -0,0 +1,23 @@ +{{- if and .Values.ingressClass.enabled (semverCompare ">=2.3.0" (default .Chart.AppVersion .Values.image.tag)) -}} + {{- if .Capabilities.APIVersions.Has "networking.k8s.io/v1/IngressClass" }} +apiVersion: networking.k8s.io/v1 + {{- else if .Capabilities.APIVersions.Has "networking.k8s.io/v1beta1/IngressClass" }} +apiVersion: networking.k8s.io/v1beta1 + {{- else if or (eq .Values.ingressClass.fallbackApiVersion "v1beta1") (eq .Values.ingressClass.fallbackApiVersion "v1") }} +apiVersion: {{ printf "networking.k8s.io/%s" .Values.ingressClass.fallbackApiVersion }} + {{- else }} + {{- fail "\n\n ERROR: You must have atleast networking.k8s.io/v1beta1 to use ingressClass" }} + {{- end }} +kind: IngressClass +metadata: + annotations: + ingressclass.kubernetes.io/is-default-class: {{ .Values.ingressClass.isDefaultClass | quote }} + labels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + helm.sh/chart: {{ template "traefik.chart" . }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/instance: {{ .Release.Name }} + name: {{ template "traefik.fullname" . }} +spec: + controller: traefik.io/ingress-controller +{{- end }} diff --git a/stable/traefik/6.3.12/templates/poddisruptionbudget.yaml b/stable/traefik/6.3.12/templates/poddisruptionbudget.yaml new file mode 100644 index 00000000000..9893e521759 --- /dev/null +++ b/stable/traefik/6.3.12/templates/poddisruptionbudget.yaml @@ -0,0 +1,22 @@ +{{- if .Values.podDisruptionBudget.enabled -}} +apiVersion: policy/v1beta1 +kind: PodDisruptionBudget +metadata: + name: {{ template "traefik.fullname" . }} + labels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + helm.sh/chart: {{ template "traefik.chart" . }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/instance: {{ .Release.Name }} +spec: + selector: + matchLabels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + app.kubernetes.io/instance: {{ .Release.Name }} + {{- if .Values.podDisruptionBudget.minAvailable }} + minAvailable: {{ .Values.podDisruptionBudget.minAvailable | int }} + {{- end }} + {{- if .Values.podDisruptionBudget.maxUnavailable }} + maxUnavailable: {{ .Values.podDisruptionBudget.maxUnavailable | int }} + {{- end }} +{{- end -}} diff --git a/stable/traefik/6.3.12/templates/rbac/clusterrole.yaml b/stable/traefik/6.3.12/templates/rbac/clusterrole.yaml new file mode 100644 index 00000000000..2c63e006414 --- /dev/null +++ b/stable/traefik/6.3.12/templates/rbac/clusterrole.yaml @@ -0,0 +1,112 @@ +{{- if and .Values.rbac.enabled (not .Values.rbac.namespaced) -}} +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: {{ template "traefik.fullname" . }} + labels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + helm.sh/chart: {{ template "traefik.chart" . }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/instance: {{ .Release.Name }} +rules: + - apiGroups: + - "" + resources: + - services + - endpoints + - secrets + verbs: + - get + - list + - watch + - apiGroups: + - extensions + - networking.k8s.io + resources: + - ingresses + - ingressclasses + verbs: + - get + - list + - watch + - apiGroups: + - extensions + - networking.k8s.io + resources: + - ingresses/status + verbs: + - update + - apiGroups: + - traefik.containo.us + resources: + - ingressroutes + - ingressroutetcps + - ingressrouteudps + - middlewares + - tlsoptions + - tlsstores + - traefikservices + - serverstransports + verbs: + - get + - list + - watch +{{- if .Values.podSecurityPolicy.enabled }} + - apiGroups: + - policy + resourceNames: + - {{ template "traefik.fullname" . }} + resources: + - podsecuritypolicies + verbs: + - use +{{- end -}} +{{- if .Values.experimental.kubernetesGateway.enabled }} + - apiGroups: + - networking.x-k8s.io + resources: + - gatewayclasses + - gatewayclasses/status + - gateways + verbs: + - get + - list + - watch + - apiGroups: + - networking.x-k8s.io + resources: + - gatewayclasses/status + verbs: + - get + - patch + - update + - apiGroups: + - networking.x-k8s.io + resources: + - gateways/status + verbs: + - get + - patch + - update + - apiGroups: + - networking.x-k8s.io + resources: + - httproutes + verbs: + - create + - delete + - get + - list + - patch + - update + - watch + - apiGroups: + - networking.x-k8s.io + resources: + - httproutes/status + verbs: + - get + - patch + - update +{{- end -}} +{{- end -}} diff --git a/stable/traefik/6.3.12/templates/rbac/clusterrolebinding.yaml b/stable/traefik/6.3.12/templates/rbac/clusterrolebinding.yaml new file mode 100644 index 00000000000..509e92ff2b7 --- /dev/null +++ b/stable/traefik/6.3.12/templates/rbac/clusterrolebinding.yaml @@ -0,0 +1,19 @@ +{{- if and .Values.rbac.enabled (not .Values.rbac.namespaced) }} +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: {{ template "traefik.fullname" . }} + labels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + helm.sh/chart: {{ template "traefik.chart" . }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/instance: {{ .Release.Name }} +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: {{ template "traefik.fullname" . }} +subjects: + - kind: ServiceAccount + name: {{ include "traefik.serviceAccountName" . }} + namespace: {{ .Release.Namespace }} +{{- end -}} diff --git a/stable/traefik/6.3.12/templates/rbac/podsecuritypolicy.yaml b/stable/traefik/6.3.12/templates/rbac/podsecuritypolicy.yaml new file mode 100644 index 00000000000..66bc1458d55 --- /dev/null +++ b/stable/traefik/6.3.12/templates/rbac/podsecuritypolicy.yaml @@ -0,0 +1,68 @@ +{{- if .Values.podSecurityPolicy.enabled }} +--- +apiVersion: policy/v1beta1 +kind: PodSecurityPolicy +metadata: + annotations: + seccomp.security.alpha.kubernetes.io/allowedProfileNames: runtime/default + seccomp.security.alpha.kubernetes.io/defaultProfileName: runtime/default + name: {{ template "traefik.fullname" . }} + labels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + helm.sh/chart: {{ template "traefik.chart" . }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/instance: {{ .Release.Name }} +spec: + privileged: false + allowPrivilegeEscalation: false + requiredDropCapabilities: + - ALL +{{- if not .Values.securityContext.runAsNonRoot }} + allowedCapabilities: + - NET_BIND_SERVICE +{{- end }} + hostNetwork: {{ .Values.hostNetwork }} + hostIPC: false + hostPID: false + fsGroup: +{{- if .Values.securityContext.runAsNonRoot }} + ranges: + - max: 65535 + min: 1 + rule: MustRunAs +{{- else }} + rule: RunAsAny +{{- end }} +{{- if .Values.hostNetwork }} + hostPorts: + - max: 65535 + min: 1 +{{- end }} + readOnlyRootFilesystem: true + runAsUser: +{{- if .Values.securityContext.runAsNonRoot }} + rule: MustRunAsNonRoot +{{- else }} + rule: RunAsAny +{{- end }} + seLinux: + rule: RunAsAny + supplementalGroups: +{{- if .Values.securityContext.runAsNonRoot }} + ranges: + - max: 65535 + min: 1 + rule: MustRunAs +{{- else }} + rule: RunAsAny +{{- end }} + volumes: + - configMap + - downwardAPI + - secret + - emptyDir + - projected +{{- if .Values.persistence.enabled }} + - persistentVolumeClaim +{{- end -}} +{{- end -}} diff --git a/stable/traefik/6.3.12/templates/rbac/role.yaml b/stable/traefik/6.3.12/templates/rbac/role.yaml new file mode 100644 index 00000000000..6c763065d6f --- /dev/null +++ b/stable/traefik/6.3.12/templates/rbac/role.yaml @@ -0,0 +1,61 @@ +{{- if and .Values.rbac.enabled .Values.rbac.namespaced }} +kind: Role +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: {{ template "traefik.fullname" . }} + labels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + helm.sh/chart: {{ template "traefik.chart" . }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/instance: {{ .Release.Name }} +rules: + - apiGroups: + - "" + resources: + - services + - endpoints + - secrets + verbs: + - get + - list + - watch + - apiGroups: + - extensions + resources: + - ingresses + verbs: + - get + - list + - watch + - apiGroups: + - extensions + resources: + - ingresses/status + verbs: + - update + - apiGroups: + - traefik.containo.us + resources: + - ingressroutes + - ingressroutetcps + - ingressrouteudps + - middlewares + - tlsoptions + - tlsstores + - traefikservices + - serverstransports + verbs: + - get + - list + - watch +{{- if .Values.podSecurityPolicy.enabled }} + - apiGroups: + - extensions + resourceNames: + - {{ template "traefik.fullname" . }} + resources: + - podsecuritypolicies + verbs: + - use +{{- end -}} +{{- end -}} diff --git a/stable/traefik/6.3.12/templates/rbac/rolebinding.yaml b/stable/traefik/6.3.12/templates/rbac/rolebinding.yaml new file mode 100644 index 00000000000..10416401867 --- /dev/null +++ b/stable/traefik/6.3.12/templates/rbac/rolebinding.yaml @@ -0,0 +1,19 @@ +{{- if and .Values.rbac.enabled .Values.rbac.namespaced }} +kind: RoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: {{ template "traefik.fullname" . }} + labels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + helm.sh/chart: {{ template "traefik.chart" . }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/instance: {{ .Release.Name }} +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: {{ template "traefik.fullname" . }} +subjects: + - kind: ServiceAccount + name: {{ include "traefik.serviceAccountName" . }} + namespace: {{ .Release.Namespace }} +{{- end -}} diff --git a/stable/traefik/6.3.12/templates/rbac/serviceaccount.yaml b/stable/traefik/6.3.12/templates/rbac/serviceaccount.yaml new file mode 100644 index 00000000000..bcc941eec95 --- /dev/null +++ b/stable/traefik/6.3.12/templates/rbac/serviceaccount.yaml @@ -0,0 +1,15 @@ +{{- if not .Values.serviceAccount.name -}} +kind: ServiceAccount +apiVersion: v1 +metadata: + name: {{ include "traefik.serviceAccountName" . }} + labels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + helm.sh/chart: {{ template "traefik.chart" . }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/instance: {{ .Release.Name }} + annotations: + {{- with .Values.serviceAccountAnnotations }} + {{- toYaml . | nindent 4 }} + {{- end }} +{{- end -}} diff --git a/stable/traefik/6.3.12/templates/service.yaml b/stable/traefik/6.3.12/templates/service.yaml new file mode 100644 index 00000000000..745bb9102d7 --- /dev/null +++ b/stable/traefik/6.3.12/templates/service.yaml @@ -0,0 +1,114 @@ +{{- if .Values.service.enabled -}} + +{{ $tcpPorts := dict }} +{{ $udpPorts := dict }} +{{- range $name, $config := .Values.ports }} + {{- if eq (toString $config.protocol) "UDP" }} + {{ $_ := set $udpPorts $name $config }} + {{- else }} + {{ $_ := set $tcpPorts $name $config }} + {{- end }} +{{- end }} + +apiVersion: v1 +kind: List +metadata: + name: {{ template "traefik.fullname" . }} +items: +{{- if $tcpPorts }} + - apiVersion: v1 + kind: Service + metadata: + name: {{ template "traefik.fullname" . }} + labels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + helm.sh/chart: {{ template "traefik.chart" . }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/instance: {{ .Release.Name }} + {{- with .Values.service.labels }} + {{- toYaml . | nindent 8 }} + {{- end }} + annotations: + {{- with .Values.service.annotations }} + {{- toYaml . | nindent 8 }} + {{- end }} + spec: + {{- $type := default "LoadBalancer" .Values.service.type }} + type: {{ $type }} + {{- with .Values.service.spec }} + {{- toYaml . | nindent 6 }} + {{- end }} + selector: + app.kubernetes.io/name: {{ template "traefik.name" . }} + app.kubernetes.io/instance: {{ .Release.Name }} + ports: + {{- range $name, $config := $tcpPorts }} + {{- if $config.expose }} + - port: {{ default $config.port $config.exposedPort }} + name: {{ $name }} + targetPort: {{ $name | quote }} + protocol: {{ default "TCP" $config.protocol | quote }} + {{- if $config.nodePort }} + nodePort: {{ $config.nodePort }} + {{- end }} + {{- end }} + {{- end }} + {{- if eq $type "LoadBalancer" }} + {{- with .Values.service.loadBalancerSourceRanges }} + loadBalancerSourceRanges: + {{- toYaml . | nindent 6 }} + {{- end -}} + {{- end -}} + {{- with .Values.service.externalIPs }} + externalIPs: + {{- toYaml . | nindent 6 }} + {{- end -}} +{{- end }} + +{{- if $udpPorts }} + - apiVersion: v1 + kind: Service + metadata: + name: {{ template "traefik.fullname" . }}-udp + labels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + helm.sh/chart: {{ template "traefik.chart" . }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/instance: {{ .Release.Name }} + annotations: + {{- with .Values.service.annotations }} + {{- toYaml . | nindent 8 }} + {{- end }} + spec: + {{- $type := default "LoadBalancer" .Values.service.type }} + type: {{ $type }} + {{- with .Values.service.spec }} + {{- toYaml . | nindent 6 }} + {{- end }} + selector: + app.kubernetes.io/name: {{ template "traefik.name" . }} + app.kubernetes.io/instance: {{ .Release.Name }} + ports: + {{- range $name, $config := $udpPorts }} + {{- if $config.expose }} + - port: {{ default $config.port $config.exposedPort }} + name: {{ $name }} + targetPort: {{ $name | quote }} + protocol: {{ default "UDP" $config.protocol | quote }} + {{- if $config.nodePort }} + nodePort: {{ $config.nodePort }} + {{- end }} + {{- end }} + {{- end }} + {{- if eq $type "LoadBalancer" }} + {{- with .Values.service.loadBalancerSourceRanges }} + loadBalancerSourceRanges: + {{- toYaml . | nindent 6 }} + {{- end -}} + {{- end -}} + {{- with .Values.service.externalIPs }} + externalIPs: + {{- toYaml . | nindent 6 }} + {{- end -}} +{{- end }} +{{- end -}} diff --git a/stable/traefik/6.3.12/templates/tlsoption.yaml b/stable/traefik/6.3.12/templates/tlsoption.yaml new file mode 100644 index 00000000000..ec46e8bbc94 --- /dev/null +++ b/stable/traefik/6.3.12/templates/tlsoption.yaml @@ -0,0 +1,14 @@ +{{- range $name, $config := .Values.tlsOptions }} +apiVersion: traefik.containo.us/v1alpha1 +kind: TLSOption +metadata: + name: {{ $name }} + labels: + app.kubernetes.io/name: {{ template "traefik.name" $ }} + helm.sh/chart: {{ template "traefik.chart" $ }} + app.kubernetes.io/managed-by: {{ $.Release.Service }} + app.kubernetes.io/instance: {{ $.Release.Name }} +spec: + {{- toYaml $config | nindent 2 }} +--- +{{- end -}} diff --git a/stable/traefik/6.3.12/test_values.yaml b/stable/traefik/6.3.12/test_values.yaml new file mode 100644 index 00000000000..74e6d4760b6 --- /dev/null +++ b/stable/traefik/6.3.12/test_values.yaml @@ -0,0 +1,426 @@ +# Default values for Traefik +image: + name: traefik + # defaults to appVersion + tag: v2.4 + pullPolicy: IfNotPresent + +# +# Configure the deployment +# +deployment: + enabled: true + # Can be either Deployment or DaemonSet + kind: Deployment + # Number of pods of the deployment (only applies when kind == Deployment) + replicas: 1 + # Additional deployment annotations (e.g. for jaeger-operator sidecar injection) + annotations: {} + # Additional deployment labels (e.g. for filtering deployment by custom labels) + labels: {} + # Additional pod annotations (e.g. for mesh injection or prometheus scraping) + podAnnotations: {} + # Additional Pod labels (e.g. for filtering Pod by custom labels) + podLabels: {} + # Additional containers (e.g. for metric offloading sidecars) + additionalContainers: [] + # https://docs.datadoghq.com/developers/dogstatsd/unix_socket/?tab=host + # - name: socat-proxy + # image: alpine/socat:1.0.5 + # args: ["-s", "-u", "udp-recv:8125", "unix-sendto:/socket/socket"] + # volumeMounts: + # - name: dsdsocket + # mountPath: /socket + # Additional volumes available for use with initContainers and additionalContainers + additionalVolumes: [] + # - name: dsdsocket + # hostPath: + # path: /var/run/statsd-exporter + # Additional initContainers (e.g. for setting file permission as shown below) + initContainers: [] + # The "volume-permissions" init container is required if you run into permission issues. + # Related issue: https://github.com/traefik/traefik/issues/6972 + # - name: volume-permissions + # image: busybox:1.31.1 + # command: ["sh", "-c", "chmod -Rv 600 /data/*"] + # volumeMounts: + # - name: data + # mountPath: /data + # Custom pod DNS policy. Apply if `hostNetwork: true` + # dnsPolicy: ClusterFirstWithHostNet + # Additional imagePullSecrets + imagePullSecrets: [] + # - name: myRegistryKeySecretName + +# Pod disruption budget +podDisruptionBudget: + enabled: false + # maxUnavailable: 1 + # minAvailable: 0 + +# Use ingressClass. Ignored if Traefik version < 2.3 / kubernetes < 1.18.x +ingressClass: + # true is not unit-testable yet, pending https://github.com/rancher/helm-unittest/pull/12 + enabled: false + isDefaultClass: false + # Use to force a networking.k8s.io API Version for certain CI/CD applications. E.g. "v1beta1" + fallbackApiVersion: + +# Activate Pilot integration +pilot: + enabled: false + token: "" + # Toggle Pilot Dashboard + # dashboard: false + +# Enable experimental features +experimental: + plugins: + enabled: false + kubernetesGateway: + enabled: false + appLabelSelector: "traefik" + certificates: [] + # - group: "core" + # kind: "Secret" + # name: "mysecret" + +# Create an IngressRoute for the dashboard +ingressRoute: + dashboard: + enabled: true + # Additional ingressRoute annotations (e.g. for kubernetes.io/ingress.class) + annotations: {} + # Additional ingressRoute labels (e.g. for filtering IngressRoute by custom labels) + labels: {} + +rollingUpdate: + maxUnavailable: 1 + maxSurge: 1 + + +# +# Configure providers +# +providers: + kubernetesCRD: + enabled: true + namespaces: [] + # - "default" + kubernetesIngress: + enabled: true + # labelSelector: environment=production,method=traefik + namespaces: [] + # - "default" + # IP used for Kubernetes Ingress endpoints + publishedService: + enabled: false + # Published Kubernetes Service to copy status from. Format: namespace/servicename + # By default this Traefik service + # pathOverride: "" + +# +# Add volumes to the traefik pod. The volume name will be passed to tpl. +# This can be used to mount a cert pair or a configmap that holds a config.toml file. +# After the volume has been mounted, add the configs into traefik by using the `additionalArguments` list below, eg: +# additionalArguments: +# - "--providers.file.filename=/config/dynamic.toml" +# - "--ping" +# - "--ping.entrypoint=web" +volumes: [] +# - name: public-cert +# mountPath: "/certs" +# type: secret +# - name: '{{ printf "%s-configs" .Release.Name }}' +# mountPath: "/config" +# type: configMap + +# Additional volumeMounts to add to the Traefik container +additionalVolumeMounts: [] + # For instance when using a logshipper for access logs + # - name: traefik-logs + # mountPath: /var/log/traefik + +# Logs +# https://docs.traefik.io/observability/logs/ +logs: + # Traefik logs concern everything that happens to Traefik itself (startup, configuration, events, shutdown, and so on). + general: + # By default, the logs use a text format (common), but you can + # also ask for the json format in the format option + # format: json + # By default, the level is set to ERROR. Alternative logging levels are DEBUG, PANIC, FATAL, ERROR, WARN, and INFO. + level: INFO + access: + # To enable access logs + enabled: false + # By default, logs are written using the Common Log Format (CLF). + # To write logs in JSON, use json in the format option. + # If the given format is unsupported, the default (CLF) is used instead. + # format: json + # To write the logs in an asynchronous fashion, specify a bufferingSize option. + # This option represents the number of log lines Traefik will keep in memory before writing + # them to the selected output. In some cases, this option can greatly help performances. + # bufferingSize: 100 + # Filtering https://docs.traefik.io/observability/access-logs/#filtering + filters: {} + # statuscodes: "200,300-302" + # retryattempts: true + # minduration: 10ms + # Fields + # https://docs.traefik.io/observability/access-logs/#limiting-the-fieldsincluding-headers + fields: + general: + defaultmode: keep + names: {} + # Examples: + # ClientUsername: drop + headers: + defaultmode: drop + names: {} + # Examples: + # User-Agent: redact + # Authorization: drop + # Content-Type: keep + +globalArguments: + - "--global.checknewversion" + +# +# Configure Traefik static configuration +# Additional arguments to be passed at Traefik's binary +# All available options available on https://docs.traefik.io/reference/static-configuration/cli/ +## Use curly braces to pass values: `helm install --set="additionalArguments={--providers.kubernetesingress.ingressclass=traefik-internal,--log.level=DEBUG}"` +additionalArguments: + - "--metrics.prometheus" + - "--ping" + - "--serverstransport.insecureskipverify=true" + +# Environment variables to be passed to Traefik's binary +env: [] +# - name: SOME_VAR +# value: some-var-value +# - name: SOME_VAR_FROM_CONFIG_MAP +# valueFrom: +# configMapRef: +# name: configmap-name +# key: config-key +# - name: SOME_SECRET +# valueFrom: +# secretKeyRef: +# name: secret-name +# key: secret-key + +envFrom: [] +# - configMapRef: +# name: config-map-name +# - secretRef: +# name: secret-name + +# Configure ports +ports: + # The name of this one can't be changed as it is used for the readiness and + # liveness probes, but you can adjust its config to your liking + traefik: + port: 9000 + # Use hostPort if set. + # hostPort: 9000 + # + # Use hostIP if set. If not set, Kubernetes will default to 0.0.0.0, which + # means it's listening on all your interfaces and all your IPs. You may want + # to set this value if you need traefik to listen on specific interface + # only. + # hostIP: 192.168.100.10 + + # Defines whether the port is exposed if service.type is LoadBalancer or + # NodePort. + # + # You SHOULD NOT expose the traefik port on production deployments. + # If you want to access it from outside of your cluster, + # use `kubectl port-forward` or create a secure ingress + expose: false + # The exposed port for this service + exposedPort: 9000 + # The port protocol (TCP/UDP) + protocol: TCP + web: + port: 9080 + # hostPort: 8000 + expose: true + exposedPort: 80 + # The port protocol (TCP/UDP) + protocol: TCP + # Use nodeport if set. This is useful if you have configured Traefik in a + # LoadBalancer + # nodePort: 32080 + # Port Redirections + # Added in 2.2, you can make permanent redirects via entrypoints. + # https://docs.traefik.io/routing/entrypoints/#redirection + redirectTo: websecure + websecure: + port: 9443 + # hostPort: 8443 + expose: true + exposedPort: 443 + # The port protocol (TCP/UDP) + protocol: TCP + # nodePort: 32443 + # Set TLS at the entrypoint + # https://doc.traefik.io/traefik/routing/entrypoints/#tls + tls: + enabled: true + +# TLS Options are created as TLSOption CRDs +# https://doc.traefik.io/traefik/https/tls/#tls-options +# Example: +tlsOptions: + default: + sniStrict: false + minVersion: VersionTLS12 + curvePreferences: + - CurveP521 + - CurveP384 + cipherSuites: + - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 + - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 + - TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 + - TLS_AES_128_GCM_SHA256 + - TLS_AES_256_GCM_SHA384 + - TLS_CHACHA20_POLY1305_SHA256 + +# Options for the main traefik service, where the entrypoints traffic comes +# from. +service: + enabled: true + type: LoadBalancer + # Additional annotations (e.g. for cloud provider specific config) + annotations: {} + # Additional service labels (e.g. for filtering Service by custom labels) + labels: {} + # Additional entries here will be added to the service spec. Cannot contains + # type, selector or ports entries. + spec: {} + # externalTrafficPolicy: Cluster + # loadBalancerIP: "1.2.3.4" + # clusterIP: "2.3.4.5" + loadBalancerSourceRanges: [] + # - 192.168.0.1/32 + # - 172.16.0.0/16 + externalIPs: [] + # - 1.2.3.4 + +## Create HorizontalPodAutoscaler object. +## +autoscaling: + enabled: false +# minReplicas: 1 +# maxReplicas: 10 +# metrics: +# - type: Resource +# resource: +# name: cpu +# targetAverageUtilization: 60 +# - type: Resource +# resource: +# name: memory +# targetAverageUtilization: 60 + +# Enable persistence using Persistent Volume Claims +# ref: http://kubernetes.io/docs/user-guide/persistent-volumes/ +# After the pvc has been mounted, add the configs into traefik by using the `additionalArguments` list below, eg: +# additionalArguments: +# - "--certificatesresolvers.le.acme.storage=/data/acme.json" +# It will persist TLS certificates. +persistence: + enabled: false + name: data + accessMode: ReadWriteOnce + size: 128Mi + path: /data + +# If hostNetwork is true, runs traefik in the host network namespace +# To prevent unschedulabel pods due to port collisions, if hostNetwork=true +# and replicas>1, a pod anti-affinity is recommended and will be set if the +# affinity is left as default. +hostNetwork: false + +# Whether Role Based Access Control objects like roles and rolebindings should be created +rbac: + enabled: true + + # If set to false, installs ClusterRole and ClusterRoleBinding so Traefik can be used across namespaces. + # If set to true, installs namespace-specific Role and RoleBinding and requires provider configuration be set to that same namespace + namespaced: false + +# Enable to create a PodSecurityPolicy and assign it to the Service Account via RoleBinding or ClusterRoleBinding +podSecurityPolicy: + enabled: false + +# The service account the pods will use to interact with the Kubernetes API +serviceAccount: + # If set, an existing service account is used + # If not set, a service account is created automatically using the fullname template + name: "" + +# Additional serviceAccount annotations (e.g. for oidc authentication) +serviceAccountAnnotations: {} + +resources: {} + # requests: + # cpu: "100m" + # memory: "50Mi" + # limits: + # cpu: "300m" + # memory: "150Mi" +affinity: {} +# # This example pod anti-affinity forces the scheduler to put traefik pods +# # on nodes where no other traefik pods are scheduled. +# # It should be used when hostNetwork: true to prevent port conflicts +# podAntiAffinity: +# requiredDuringSchedulingIgnoredDuringExecution: +# - labelSelector: +# matchExpressions: +# - key: app +# operator: In +# values: +# - {{ template "traefik.name" . }} +# topologyKey: failure-domain.beta.kubernetes.io/zone +nodeSelector: {} +tolerations: [] + +# Pods can have priority. +# Priority indicates the importance of a Pod relative to other Pods. +priorityClassName: "" + +# Set the container security context +# To run the container with ports below 1024 this will need to be adjust to run as root +securityContext: + capabilities: + drop: [ALL] + readOnlyRootFilesystem: true + runAsGroup: 65532 + runAsNonRoot: true + runAsUser: 65532 + +podSecurityContext: + fsGroup: 65532 + +## SCALE Middleware Handlers + +middlewares: + basicAuth: [] + # - name: basicauthexample + # users: + # - username: testuser + # password: testpassword + forwardAuth: [] + # - name: forwardAuthexample + # address: https://auth.example.com/ + # authResponseHeaders: + # - X-Secret + # - X-Auth-User + # authRequestHeaders: + # - "Accept" + # - "X-CustomHeader" + # authResponseHeadersRegex: "^X-" + # trustForwardHeader: true diff --git a/stable/traefik/6.3.12/values.yaml b/stable/traefik/6.3.12/values.yaml new file mode 100644 index 00000000000..e69de29bb2d diff --git a/stable/transmission/6.2.5/Chart.lock b/stable/transmission/6.2.5/Chart.lock index cfbe383f3ed..e546919d429 100644 --- a/stable/transmission/6.2.5/Chart.lock +++ b/stable/transmission/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:23.158365429Z" +generated: "2021-06-30T20:51:40.794326342Z" diff --git a/stable/truecommand/6.2.5/Chart.lock b/stable/truecommand/6.2.5/Chart.lock index da088a1c7fa..e86493b9b03 100644 --- a/stable/truecommand/6.2.5/Chart.lock +++ b/stable/truecommand/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:24.48951012Z" +generated: "2021-06-30T20:51:42.100361039Z" diff --git a/stable/vaultwarden/3.3.6/Chart.lock b/stable/vaultwarden/3.3.6/Chart.lock index c6edc222b2f..80f378f7e9a 100644 --- a/stable/vaultwarden/3.3.6/Chart.lock +++ b/stable/vaultwarden/3.3.6/Chart.lock @@ -6,4 +6,4 @@ dependencies: repository: https://charts.bitnami.com/bitnami version: 10.5.1 digest: sha256:465e7b131ee731b148c277a3ef6895af062a39143161e9035a7f8b0841b06e85 -generated: "2021-06-30T20:35:28.56397733Z" +generated: "2021-06-30T20:51:45.970568626Z" diff --git a/stable/zwavejs2mqtt/6.2.5/Chart.lock b/stable/zwavejs2mqtt/6.2.5/Chart.lock index b15847cda63..e8d2f9f964c 100644 --- a/stable/zwavejs2mqtt/6.2.5/Chart.lock +++ b/stable/zwavejs2mqtt/6.2.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.4.3 digest: sha256:e916cc3afa0bed84d564777b21ec91a8df7fae281abd127d34cf5ae0917f7a77 -generated: "2021-06-30T20:35:32.864216217Z" +generated: "2021-06-30T20:51:50.186939262Z"