From e3560050d1deefe0e5446949565c04c3a1cc3b99 Mon Sep 17 00:00:00 2001 From: TrueCharts-Bot Date: Mon, 5 Jul 2021 16:20:44 +0000 Subject: [PATCH] Commit new App releases for TrueCharts Signed-off-by: TrueCharts-Bot --- deprecated/nzbhydra/6.3.1/Chart.lock | 2 +- develop/prototype-gui/1.4.1/Chart.lock | 2 +- incubator/airsonic/1.3.1/Chart.lock | 2 +- incubator/appdaemon/3.3.1/Chart.lock | 2 +- incubator/bazarr/6.3.1/Chart.lock | 2 +- incubator/booksonic-air/1.1.1/Chart.lock | 2 +- incubator/calibre-web/6.3.1/Chart.lock | 2 +- incubator/calibre/1.1.1/Chart.lock | 2 +- incubator/deconz/1.1.1/Chart.lock | 2 +- incubator/deluge/6.3.1/Chart.lock | 2 +- incubator/dizquetv/1.1.1/Chart.lock | 2 +- incubator/duplicati/1.1.1/Chart.lock | 2 +- incubator/fireflyiii/4.4.1/Chart.lock | 2 +- incubator/flaresolverr/1.1.1/Chart.lock | 2 +- incubator/flood/1.1.1/Chart.lock | 2 +- incubator/focalboard/1.1.1/Chart.lock | 2 +- incubator/freshrss/6.3.1/Chart.lock | 2 +- incubator/gaps/6.3.1/Chart.lock | 2 +- incubator/gonic/1.1.1/Chart.lock | 2 +- incubator/grocy/6.3.1/Chart.lock | 2 +- incubator/haste-server/1.3.1/Chart.lock | 2 +- incubator/healthchecks/1.1.1/Chart.lock | 2 +- incubator/heimdall/6.3.1/Chart.lock | 2 +- incubator/hyperion-ng/1.1.1/Chart.lock | 2 +- incubator/komga/1.1.1/Chart.lock | 2 +- incubator/lazylibrarian/6.3.1/Chart.lock | 2 +- incubator/librespeed/1.1.1/Chart.lock | 2 +- incubator/lychee/6.3.1/Chart.lock | 2 +- incubator/mealie/1.3.1/Chart.lock | 2 +- incubator/mosquitto/1.3.1/Chart.lock | 2 +- incubator/mylar/1.1.1/Chart.lock | 2 +- incubator/navidrome/6.3.1/Chart.lock | 2 +- incubator/node-red/6.3.1/Chart.lock | 2 +- incubator/nullserv/1.1.1/Chart.lock | 2 +- incubator/nzbget/6.3.1/Chart.lock | 2 +- incubator/octoprint/1.1.1/Chart.lock | 2 +- incubator/omada-controller/1.1.1/Chart.lock | 2 +- incubator/organizr/6.3.1/Chart.lock | 2 +- incubator/overseerr/1.1.1/Chart.lock | 2 +- incubator/owncast/1.1.1/Chart.lock | 2 +- incubator/owncloud-ocis/1.1.1/Chart.lock | 2 +- incubator/photoprism/1.1.1/Chart.lock | 2 +- incubator/piaware/1.1.1/Chart.lock | 2 +- incubator/podgrab/4.3.1/Chart.lock | 2 +- .../pretend-youre-xyzzy/1.1.1/Chart.lock | 2 +- incubator/protonmail-bridge/1.1.1/Chart.lock | 2 +- incubator/prowlarr/1.3.1/Chart.lock | 2 +- incubator/pyload/1.1.1/Chart.lock | 2 +- incubator/qbittorrent/6.3.1/Chart.lock | 2 +- incubator/readarr/6.3.1/Chart.lock | 2 +- incubator/reg/1.3.1/Chart.lock | 2 +- incubator/sabnzbd/6.3.1/Chart.lock | 2 +- incubator/ser2sock/1.1.1/Chart.lock | 2 +- incubator/stash/1.1.1/Chart.lock | 2 +- incubator/thelounge/1.3.1/Chart.lock | 2 +- incubator/tvheadend/7.3.1/Chart.lock | 2 +- incubator/unifi/6.3.1/Chart.lock | 2 +- incubator/unpackerr/1.3.1/Chart.lock | 2 +- incubator/xteve/1.1.1/Chart.lock | 2 +- non-free/resilio-sync/1.1.1/Chart.lock | 2 +- stable/collabora-online/6.3.1/Chart.lock | 2 +- stable/deepstack-cpu/4.3.1/Chart.lock | 2 +- stable/emby/6.3.1/Chart.lock | 2 +- stable/esphome/6.3.1/Chart.lock | 2 +- stable/handbrake/6.3.1/Chart.lock | 2 +- stable/home-assistant/6.3.1/Chart.lock | 2 +- stable/jackett/6.3.1/Chart.lock | 2 +- stable/jellyfin/6.3.1/Chart.lock | 2 +- stable/kms/6.3.1/Chart.lock | 2 +- stable/lidarr/6.3.1/Chart.lock | 2 +- stable/nextcloud/1.1.6/Chart.lock | 2 +- stable/ombi/6.3.1/Chart.lock | 2 +- stable/plex/5.3.1/Chart.lock | 2 +- stable/radarr/6.3.1/Chart.lock | 2 +- stable/sonarr/6.3.1/Chart.lock | 2 +- stable/syncthing/6.3.1/Chart.lock | 2 +- stable/tautulli/6.3.1/Chart.lock | 2 +- stable/traefik/6.5.5/CONFIG.md | 9 + stable/traefik/6.5.5/Chart.lock | 6 + stable/traefik/6.5.5/Chart.yaml | 29 ++ stable/traefik/6.5.5/LICENSE | 202 ++++++++ stable/traefik/6.5.5/README.md | 56 +++ stable/traefik/6.5.5/app-readme.md | 3 + stable/traefik/6.5.5/charts/common-6.5.1.tgz | Bin 0 -> 23437 bytes stable/traefik/6.5.5/crds/ingressroute.yaml | 12 + .../traefik/6.5.5/crds/ingressroutetcp.yaml | 12 + .../traefik/6.5.5/crds/ingressrouteudp.yaml | 13 + stable/traefik/6.5.5/crds/middlewares.yaml | 12 + .../traefik/6.5.5/crds/serverstransports.yaml | 12 + stable/traefik/6.5.5/crds/tlsoptions.yaml | 12 + stable/traefik/6.5.5/crds/tlsstores.yaml | 13 + .../traefik/6.5.5/crds/traefikservices.yaml | 12 + stable/traefik/6.5.5/ix_values.yaml | 332 ++++++++++++ stable/traefik/6.5.5/questions.yaml | 476 ++++++++++++++++++ stable/traefik/6.5.5/templates/_helpers.tpl | 62 +++ .../traefik/6.5.5/templates/_podtemplate.tpl | 265 ++++++++++ .../6.5.5/templates/custom/common.yaml | 0 .../custom/middleware-namespace.yaml | 7 + .../custom/middlewares/basic-middleware.yaml | 58 +++ .../custom/middlewares/basicauth.yaml | 29 ++ .../templates/custom/middlewares/chain.yaml | 16 + .../custom/middlewares/forwardauth.yaml | 23 + .../custom/middlewares/ratelimit.yaml | 14 + .../custom/middlewares/redirectScheme.yaml | 14 + .../6.5.5/templates/custom/portal.yaml | 45 ++ .../6.5.5/templates/custom/portalhook.yaml | 12 + stable/traefik/6.5.5/templates/daemonset.yaml | 40 ++ .../dashboard-hook-ingressroute.yaml | 28 ++ .../traefik/6.5.5/templates/deployment.yaml | 47 ++ stable/traefik/6.5.5/templates/gateway.yaml | 33 ++ .../traefik/6.5.5/templates/gatewayclass.yaml | 9 + stable/traefik/6.5.5/templates/hpa.yaml | 20 + .../traefik/6.5.5/templates/ingressclass.yaml | 23 + .../6.5.5/templates/poddisruptionbudget.yaml | 22 + .../6.5.5/templates/rbac/clusterrole.yaml | 112 +++++ .../templates/rbac/clusterrolebinding.yaml | 19 + .../templates/rbac/podsecuritypolicy.yaml | 68 +++ stable/traefik/6.5.5/templates/rbac/role.yaml | 61 +++ .../6.5.5/templates/rbac/rolebinding.yaml | 19 + .../6.5.5/templates/rbac/serviceaccount.yaml | 15 + stable/traefik/6.5.5/templates/service.yaml | 114 +++++ stable/traefik/6.5.5/templates/tlsoption.yaml | 14 + stable/traefik/6.5.5/test_values.yaml | 438 ++++++++++++++++ stable/traefik/6.5.5/values.yaml | 0 stable/transmission/6.3.1/Chart.lock | 2 +- stable/truecommand/6.3.1/Chart.lock | 2 +- stable/vaultwarden/3.4.1/Chart.lock | 2 +- stable/zwavejs2mqtt/6.3.1/Chart.lock | 2 +- 128 files changed, 2919 insertions(+), 81 deletions(-) create mode 100644 stable/traefik/6.5.5/CONFIG.md create mode 100644 stable/traefik/6.5.5/Chart.lock create mode 100644 stable/traefik/6.5.5/Chart.yaml create mode 100644 stable/traefik/6.5.5/LICENSE create mode 100644 stable/traefik/6.5.5/README.md create mode 100644 stable/traefik/6.5.5/app-readme.md create mode 100644 stable/traefik/6.5.5/charts/common-6.5.1.tgz create mode 100644 stable/traefik/6.5.5/crds/ingressroute.yaml create mode 100644 stable/traefik/6.5.5/crds/ingressroutetcp.yaml create mode 100644 stable/traefik/6.5.5/crds/ingressrouteudp.yaml create mode 100644 stable/traefik/6.5.5/crds/middlewares.yaml create mode 100644 stable/traefik/6.5.5/crds/serverstransports.yaml create mode 100644 stable/traefik/6.5.5/crds/tlsoptions.yaml create mode 100644 stable/traefik/6.5.5/crds/tlsstores.yaml create mode 100644 stable/traefik/6.5.5/crds/traefikservices.yaml create mode 100644 stable/traefik/6.5.5/ix_values.yaml create mode 100644 stable/traefik/6.5.5/questions.yaml create mode 100644 stable/traefik/6.5.5/templates/_helpers.tpl create mode 100644 stable/traefik/6.5.5/templates/_podtemplate.tpl create mode 100644 stable/traefik/6.5.5/templates/custom/common.yaml create mode 100644 stable/traefik/6.5.5/templates/custom/middleware-namespace.yaml create mode 100644 stable/traefik/6.5.5/templates/custom/middlewares/basic-middleware.yaml create mode 100644 stable/traefik/6.5.5/templates/custom/middlewares/basicauth.yaml create mode 100644 stable/traefik/6.5.5/templates/custom/middlewares/chain.yaml create mode 100644 stable/traefik/6.5.5/templates/custom/middlewares/forwardauth.yaml create mode 100644 stable/traefik/6.5.5/templates/custom/middlewares/ratelimit.yaml create mode 100644 stable/traefik/6.5.5/templates/custom/middlewares/redirectScheme.yaml create mode 100644 stable/traefik/6.5.5/templates/custom/portal.yaml create mode 100644 stable/traefik/6.5.5/templates/custom/portalhook.yaml create mode 100644 stable/traefik/6.5.5/templates/daemonset.yaml create mode 100644 stable/traefik/6.5.5/templates/dashboard-hook-ingressroute.yaml create mode 100644 stable/traefik/6.5.5/templates/deployment.yaml create mode 100644 stable/traefik/6.5.5/templates/gateway.yaml create mode 100644 stable/traefik/6.5.5/templates/gatewayclass.yaml create mode 100644 stable/traefik/6.5.5/templates/hpa.yaml create mode 100644 stable/traefik/6.5.5/templates/ingressclass.yaml create mode 100644 stable/traefik/6.5.5/templates/poddisruptionbudget.yaml create mode 100644 stable/traefik/6.5.5/templates/rbac/clusterrole.yaml create mode 100644 stable/traefik/6.5.5/templates/rbac/clusterrolebinding.yaml create mode 100644 stable/traefik/6.5.5/templates/rbac/podsecuritypolicy.yaml create mode 100644 stable/traefik/6.5.5/templates/rbac/role.yaml create mode 100644 stable/traefik/6.5.5/templates/rbac/rolebinding.yaml create mode 100644 stable/traefik/6.5.5/templates/rbac/serviceaccount.yaml create mode 100644 stable/traefik/6.5.5/templates/service.yaml create mode 100644 stable/traefik/6.5.5/templates/tlsoption.yaml create mode 100644 stable/traefik/6.5.5/test_values.yaml create mode 100644 stable/traefik/6.5.5/values.yaml diff --git a/deprecated/nzbhydra/6.3.1/Chart.lock b/deprecated/nzbhydra/6.3.1/Chart.lock index 951a802111f..25bc3dc44e6 100644 --- a/deprecated/nzbhydra/6.3.1/Chart.lock +++ b/deprecated/nzbhydra/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:33:33.063953294Z" +generated: "2021-07-05T16:20:23.105869453Z" diff --git a/develop/prototype-gui/1.4.1/Chart.lock b/develop/prototype-gui/1.4.1/Chart.lock index da8a701c65b..0145c444ab5 100644 --- a/develop/prototype-gui/1.4.1/Chart.lock +++ b/develop/prototype-gui/1.4.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:33:29.498960694Z" +generated: "2021-07-05T16:20:15.395055777Z" diff --git a/incubator/airsonic/1.3.1/Chart.lock b/incubator/airsonic/1.3.1/Chart.lock index 6d43765f93c..afe5f344351 100644 --- a/incubator/airsonic/1.3.1/Chart.lock +++ b/incubator/airsonic/1.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:31:39.439392734Z" +generated: "2021-07-05T16:16:23.922789054Z" diff --git a/incubator/appdaemon/3.3.1/Chart.lock b/incubator/appdaemon/3.3.1/Chart.lock index ca1f68e9ab7..67b46d64874 100644 --- a/incubator/appdaemon/3.3.1/Chart.lock +++ b/incubator/appdaemon/3.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:31:41.254759318Z" +generated: "2021-07-05T16:16:28.933461117Z" diff --git a/incubator/bazarr/6.3.1/Chart.lock b/incubator/bazarr/6.3.1/Chart.lock index 8c8ed44ec47..0634a17fc94 100644 --- a/incubator/bazarr/6.3.1/Chart.lock +++ b/incubator/bazarr/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:31:43.114388866Z" +generated: "2021-07-05T16:16:32.399500769Z" diff --git a/incubator/booksonic-air/1.1.1/Chart.lock b/incubator/booksonic-air/1.1.1/Chart.lock index dcc85ffff1e..0bef96823e3 100644 --- a/incubator/booksonic-air/1.1.1/Chart.lock +++ b/incubator/booksonic-air/1.1.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 6.5.1 digest: sha256:167ded27a30cb2e82f05bf85f6b35221aa9d9aa0afc44d99824113ab8f96dd42 -generated: "2021-07-05T15:31:44.924897333Z" +generated: "2021-07-05T16:16:37.015206417Z" diff --git a/incubator/calibre-web/6.3.1/Chart.lock b/incubator/calibre-web/6.3.1/Chart.lock index f2dceec42f5..1bba573472e 100644 --- a/incubator/calibre-web/6.3.1/Chart.lock +++ b/incubator/calibre-web/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:31:48.49011291Z" +generated: "2021-07-05T16:16:43.983829639Z" diff --git a/incubator/calibre/1.1.1/Chart.lock b/incubator/calibre/1.1.1/Chart.lock index df6c02f409a..cd5aad3bdbe 100644 --- a/incubator/calibre/1.1.1/Chart.lock +++ b/incubator/calibre/1.1.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 6.5.1 digest: sha256:167ded27a30cb2e82f05bf85f6b35221aa9d9aa0afc44d99824113ab8f96dd42 -generated: "2021-07-05T15:31:46.688290866Z" +generated: "2021-07-05T16:16:40.623007796Z" diff --git a/incubator/deconz/1.1.1/Chart.lock b/incubator/deconz/1.1.1/Chart.lock index a85e8e3ccae..fe7f368de4a 100644 --- a/incubator/deconz/1.1.1/Chart.lock +++ b/incubator/deconz/1.1.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 6.5.1 digest: sha256:167ded27a30cb2e82f05bf85f6b35221aa9d9aa0afc44d99824113ab8f96dd42 -generated: "2021-07-05T15:31:50.265916046Z" +generated: "2021-07-05T16:16:48.889982731Z" diff --git a/incubator/deluge/6.3.1/Chart.lock b/incubator/deluge/6.3.1/Chart.lock index 6b2d89b3ec2..524196ece31 100644 --- a/incubator/deluge/6.3.1/Chart.lock +++ b/incubator/deluge/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:31:52.020311223Z" +generated: "2021-07-05T16:16:53.937326188Z" diff --git a/incubator/dizquetv/1.1.1/Chart.lock b/incubator/dizquetv/1.1.1/Chart.lock index af22128121a..72c40504b98 100644 --- a/incubator/dizquetv/1.1.1/Chart.lock +++ b/incubator/dizquetv/1.1.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 6.5.1 digest: sha256:167ded27a30cb2e82f05bf85f6b35221aa9d9aa0afc44d99824113ab8f96dd42 -generated: "2021-07-05T15:31:53.812590206Z" +generated: "2021-07-05T16:16:57.367112546Z" diff --git a/incubator/duplicati/1.1.1/Chart.lock b/incubator/duplicati/1.1.1/Chart.lock index 9990eae19a4..47042d953c5 100644 --- a/incubator/duplicati/1.1.1/Chart.lock +++ b/incubator/duplicati/1.1.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 6.5.1 digest: sha256:167ded27a30cb2e82f05bf85f6b35221aa9d9aa0afc44d99824113ab8f96dd42 -generated: "2021-07-05T15:31:55.645236336Z" +generated: "2021-07-05T16:17:01.139972264Z" diff --git a/incubator/fireflyiii/4.4.1/Chart.lock b/incubator/fireflyiii/4.4.1/Chart.lock index b8805703c58..a536214ec46 100644 --- a/incubator/fireflyiii/4.4.1/Chart.lock +++ b/incubator/fireflyiii/4.4.1/Chart.lock @@ -6,4 +6,4 @@ dependencies: repository: https://charts.bitnami.com/bitnami version: 10.5.1 digest: sha256:70f687e3857498e272f62267e36319bf57c051ca6920a2c625f84be299b5ac0b -generated: "2021-07-05T15:32:00.319228473Z" +generated: "2021-07-05T16:17:06.122531796Z" diff --git a/incubator/flaresolverr/1.1.1/Chart.lock b/incubator/flaresolverr/1.1.1/Chart.lock index 9153dec6371..f4dbea3ad85 100644 --- a/incubator/flaresolverr/1.1.1/Chart.lock +++ b/incubator/flaresolverr/1.1.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 6.5.1 digest: sha256:167ded27a30cb2e82f05bf85f6b35221aa9d9aa0afc44d99824113ab8f96dd42 -generated: "2021-07-05T15:32:05.816896911Z" +generated: "2021-07-05T16:17:13.713592941Z" diff --git a/incubator/flood/1.1.1/Chart.lock b/incubator/flood/1.1.1/Chart.lock index 8336a05af99..abbbff12bca 100644 --- a/incubator/flood/1.1.1/Chart.lock +++ b/incubator/flood/1.1.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 6.5.1 digest: sha256:167ded27a30cb2e82f05bf85f6b35221aa9d9aa0afc44d99824113ab8f96dd42 -generated: "2021-07-05T15:32:07.674530854Z" +generated: "2021-07-05T16:17:17.65098867Z" diff --git a/incubator/focalboard/1.1.1/Chart.lock b/incubator/focalboard/1.1.1/Chart.lock index f50b756514e..4b623565a3c 100644 --- a/incubator/focalboard/1.1.1/Chart.lock +++ b/incubator/focalboard/1.1.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 6.5.1 digest: sha256:167ded27a30cb2e82f05bf85f6b35221aa9d9aa0afc44d99824113ab8f96dd42 -generated: "2021-07-05T15:32:09.456339182Z" +generated: "2021-07-05T16:17:21.377832715Z" diff --git a/incubator/freshrss/6.3.1/Chart.lock b/incubator/freshrss/6.3.1/Chart.lock index 8837d71b29e..77334bd629a 100644 --- a/incubator/freshrss/6.3.1/Chart.lock +++ b/incubator/freshrss/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:32:11.266198887Z" +generated: "2021-07-05T16:17:24.783741716Z" diff --git a/incubator/gaps/6.3.1/Chart.lock b/incubator/gaps/6.3.1/Chart.lock index 850765c6630..3c0844963e4 100644 --- a/incubator/gaps/6.3.1/Chart.lock +++ b/incubator/gaps/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:32:13.084763536Z" +generated: "2021-07-05T16:17:28.164042104Z" diff --git a/incubator/gonic/1.1.1/Chart.lock b/incubator/gonic/1.1.1/Chart.lock index 71fb0aef868..ca0cd2bd48c 100644 --- a/incubator/gonic/1.1.1/Chart.lock +++ b/incubator/gonic/1.1.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 6.5.1 digest: sha256:167ded27a30cb2e82f05bf85f6b35221aa9d9aa0afc44d99824113ab8f96dd42 -generated: "2021-07-05T15:32:14.979109382Z" +generated: "2021-07-05T16:17:33.208131076Z" diff --git a/incubator/grocy/6.3.1/Chart.lock b/incubator/grocy/6.3.1/Chart.lock index 0b687213489..ce6853a7235 100644 --- a/incubator/grocy/6.3.1/Chart.lock +++ b/incubator/grocy/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:32:16.786304451Z" +generated: "2021-07-05T16:17:37.286049817Z" diff --git a/incubator/haste-server/1.3.1/Chart.lock b/incubator/haste-server/1.3.1/Chart.lock index 2080d512141..05f79683b4f 100644 --- a/incubator/haste-server/1.3.1/Chart.lock +++ b/incubator/haste-server/1.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:32:18.581830543Z" +generated: "2021-07-05T16:17:41.831554975Z" diff --git a/incubator/healthchecks/1.1.1/Chart.lock b/incubator/healthchecks/1.1.1/Chart.lock index d728faec0ae..a0d62a432ad 100644 --- a/incubator/healthchecks/1.1.1/Chart.lock +++ b/incubator/healthchecks/1.1.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 6.5.1 digest: sha256:167ded27a30cb2e82f05bf85f6b35221aa9d9aa0afc44d99824113ab8f96dd42 -generated: "2021-07-05T15:32:20.424737635Z" +generated: "2021-07-05T16:17:45.204489093Z" diff --git a/incubator/heimdall/6.3.1/Chart.lock b/incubator/heimdall/6.3.1/Chart.lock index fee19259c80..796165f7650 100644 --- a/incubator/heimdall/6.3.1/Chart.lock +++ b/incubator/heimdall/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:32:22.21916812Z" +generated: "2021-07-05T16:17:48.590125517Z" diff --git a/incubator/hyperion-ng/1.1.1/Chart.lock b/incubator/hyperion-ng/1.1.1/Chart.lock index 64c89a0604f..4a982f52b22 100644 --- a/incubator/hyperion-ng/1.1.1/Chart.lock +++ b/incubator/hyperion-ng/1.1.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 6.5.1 digest: sha256:167ded27a30cb2e82f05bf85f6b35221aa9d9aa0afc44d99824113ab8f96dd42 -generated: "2021-07-05T15:32:24.019979611Z" +generated: "2021-07-05T16:17:53.311851459Z" diff --git a/incubator/komga/1.1.1/Chart.lock b/incubator/komga/1.1.1/Chart.lock index c125d0c67d0..d096c7b0bee 100644 --- a/incubator/komga/1.1.1/Chart.lock +++ b/incubator/komga/1.1.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 6.5.1 digest: sha256:167ded27a30cb2e82f05bf85f6b35221aa9d9aa0afc44d99824113ab8f96dd42 -generated: "2021-07-05T15:32:25.808466058Z" +generated: "2021-07-05T16:17:57.192144787Z" diff --git a/incubator/lazylibrarian/6.3.1/Chart.lock b/incubator/lazylibrarian/6.3.1/Chart.lock index 715f5ea42ca..9b1644e3abe 100644 --- a/incubator/lazylibrarian/6.3.1/Chart.lock +++ b/incubator/lazylibrarian/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:32:27.636599241Z" +generated: "2021-07-05T16:18:01.932180631Z" diff --git a/incubator/librespeed/1.1.1/Chart.lock b/incubator/librespeed/1.1.1/Chart.lock index cbad1fe9b60..dc00d51251e 100644 --- a/incubator/librespeed/1.1.1/Chart.lock +++ b/incubator/librespeed/1.1.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 6.5.1 digest: sha256:167ded27a30cb2e82f05bf85f6b35221aa9d9aa0afc44d99824113ab8f96dd42 -generated: "2021-07-05T15:32:29.614870377Z" +generated: "2021-07-05T16:18:05.67736231Z" diff --git a/incubator/lychee/6.3.1/Chart.lock b/incubator/lychee/6.3.1/Chart.lock index 83f06b992c2..b566ec3c60b 100644 --- a/incubator/lychee/6.3.1/Chart.lock +++ b/incubator/lychee/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:32:31.41248727Z" +generated: "2021-07-05T16:18:10.34594983Z" diff --git a/incubator/mealie/1.3.1/Chart.lock b/incubator/mealie/1.3.1/Chart.lock index c1160c31300..b9bce9b33bf 100644 --- a/incubator/mealie/1.3.1/Chart.lock +++ b/incubator/mealie/1.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:32:33.188245598Z" +generated: "2021-07-05T16:18:13.808427031Z" diff --git a/incubator/mosquitto/1.3.1/Chart.lock b/incubator/mosquitto/1.3.1/Chart.lock index 6c481d5b953..b8a106552dc 100644 --- a/incubator/mosquitto/1.3.1/Chart.lock +++ b/incubator/mosquitto/1.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:32:34.986842988Z" +generated: "2021-07-05T16:18:24.142677863Z" diff --git a/incubator/mylar/1.1.1/Chart.lock b/incubator/mylar/1.1.1/Chart.lock index 895e822fc21..41c4dd8b152 100644 --- a/incubator/mylar/1.1.1/Chart.lock +++ b/incubator/mylar/1.1.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 6.5.1 digest: sha256:167ded27a30cb2e82f05bf85f6b35221aa9d9aa0afc44d99824113ab8f96dd42 -generated: "2021-07-05T15:32:36.945277171Z" +generated: "2021-07-05T16:18:27.845425263Z" diff --git a/incubator/navidrome/6.3.1/Chart.lock b/incubator/navidrome/6.3.1/Chart.lock index 7812bc4dfad..124a3fe6918 100644 --- a/incubator/navidrome/6.3.1/Chart.lock +++ b/incubator/navidrome/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:32:38.771299876Z" +generated: "2021-07-05T16:18:31.480059392Z" diff --git a/incubator/node-red/6.3.1/Chart.lock b/incubator/node-red/6.3.1/Chart.lock index 336c997d1bd..d18bbff3cda 100644 --- a/incubator/node-red/6.3.1/Chart.lock +++ b/incubator/node-red/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:32:40.568679658Z" +generated: "2021-07-05T16:18:35.7111149Z" diff --git a/incubator/nullserv/1.1.1/Chart.lock b/incubator/nullserv/1.1.1/Chart.lock index 20eb243cdcf..ce5168c4d02 100644 --- a/incubator/nullserv/1.1.1/Chart.lock +++ b/incubator/nullserv/1.1.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 6.5.1 digest: sha256:167ded27a30cb2e82f05bf85f6b35221aa9d9aa0afc44d99824113ab8f96dd42 -generated: "2021-07-05T15:32:42.376876073Z" +generated: "2021-07-05T16:18:40.421258033Z" diff --git a/incubator/nzbget/6.3.1/Chart.lock b/incubator/nzbget/6.3.1/Chart.lock index 97929b0d4d5..9c6577a1181 100644 --- a/incubator/nzbget/6.3.1/Chart.lock +++ b/incubator/nzbget/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:32:44.202658894Z" +generated: "2021-07-05T16:18:43.847684921Z" diff --git a/incubator/octoprint/1.1.1/Chart.lock b/incubator/octoprint/1.1.1/Chart.lock index 7076db9833f..f402a0d7ea5 100644 --- a/incubator/octoprint/1.1.1/Chart.lock +++ b/incubator/octoprint/1.1.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 6.5.1 digest: sha256:167ded27a30cb2e82f05bf85f6b35221aa9d9aa0afc44d99824113ab8f96dd42 -generated: "2021-07-05T15:32:46.174146754Z" +generated: "2021-07-05T16:18:47.432882107Z" diff --git a/incubator/omada-controller/1.1.1/Chart.lock b/incubator/omada-controller/1.1.1/Chart.lock index b60482aab1b..86539993293 100644 --- a/incubator/omada-controller/1.1.1/Chart.lock +++ b/incubator/omada-controller/1.1.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 6.5.1 digest: sha256:167ded27a30cb2e82f05bf85f6b35221aa9d9aa0afc44d99824113ab8f96dd42 -generated: "2021-07-05T15:32:48.073456092Z" +generated: "2021-07-05T16:18:50.805007462Z" diff --git a/incubator/organizr/6.3.1/Chart.lock b/incubator/organizr/6.3.1/Chart.lock index 1fbfaafd1a6..f23e1677cd4 100644 --- a/incubator/organizr/6.3.1/Chart.lock +++ b/incubator/organizr/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:32:49.862002362Z" +generated: "2021-07-05T16:18:55.003242123Z" diff --git a/incubator/overseerr/1.1.1/Chart.lock b/incubator/overseerr/1.1.1/Chart.lock index 03b73bc2c1f..c6e04f0e0b9 100644 --- a/incubator/overseerr/1.1.1/Chart.lock +++ b/incubator/overseerr/1.1.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 6.5.1 digest: sha256:167ded27a30cb2e82f05bf85f6b35221aa9d9aa0afc44d99824113ab8f96dd42 -generated: "2021-07-05T15:32:51.685159432Z" +generated: "2021-07-05T16:18:58.080424317Z" diff --git a/incubator/owncast/1.1.1/Chart.lock b/incubator/owncast/1.1.1/Chart.lock index 6643112a3d5..5c9d6b57734 100644 --- a/incubator/owncast/1.1.1/Chart.lock +++ b/incubator/owncast/1.1.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 6.5.1 digest: sha256:167ded27a30cb2e82f05bf85f6b35221aa9d9aa0afc44d99824113ab8f96dd42 -generated: "2021-07-05T15:32:53.486925367Z" +generated: "2021-07-05T16:19:02.7930346Z" diff --git a/incubator/owncloud-ocis/1.1.1/Chart.lock b/incubator/owncloud-ocis/1.1.1/Chart.lock index 7b99e216adc..c6f275b8612 100644 --- a/incubator/owncloud-ocis/1.1.1/Chart.lock +++ b/incubator/owncloud-ocis/1.1.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 6.5.1 digest: sha256:167ded27a30cb2e82f05bf85f6b35221aa9d9aa0afc44d99824113ab8f96dd42 -generated: "2021-07-05T15:32:55.250849046Z" +generated: "2021-07-05T16:19:06.195146287Z" diff --git a/incubator/photoprism/1.1.1/Chart.lock b/incubator/photoprism/1.1.1/Chart.lock index 8d1ab89d40c..f076031f34a 100644 --- a/incubator/photoprism/1.1.1/Chart.lock +++ b/incubator/photoprism/1.1.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 6.5.1 digest: sha256:167ded27a30cb2e82f05bf85f6b35221aa9d9aa0afc44d99824113ab8f96dd42 -generated: "2021-07-05T15:32:57.091903307Z" +generated: "2021-07-05T16:19:08.809858652Z" diff --git a/incubator/piaware/1.1.1/Chart.lock b/incubator/piaware/1.1.1/Chart.lock index 8fb63e8277a..653a05d4525 100644 --- a/incubator/piaware/1.1.1/Chart.lock +++ b/incubator/piaware/1.1.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 6.5.1 digest: sha256:167ded27a30cb2e82f05bf85f6b35221aa9d9aa0afc44d99824113ab8f96dd42 -generated: "2021-07-05T15:32:58.868685429Z" +generated: "2021-07-05T16:19:13.514063662Z" diff --git a/incubator/podgrab/4.3.1/Chart.lock b/incubator/podgrab/4.3.1/Chart.lock index 91443504576..add2d98bad4 100644 --- a/incubator/podgrab/4.3.1/Chart.lock +++ b/incubator/podgrab/4.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:33:00.704211269Z" +generated: "2021-07-05T16:19:16.200480015Z" diff --git a/incubator/pretend-youre-xyzzy/1.1.1/Chart.lock b/incubator/pretend-youre-xyzzy/1.1.1/Chart.lock index c9a0cddd194..e62723dbee0 100644 --- a/incubator/pretend-youre-xyzzy/1.1.1/Chart.lock +++ b/incubator/pretend-youre-xyzzy/1.1.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 6.5.1 digest: sha256:167ded27a30cb2e82f05bf85f6b35221aa9d9aa0afc44d99824113ab8f96dd42 -generated: "2021-07-05T15:33:02.501600857Z" +generated: "2021-07-05T16:19:19.060112767Z" diff --git a/incubator/protonmail-bridge/1.1.1/Chart.lock b/incubator/protonmail-bridge/1.1.1/Chart.lock index 39e31480efc..10452899d65 100644 --- a/incubator/protonmail-bridge/1.1.1/Chart.lock +++ b/incubator/protonmail-bridge/1.1.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 6.5.1 digest: sha256:167ded27a30cb2e82f05bf85f6b35221aa9d9aa0afc44d99824113ab8f96dd42 -generated: "2021-07-05T15:33:04.308505142Z" +generated: "2021-07-05T16:19:23.709997654Z" diff --git a/incubator/prowlarr/1.3.1/Chart.lock b/incubator/prowlarr/1.3.1/Chart.lock index 3c8154a0c4c..1c2256f295a 100644 --- a/incubator/prowlarr/1.3.1/Chart.lock +++ b/incubator/prowlarr/1.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:33:06.096472231Z" +generated: "2021-07-05T16:19:27.252522841Z" diff --git a/incubator/pyload/1.1.1/Chart.lock b/incubator/pyload/1.1.1/Chart.lock index 5ad52155251..d4c14b93052 100644 --- a/incubator/pyload/1.1.1/Chart.lock +++ b/incubator/pyload/1.1.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 6.5.1 digest: sha256:167ded27a30cb2e82f05bf85f6b35221aa9d9aa0afc44d99824113ab8f96dd42 -generated: "2021-07-05T15:33:07.926627155Z" +generated: "2021-07-05T16:19:30.91487109Z" diff --git a/incubator/qbittorrent/6.3.1/Chart.lock b/incubator/qbittorrent/6.3.1/Chart.lock index bd38ee21ae1..06143372b2b 100644 --- a/incubator/qbittorrent/6.3.1/Chart.lock +++ b/incubator/qbittorrent/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:33:09.743217006Z" +generated: "2021-07-05T16:19:34.337604805Z" diff --git a/incubator/readarr/6.3.1/Chart.lock b/incubator/readarr/6.3.1/Chart.lock index ecee3b6bfda..7ddfcb06ac2 100644 --- a/incubator/readarr/6.3.1/Chart.lock +++ b/incubator/readarr/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:33:11.522771457Z" +generated: "2021-07-05T16:19:36.749853922Z" diff --git a/incubator/reg/1.3.1/Chart.lock b/incubator/reg/1.3.1/Chart.lock index 5daa5e0f0be..995944448cb 100644 --- a/incubator/reg/1.3.1/Chart.lock +++ b/incubator/reg/1.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:33:13.294291794Z" +generated: "2021-07-05T16:19:40.891028946Z" diff --git a/incubator/sabnzbd/6.3.1/Chart.lock b/incubator/sabnzbd/6.3.1/Chart.lock index 32438e26aa8..065971d61e8 100644 --- a/incubator/sabnzbd/6.3.1/Chart.lock +++ b/incubator/sabnzbd/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:33:15.11688348Z" +generated: "2021-07-05T16:19:45.551602753Z" diff --git a/incubator/ser2sock/1.1.1/Chart.lock b/incubator/ser2sock/1.1.1/Chart.lock index ca777e273fb..69d211b8b9c 100644 --- a/incubator/ser2sock/1.1.1/Chart.lock +++ b/incubator/ser2sock/1.1.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 6.5.1 digest: sha256:167ded27a30cb2e82f05bf85f6b35221aa9d9aa0afc44d99824113ab8f96dd42 -generated: "2021-07-05T15:33:16.925538079Z" +generated: "2021-07-05T16:19:48.942780125Z" diff --git a/incubator/stash/1.1.1/Chart.lock b/incubator/stash/1.1.1/Chart.lock index 1fd6c3a9c33..ddfb8418da8 100644 --- a/incubator/stash/1.1.1/Chart.lock +++ b/incubator/stash/1.1.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 6.5.1 digest: sha256:167ded27a30cb2e82f05bf85f6b35221aa9d9aa0afc44d99824113ab8f96dd42 -generated: "2021-07-05T15:33:18.764573144Z" +generated: "2021-07-05T16:19:52.872849569Z" diff --git a/incubator/thelounge/1.3.1/Chart.lock b/incubator/thelounge/1.3.1/Chart.lock index 7f187acd438..d5197d980d2 100644 --- a/incubator/thelounge/1.3.1/Chart.lock +++ b/incubator/thelounge/1.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:33:20.52779973Z" +generated: "2021-07-05T16:19:55.501592601Z" diff --git a/incubator/tvheadend/7.3.1/Chart.lock b/incubator/tvheadend/7.3.1/Chart.lock index cf331acb7d8..e62db08d852 100644 --- a/incubator/tvheadend/7.3.1/Chart.lock +++ b/incubator/tvheadend/7.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:33:22.312620982Z" +generated: "2021-07-05T16:20:00.37489309Z" diff --git a/incubator/unifi/6.3.1/Chart.lock b/incubator/unifi/6.3.1/Chart.lock index 1d3f540c3e8..96fb4206d8c 100644 --- a/incubator/unifi/6.3.1/Chart.lock +++ b/incubator/unifi/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:33:24.099709587Z" +generated: "2021-07-05T16:20:04.407998825Z" diff --git a/incubator/unpackerr/1.3.1/Chart.lock b/incubator/unpackerr/1.3.1/Chart.lock index 5c61e7a0469..aeda867a842 100644 --- a/incubator/unpackerr/1.3.1/Chart.lock +++ b/incubator/unpackerr/1.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:33:25.859529757Z" +generated: "2021-07-05T16:20:07.823419713Z" diff --git a/incubator/xteve/1.1.1/Chart.lock b/incubator/xteve/1.1.1/Chart.lock index 156e1306e05..d9b00370f40 100644 --- a/incubator/xteve/1.1.1/Chart.lock +++ b/incubator/xteve/1.1.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 6.5.1 digest: sha256:167ded27a30cb2e82f05bf85f6b35221aa9d9aa0afc44d99824113ab8f96dd42 -generated: "2021-07-05T15:33:27.702627522Z" +generated: "2021-07-05T16:20:12.73063422Z" diff --git a/non-free/resilio-sync/1.1.1/Chart.lock b/non-free/resilio-sync/1.1.1/Chart.lock index fd4bc7e25fe..8499ff48097 100644 --- a/non-free/resilio-sync/1.1.1/Chart.lock +++ b/non-free/resilio-sync/1.1.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 6.5.1 digest: sha256:167ded27a30cb2e82f05bf85f6b35221aa9d9aa0afc44d99824113ab8f96dd42 -generated: "2021-07-05T15:33:31.254109115Z" +generated: "2021-07-05T16:20:19.056008044Z" diff --git a/stable/collabora-online/6.3.1/Chart.lock b/stable/collabora-online/6.3.1/Chart.lock index bfc4e1a4dee..07f9d22cbe8 100644 --- a/stable/collabora-online/6.3.1/Chart.lock +++ b/stable/collabora-online/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:30:41.233078313Z" +generated: "2021-07-05T16:14:36.391359247Z" diff --git a/stable/deepstack-cpu/4.3.1/Chart.lock b/stable/deepstack-cpu/4.3.1/Chart.lock index 9ecc4850a47..e095cbf1791 100644 --- a/stable/deepstack-cpu/4.3.1/Chart.lock +++ b/stable/deepstack-cpu/4.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:30:43.276981711Z" +generated: "2021-07-05T16:14:41.146740696Z" diff --git a/stable/emby/6.3.1/Chart.lock b/stable/emby/6.3.1/Chart.lock index 1022a6f9bff..906e136ec77 100644 --- a/stable/emby/6.3.1/Chart.lock +++ b/stable/emby/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:30:45.101356137Z" +generated: "2021-07-05T16:14:44.708783597Z" diff --git a/stable/esphome/6.3.1/Chart.lock b/stable/esphome/6.3.1/Chart.lock index 2300aace480..af681688b8a 100644 --- a/stable/esphome/6.3.1/Chart.lock +++ b/stable/esphome/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:30:46.979179709Z" +generated: "2021-07-05T16:14:49.760950306Z" diff --git a/stable/handbrake/6.3.1/Chart.lock b/stable/handbrake/6.3.1/Chart.lock index 13349ca0a65..ccabf63cace 100644 --- a/stable/handbrake/6.3.1/Chart.lock +++ b/stable/handbrake/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:30:48.86792723Z" +generated: "2021-07-05T16:14:54.440291202Z" diff --git a/stable/home-assistant/6.3.1/Chart.lock b/stable/home-assistant/6.3.1/Chart.lock index b5fa6468bb7..0836390d0e1 100644 --- a/stable/home-assistant/6.3.1/Chart.lock +++ b/stable/home-assistant/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:30:50.649745959Z" +generated: "2021-07-05T16:14:57.892979445Z" diff --git a/stable/jackett/6.3.1/Chart.lock b/stable/jackett/6.3.1/Chart.lock index 64cda8da5d6..894579be0ba 100644 --- a/stable/jackett/6.3.1/Chart.lock +++ b/stable/jackett/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:30:52.44981356Z" +generated: "2021-07-05T16:15:02.754855678Z" diff --git a/stable/jellyfin/6.3.1/Chart.lock b/stable/jellyfin/6.3.1/Chart.lock index 60d64ea1d49..e9b4b85b02f 100644 --- a/stable/jellyfin/6.3.1/Chart.lock +++ b/stable/jellyfin/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:30:54.320531383Z" +generated: "2021-07-05T16:15:06.12032577Z" diff --git a/stable/kms/6.3.1/Chart.lock b/stable/kms/6.3.1/Chart.lock index 903469d0cd3..df252ddb752 100644 --- a/stable/kms/6.3.1/Chart.lock +++ b/stable/kms/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:30:56.15803491Z" +generated: "2021-07-05T16:15:09.96034767Z" diff --git a/stable/lidarr/6.3.1/Chart.lock b/stable/lidarr/6.3.1/Chart.lock index d783cc4a317..c17c8c3b6a2 100644 --- a/stable/lidarr/6.3.1/Chart.lock +++ b/stable/lidarr/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:30:57.963558329Z" +generated: "2021-07-05T16:15:14.8467455Z" diff --git a/stable/nextcloud/1.1.6/Chart.lock b/stable/nextcloud/1.1.6/Chart.lock index 2720d08922b..aa50d3bf893 100644 --- a/stable/nextcloud/1.1.6/Chart.lock +++ b/stable/nextcloud/1.1.6/Chart.lock @@ -9,4 +9,4 @@ dependencies: repository: https://charts.bitnami.com/bitnami version: 14.6.3 digest: sha256:f046585a4bbfb222ae198153c16cfe2ade0d8938e91333921b62e890cfdb11b6 -generated: "2021-07-05T15:31:04.689488334Z" +generated: "2021-07-05T16:15:23.0547188Z" diff --git a/stable/ombi/6.3.1/Chart.lock b/stable/ombi/6.3.1/Chart.lock index 59484154676..ab0ed395489 100644 --- a/stable/ombi/6.3.1/Chart.lock +++ b/stable/ombi/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:31:13.140612277Z" +generated: "2021-07-05T16:15:34.867013305Z" diff --git a/stable/plex/5.3.1/Chart.lock b/stable/plex/5.3.1/Chart.lock index b8b55068487..6ea44fbab32 100644 --- a/stable/plex/5.3.1/Chart.lock +++ b/stable/plex/5.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:31:14.943933495Z" +generated: "2021-07-05T16:15:38.32359711Z" diff --git a/stable/radarr/6.3.1/Chart.lock b/stable/radarr/6.3.1/Chart.lock index 58c6d9eafa4..121b3e7d711 100644 --- a/stable/radarr/6.3.1/Chart.lock +++ b/stable/radarr/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:31:16.764211777Z" +generated: "2021-07-05T16:15:41.891282245Z" diff --git a/stable/sonarr/6.3.1/Chart.lock b/stable/sonarr/6.3.1/Chart.lock index edd5db589d6..d94c23ceb1c 100644 --- a/stable/sonarr/6.3.1/Chart.lock +++ b/stable/sonarr/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:31:18.59515177Z" +generated: "2021-07-05T16:15:46.542037119Z" diff --git a/stable/syncthing/6.3.1/Chart.lock b/stable/syncthing/6.3.1/Chart.lock index 40b21a4479a..f8de65c12ef 100644 --- a/stable/syncthing/6.3.1/Chart.lock +++ b/stable/syncthing/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:31:20.408659752Z" +generated: "2021-07-05T16:15:51.217301498Z" diff --git a/stable/tautulli/6.3.1/Chart.lock b/stable/tautulli/6.3.1/Chart.lock index d65d7e6b7c4..aae2a44eabc 100644 --- a/stable/tautulli/6.3.1/Chart.lock +++ b/stable/tautulli/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:31:22.232783319Z" +generated: "2021-07-05T16:15:54.849060348Z" diff --git a/stable/traefik/6.5.5/CONFIG.md b/stable/traefik/6.5.5/CONFIG.md new file mode 100644 index 00000000000..dddbce20079 --- /dev/null +++ b/stable/traefik/6.5.5/CONFIG.md @@ -0,0 +1,9 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our "Linking Apps Together" guide: +https://truecharts.org/manual/linking/ + + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/stable/traefik/6.5.5/Chart.lock b/stable/traefik/6.5.5/Chart.lock new file mode 100644 index 00000000000..1860aaf3117 --- /dev/null +++ b/stable/traefik/6.5.5/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org/ + version: 6.5.1 +digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed +generated: "2021-07-05T16:15:56.98682287Z" diff --git a/stable/traefik/6.5.5/Chart.yaml b/stable/traefik/6.5.5/Chart.yaml new file mode 100644 index 00000000000..56bb02e5199 --- /dev/null +++ b/stable/traefik/6.5.5/Chart.yaml @@ -0,0 +1,29 @@ +apiVersion: v2 +appVersion: '2.4' +dependencies: +- name: common + repository: https://truecharts.org/ + version: 6.5.1 +deprecated: false +description: A Traefik based Reverse Proxy and Certificate Manager +home: https://github.com/truecharts/apps/tree/master/charts/stable/traefik +icon: https://raw.githubusercontent.com/traefik/traefik/v2.3/docs/content/assets/img/traefik.logo.png +keywords: +- traefik +- ingress +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: truecharts.org +- email: kjeld@schouten-lebbing.nl + name: Ornias1993 + url: truecharts.org +name: traefik +sources: +- https://github.com/traefik/traefik +- https://github.com/traefik/traefik-helm-chart +- https://traefik.io/ +type: application +upstream_version: v9.19.2 +version: 6.5.5 diff --git a/stable/traefik/6.5.5/LICENSE b/stable/traefik/6.5.5/LICENSE new file mode 100644 index 00000000000..907ff83212c --- /dev/null +++ b/stable/traefik/6.5.5/LICENSE @@ -0,0 +1,202 @@ + Apache License + Version 2.0, January 2004 + http://www.apache.org/licenses/ + + TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION + + 1. Definitions. + + "License" shall mean the terms and conditions for use, reproduction, + and distribution as defined by Sections 1 through 9 of this document. + + "Licensor" shall mean the copyright owner or entity authorized by + the copyright owner that is granting the License. + + "Legal Entity" shall mean the union of the acting entity and all + other entities that control, are controlled by, or are under common + control with that entity. For the purposes of this definition, + "control" means (i) the power, direct or indirect, to cause the + direction or management of such entity, whether by contract or + otherwise, or (ii) ownership of fifty percent (50%) or more of the + outstanding shares, or (iii) beneficial ownership of such entity. + + "You" (or "Your") shall mean an individual or Legal Entity + exercising permissions granted by this License. + + "Source" form shall mean the preferred form for making modifications, + including but not limited to software source code, documentation + source, and configuration files. + + "Object" form shall mean any form resulting from mechanical + transformation or translation of a Source form, including but + not limited to compiled object code, generated documentation, + and conversions to other media types. + + "Work" shall mean the work of authorship, whether in Source or + Object form, made available under the License, as indicated by a + copyright notice that is included in or attached to the work + (an example is provided in the Appendix below). + + "Derivative Works" shall mean any work, whether in Source or Object + form, that is based on (or derived from) the Work and for which the + editorial revisions, annotations, elaborations, or other modifications + represent, as a whole, an original work of authorship. For the purposes + of this License, Derivative Works shall not include works that remain + separable from, or merely link (or bind by name) to the interfaces of, + the Work and Derivative Works thereof. + + "Contribution" shall mean any work of authorship, including + the original version of the Work and any modifications or additions + to that Work or Derivative Works thereof, that is intentionally + submitted to Licensor for inclusion in the Work by the copyright owner + or by an individual or Legal Entity authorized to submit on behalf of + the copyright owner. For the purposes of this definition, "submitted" + means any form of electronic, verbal, or written communication sent + to the Licensor or its representatives, including but not limited to + communication on electronic mailing lists, source code control systems, + and issue tracking systems that are managed by, or on behalf of, the + Licensor for the purpose of discussing and improving the Work, but + excluding communication that is conspicuously marked or otherwise + designated in writing by the copyright owner as "Not a Contribution." + + "Contributor" shall mean Licensor and any individual or Legal Entity + on behalf of whom a Contribution has been received by Licensor and + subsequently incorporated within the Work. + + 2. Grant of Copyright License. Subject to the terms and conditions of + this License, each Contributor hereby grants to You a perpetual, + worldwide, non-exclusive, no-charge, royalty-free, irrevocable + copyright license to reproduce, prepare Derivative Works of, + publicly display, publicly perform, sublicense, and distribute the + Work and such Derivative Works in Source or Object form. + + 3. Grant of Patent License. Subject to the terms and conditions of + this License, each Contributor hereby grants to You a perpetual, + worldwide, non-exclusive, no-charge, royalty-free, irrevocable + (except as stated in this section) patent license to make, have made, + use, offer to sell, sell, import, and otherwise transfer the Work, + where such license applies only to those patent claims licensable + by such Contributor that are necessarily infringed by their + Contribution(s) alone or by combination of their Contribution(s) + with the Work to which such Contribution(s) was submitted. If You + institute patent litigation against any entity (including a + cross-claim or counterclaim in a lawsuit) alleging that the Work + or a Contribution incorporated within the Work constitutes direct + or contributory patent infringement, then any patent licenses + granted to You under this License for that Work shall terminate + as of the date such litigation is filed. + + 4. Redistribution. You may reproduce and distribute copies of the + Work or Derivative Works thereof in any medium, with or without + modifications, and in Source or Object form, provided that You + meet the following conditions: + + (a) You must give any other recipients of the Work or + Derivative Works a copy of this License; and + + (b) You must cause any modified files to carry prominent notices + stating that You changed the files; and + + (c) You must retain, in the Source form of any Derivative Works + that You distribute, all copyright, patent, trademark, and + attribution notices from the Source form of the Work, + excluding those notices that do not pertain to any part of + the Derivative Works; and + + (d) If the Work includes a "NOTICE" text file as part of its + distribution, then any Derivative Works that You distribute must + include a readable copy of the attribution notices contained + within such NOTICE file, excluding those notices that do not + pertain to any part of the Derivative Works, in at least one + of the following places: within a NOTICE text file distributed + as part of the Derivative Works; within the Source form or + documentation, if provided along with the Derivative Works; or, + within a display generated by the Derivative Works, if and + wherever such third-party notices normally appear. The contents + of the NOTICE file are for informational purposes only and + do not modify the License. You may add Your own attribution + notices within Derivative Works that You distribute, alongside + or as an addendum to the NOTICE text from the Work, provided + that such additional attribution notices cannot be construed + as modifying the License. + + You may add Your own copyright statement to Your modifications and + may provide additional or different license terms and conditions + for use, reproduction, or distribution of Your modifications, or + for any such Derivative Works as a whole, provided Your use, + reproduction, and distribution of the Work otherwise complies with + the conditions stated in this License. + + 5. Submission of Contributions. Unless You explicitly state otherwise, + any Contribution intentionally submitted for inclusion in the Work + by You to the Licensor shall be under the terms and conditions of + this License, without any additional terms or conditions. + Notwithstanding the above, nothing herein shall supersede or modify + the terms of any separate license agreement you may have executed + with Licensor regarding such Contributions. + + 6. Trademarks. This License does not grant permission to use the trade + names, trademarks, service marks, or product names of the Licensor, + except as required for reasonable and customary use in describing the + origin of the Work and reproducing the content of the NOTICE file. + + 7. Disclaimer of Warranty. Unless required by applicable law or + agreed to in writing, Licensor provides the Work (and each + Contributor provides its Contributions) on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or + implied, including, without limitation, any warranties or conditions + of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A + PARTICULAR PURPOSE. You are solely responsible for determining the + appropriateness of using or redistributing the Work and assume any + risks associated with Your exercise of permissions under this License. + + 8. Limitation of Liability. In no event and under no legal theory, + whether in tort (including negligence), contract, or otherwise, + unless required by applicable law (such as deliberate and grossly + negligent acts) or agreed to in writing, shall any Contributor be + liable to You for damages, including any direct, indirect, special, + incidental, or consequential damages of any character arising as a + result of this License or out of the use or inability to use the + Work (including but not limited to damages for loss of goodwill, + work stoppage, computer failure or malfunction, or any and all + other commercial damages or losses), even if such Contributor + has been advised of the possibility of such damages. + + 9. Accepting Warranty or Additional Liability. While redistributing + the Work or Derivative Works thereof, You may choose to offer, + and charge a fee for, acceptance of support, warranty, indemnity, + or other liability obligations and/or rights consistent with this + License. However, in accepting such obligations, You may act only + on Your own behalf and on Your sole responsibility, not on behalf + of any other Contributor, and only if You agree to indemnify, + defend, and hold each Contributor harmless for any liability + incurred by, or claims asserted against, such Contributor by reason + of your accepting any such warranty or additional liability. + + END OF TERMS AND CONDITIONS + + APPENDIX: How to apply the Apache License to your work. + + To apply the Apache License to your work, attach the following + boilerplate notice, with the fields enclosed by brackets "[]" + replaced with your own identifying information. (Don't include + the brackets!) The text should be enclosed in the appropriate + comment syntax for the file format. We also recommend that a + file or class name and description of purpose be included on the + same "printed page" as the copyright notice for easier + identification within third-party archives. + + Copyright 2020 Containous + Copyright 2020 Traefik Labs + + Licensed under the Apache License, Version 2.0 (the "License"); + you may not use this file except in compliance with the License. + You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + + Unless required by applicable law or agreed to in writing, software + distributed under the License is distributed on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + See the License for the specific language governing permissions and + limitations under the License. diff --git a/stable/traefik/6.5.5/README.md b/stable/traefik/6.5.5/README.md new file mode 100644 index 00000000000..c60122da9cc --- /dev/null +++ b/stable/traefik/6.5.5/README.md @@ -0,0 +1,56 @@ +# Introduction + +![Version: 6.3.16](https://img.shields.io/badge/Version-6.3.16-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 2.4](https://img.shields.io/badge/AppVersion-2.4-informational?style=flat-square) + +A Traefik based Reverse Proxy and Certificate Manager + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://truecharts.org/ | common | 6.4.6 | + +## Installing the Chart + +To install the chart with the release name `traefik` + +- Open TrueNAS SCALE +- Go to Apps +- Click "Install" for this specific Apps +- Fill out the configuration form + +## Uninstalling the Chart + +To uninstall the `traefik` deployment + +- Open TrueNAS SCALE +- Go to Apps +- Go to "Installed Apps" +- Expand the menu in the top-right corner of this App +- Click "Remove" for this specific Apps + +The command removes all the Kubernetes components associated with the chart **including storage volumes** _(Except hostPath Storage)_ and deletes the release. + +## Support + +- See the [Wiki](https://truecharts.org) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +- Ask a [question](https://github.com/truecharts/apps/discussions) + + +---------------------------------------------- +Autogenerated from chart metadata using [helm-docs v1.5.0](https://github.com/norwoodj/helm-docs/releases/v1.5.0) +All Rights Reserved - The TrueCharts Project diff --git a/stable/traefik/6.5.5/app-readme.md b/stable/traefik/6.5.5/app-readme.md new file mode 100644 index 00000000000..753f84f7068 --- /dev/null +++ b/stable/traefik/6.5.5/app-readme.md @@ -0,0 +1,3 @@ +A Traefik based Reverse Proxy and Certificate Manager +This App is supplied by TrueCharts, for more information please visit https://truecharts.org +A Traefik based Reverse Proxy and Certificate Manager diff --git a/stable/traefik/6.5.5/charts/common-6.5.1.tgz b/stable/traefik/6.5.5/charts/common-6.5.1.tgz new file mode 100644 index 0000000000000000000000000000000000000000..1f89b5f9c75ba7dac91dd828a7fa3d134efcf031 GIT binary patch literal 23437 zcmV)uK$gEBiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0POvHcic9TI1JCfzy1^$+Sy3?soA>A>322nY9uG|jxRcvoIJak z919}RYD8?3A;Fdv+0SQx4z2`1fMiQ8*-6Bc)kUJQmn zpt-Ehk!tAI|JdIMH+IAI;riEu8N?}pI7I~mhGq~aV}R31_FpyNFe@$w0Hlz%S7QJG zRgsK=RZu~>{1qkff0fZRs|ZSm2|7Q==|z|(3f7w<#jxD?_S-EFEM82sf?VflESor( z%l7PsJK@HlU;m5wKZi+$%6k$3?el+oeP?IOp8tCryN~n#A)bpQJBP`50KgM49D)-> z08BwPM@4~S#3neIB9IqofdLn*-pVr4*#COE}ZdJKR9 zP}dyLiCtt#f(iu&rSLpK3{w3y902hl=99xlS{DU$euV7%k1)Y8$e0`}0W2szd6Hev zP)gQ74ACr0OGH3cfRaFhCRI`*G5~;2vAVFys5B#xgUnKfye>G>;EWW40nlrW!ObTf zU;@ukvIs0*K?n1?nw_J9c2tZ?T%Z`_Sxf~}f${`LupEPp7LHZV_AF0NV8 z@3I0MDPqbsFlXH4GJ`SmEs6>R2?8rIn!qX{s{p1kc$*~&PA}f&F(jfRD6A9FniJ#% z_9i_-2_mQoq6W`_9Who=FaTeqSwY7NF6lQ(KOIYj4uZbWnqTwS!Zd>)K$XHd#0ed1 ztd{nB5in&{TyOyFFRQB7wN~967DP@MQ2$cX<1Oz|3Zy`DOl3cq;*w;=HAwIb6V~he z!w>xZOZs{Ywgv+{gBSILWxwbU$x2Mi@$n*lSfvQ0s*k`6>wR7&3CObqN3=Tqb5W;2+^E9I&ZF`{ePXk_|#APSAa&%Zc8z~Z88sZ2k!nuE6anrHDK&*B4X zP7XX%QWSq#Pdi@nAdUe9KV${|of43M<17XT70Jp7Ca4%Z0skc_91g*M#<*kx>>mRt z%HWi-Qwg>SOiIMqTwEYBri`w~m=L`)oW50)8a!e1dImq3@7C89l*8k9?+8xt@2sK6 zsEANX=qR8CpVj4Fp;=a3w-z0gsF>pj9Yj%9rKA@8Ig0QEqY_+A5t*U_Kp=_&$jgFq znpH^*&Jo};BOUT;G%BuhO4j+coDplh zDU9W`L(qhZNh%bmRC~hsnqHr0@iiv^MiDAY$!Eu77yuishIJyw3R;PbbQ4+sJ6Zu=b zIfi69X7eCSvlvk>3l4YBa!rh=OsbXI05D6<&? z|58(pLap+W(Q?SZa+w5xE&}N@6eE-&Q<98L_b~`IqvS#4U^2 zfEHS@q+z>gyoQ~ zdd%9o?W>`Hag4>tj&6;q2I9nbTx91+O%*l*_=g@ti|ZX(munM6sP;a=bCja892N-1 znEh1}Sdc0o<`jK7TD7chs_@QHl3fjW0cEtl6re!vpqrL)Ljge2psnbh*Dj0106XB; zi0QX5*5TYPJfok^sNAA5^$M3$`c_D7`mO-kRjPm=E7)99)GG%8yQGU_?!lprBiA{i zwt317MlRBomZ=Ff+Z>!89tZ3__lBGv9@hw7Oz6tz^z>L@z$G=PW3^OgbAf&z(SJ^q zs9EJr&LNq~Ixf_sK&*bL86bZt%bxOu+X-?sm%0gUuMQ2ag#y%ziBMk&im2^;COOG^ zVvUo@aZIx$E+s_a&5{cXCv4xy0gQ4!ZUCG17$!$3f!8M}%F?(TgH7=rl1lPBPm5;j9H zEdgDb!4g0)gCFp$no**5zS&ye-`H8Ft5sT;jUq}UsB&=5ojaJYNm05d)Q)%F?5;bl zTG_RV?`$`cn~Z}e;Gi}rRmljZ)P#g_%zaVRUSvZu#%%u>7T4esU4s(OZ~_ZyVSY`` z<*y}}&}+Ym0%PXy#A#!imVm9%Oa8ak2FGlz>%O9^Sw3Ic#KJR5rt}xCRKgnO#^V~D zY0N7`qA(0swQ-saR1&d2WEp15x2Q7Xys5V^U zd=XzwCinvfFQ+Z8k}2>a?Ww@5cdpoLp3lEDcj?$>tqEPTV;=F zxxC0o7G+7OeLJag219e5pHUTdw#NT|LjO2DJU(NNrL%WO$7gzVuI=b2q4#oll>$hW zXT7zM#^3^xdgkGjpn?vicW+;^uWX*yz8S6coZvBoZZ%1*;_HdYwrf~ZEyIF4D2-Xn zTFrghQv@{U4EqwAy?a)JKBGNWihZ3}Xilvgl#Ict+DvAPbzPm}v?K_|Ae(4-Xz8<@ zp|_ZmLV4fpteNy=Jw?JLvQagxs zP5x2fJ7z4y$#ui%r_|+O-U$6HrqiPgY*KY zA3Q}#QVwCnw$15m3hu=qloqa_i|x?$nUqh!TMoR`_i@E2cILRr^|~F8Iej*a$bahwBYU zr)+I<%)%6nkJ@6ffk_HjW0A-ub%EFpZ-nZhK+#xG_$Fy@$jof&2U#;}E!BVe^28o4 zA^2xTreX)11qx8{z(*GCfxO6AR0lMBhxZ3bxH#ab)c!ahzQ(8-lBCoq;^8qWeudeV z5PbjcMeTMmWqO1Pf+y7Ml>R8%KM_pOAu5RBJ~M~^6FJgcgV;8WaynK@LOIODw%a&* zM`t<7WRMS)z_nPRZ9oZP8>KiE)KfUKtV#)0GVf0Q31Y+yI?K``Xx3t7@z0uZrBQ1c zRX_hS;23BtwB5BuTY6u_S=hTMyfbwj1}gXNeoepm%~OpYwf!ez4jQx??qU}GREDiy zV_u<$$*W_cjc&JnPn54$tEPN1uF&Ru9<2d1%gOZ-F4ovYqQaTd!QG&mHz%L#CeI`* zA{C&Svmo5#9}j^DIHZMs!b!r!GP7yYYZVz@2;-KUS`^M}75%2*|HSNXlJSYeow`|4 z&5*RF%nfs?b@i~2v(bN2a^7c?_hgFR^XmUNTN6b^s0J91lDKPk`8T);dJ2CGkWDTZc8W>L_MgBtyE0;85w$H)(R+aON+#OyKz1R|zL1 zE8qnJhbm-AEX^nQ!T`WlMI~Z!kY~fQH4tB?aE2qQGI-=LWhO2q$6`k{CLV|X``yXe zn&FpMAW-2j@I||t@XBn4$dm;rB_-k@FYp|tpyaLMjcV4fQs!|$F<8;aSY<<#gHEd? zp{qj!64RG#%Ypev$r^~JnOaJ?TElVbFu0vJ)Q7s*fw+P^$h1He3swT?11{MJjS`4w zYjvlKEeG|TPCUbW(j1hs&>@AvkY8t2F=QY$8s3R@ag?RM%A;Fsb#Z0@I19DFT?oqR ze8@L&(ozmfWwgZggq1EGfJq68EaNs}S)Hq?L%VWVR_DyV(H2%L2Iy6$pD&TJjab9; zRlO$9gk8auH4jsrWie9Ir1lS;i!C+LMZE7~RQz24UC3|4VT@`Dhn&Jv1~UyQ6(#rD zK-IJ{c#B~CQ-KM3L-nV*#Ra(l%qEIP*$TRRL1pdb^75v{zoRkO_#P|Jd|i_?rI*Wg$tGB8LF&kttO;=ZIV(lmeLO zQAGod)r)Xiv6tbCak1LISxZTX$1WvWt2s%!E#F7HwqtELLou$HBO%}c@j81#drhKDX9PXfHnrb{$YjH7R zVl;0xXoTqOY0jv9ZOX$liRR2@hs>^zbkrw$oUp7&m%-FDqjEf&qUcg?3X|emm_;U~ zk|xSi&8HD(QAL+O!uZV!X<(Y{;H&N+@ES*q84H+3(u3L@T_T#H9$Q{BoE03-YB^E9-9fj?InQ+{|3w>MxD-{8|5&{O(mLY` zcYAYP`^00WXV*g+yF`nbNf(h-ZOKxBz7%_{9z%)YP zfH#7fSMsb&sm?2K(qc#;i{{q#k$S0H5`ke#1nhgQ{%eR-cvpD?ruJG{XJm>__}>d) z+ho{m(>IzTm=DFfA@lJHR==j^88_M}m!m8#Nda+677a7!XBlvMF+_9j1{lGz#1|=x z52m_v^o0J)ab?Bofc`oWzqDv;K8#BMCv0!>TB8XRRdS06_&%gbY(tpFLzoggly6oC z@-Ih7IALUwED`&}++|lYlL!voy-j!S{9wZo+NFBlx0sy6?!2In9k!ZyI zjYBYlc}`{Ai(~1i=7r>`lBJw7fN?w&1Pn>Wc#TLjWHb!vbY_1JA*Xz_I?&po<{{3< zAlUeJGu+sH7H)(a>+5{9D@yqZj3Ef5%Q4DkfqZv$brl-#2ZjMzpfan92uX{+1S5Vd zxAYtj2nVu?I???E{DeSNRxnAfL4l%dHbZI5{4ZMgU>)!&s`K5U3?vB7#l9&EB%^~p z!dX>v*wHk@nq#giQ4#V0G?fbp+YN%)>0 zEJ2E>7=y(%KlWIlSvHqSt4OZFdBJwc;Dn$8d|k8qYwp?O-6Kz+MR_#_8|&*c@ta%7 zW3aLL>=kD3WY6}i@wrnyI3JP!L!EORy@yE>l6;wIKsxgOZ0_vX`G2-Ib{_M8Jjio% zGx}yAPU@24I?t%esU3!NaHwoQZ2E`b1>uK;3Y5mEV2l2W{*~|*h8#)Y98yb5o}A|{ z7@6oH9DFnS^l5N&Gvr}H2m~Bi2$LiL!%tNF(XXR#z$;W-h$A&w1QW4=AOpD4SSOW# zi={#S%}4`<(Qi&CB6G;>VGxgmSzQX>Hp2$ zbxZ&6Z0&A5>i>s$nEq!rzlzzRLIJTA166x&*TGUr|Iv=oBpKj4pIF zpyGjb8^W*mO?5CF4hMQ_LY6gfzA?DOX*{ke7|alXF(h!TvaL8KEnjrX1T9LLiqJ5x z4(8uY*|@C>XSU{XNO2LBW+(@evD4LFSX4@|pL#@{$JEe@gmgWeWH5G;*+!%u;HS~y zr&FU+9&~bNm%6!e;d7PcfTh!h_rwg6X!=s?nzqgfW!;yKzS`yB<+v8$wE+V_gWW!K zE|!Os4JOKGW~UpxH`7ej1-*Q?fTc(+p+ck&fa7G-v@baqyOte7@xF3^2Qm+-b8)R|)IOXE^B=9GNP|}cS#5mL^K%Bq zLfyakSJm0le`4fP6`lZvVzt3%GnJ{_xW2j3$m%g1jTESs^F#0e{npmfm8<|EOJ52? zEe)z-fg{JNNt0Ho#y^7}-f1~iS?9Od5hg@VjSlOCrC05SV!bfA{b-Cn8l!(9W3*}i z$ulL(+XL#f|F#aaU>D$>Ve~!6n~e@fmT-L2T^c zd@u6lieugNX=JFuH+EMFm|h_8l$KuuPvsHZ@xBrV@|C&4AxoWS{ zU!9j6eZ#X^*4s!M50vYN7`NDi)!QCq!PkJcM4hP`r>Z(Sqp!Yqck&GV zyQk5EH4j~bp^fs+Q4pbm{E#IvDgq6UlWq1uKm}2|I!|wHglRvtKL-tg$itv_K_Y6pi;m z5cHwFiPNH<3B4&S|AnsWih*R|YTY{78CL5ALHm}x>THQP2rTRC^=g=x=(=fMh3x zCGK7Ys|~x6pczxprh?*-_Z{CI>PwT}vX#6(Z%os()1%q-3Gl8K^OApvHq)ZC+KdHu zIeNGTR@YI8LTUDB6{zWgP=1)@*R1ZUu0HeyNIs7`7ag)Mj(MQ8C zI#XuArU3iS!+Y3^Rk3_v)%3%dwyphC!>g@ZC~-r3Rl*=P%KJ^(W)E7JY}1ktEB8WU z5ew7kx+dPf>kZCXBkIOBDq8Hx&n+g$n5bB-1Wv@@sdw)N}0DsjWH=`15Sj@!gU)IsC0cgN9341So#`G$@&pJQC!2 zyvm!F{PxEHF;%HKODiQ97RWLNjRY3tTZc=6`+qZAoi@j`_d6 zwb_XO*xP=L|9Ft+7V*E@_3cXy05*0Ls3-=s$< zLH8KStIvfVvAh*Scd|f4Z@=)|u8`j_hXvtRakK^Os#4w_YzKPtfRVI9OTS)ly0-`5 zHm02~PSz2r`xrXg89FO-ds%6*)Y!2$;O2avST@5|SCTetbfu;VC?IR2Q*Vl%{mRO0 ze{)m&r<6pfOUrzn>^l_)^TSiXBEKZYRsN?|1$+d*Rhb@z59*{hI(9v|O#O&7TVpqA zESsZE)bWppPNG<02Q|`t!OG|d$k9GcUb7OaR=h6Ou zh^N*5hnDp}RYL;g8Nbqo4+{S}pi+sn`z`~FJSIckz>|tV;>GDj!?((;%4rT?ivXE! zv%sjyZxHKW*|kimsT<8V&k=!g$>Nz&?&XVW#NAdYQqeI~r>u2v(S!qXEw1Q$POaCb zs@44IbzWOm8ttx*;+zE^m6@;engN*M^sQ?Jp+nKiXrML(0QjLBKwU-yuq6N>Qs78u zvwP5S$`6m%Z~%^?x(P(QVyiRX$HhVw_jHWY`k|TAYsY7Ms4@0W8!?!3wutcHIYwRTto7A+ixGD&I z&AzgheERgYE4b*s#gu>kFYg>^$Nb;h+ugJG|8}-EALsu=JPXZ#m?Vw!q08|6H_i`g zyY|%DUeuVs(aw6xx-}rJ%v=QmxejjCD-RI~5!x{^!^S><{=IPu%*49i65-*9i!eem z=B^l@Rr%f>@!jCczI{y6_}T)?6@elGK~CxzlZ!f7UxmnY$2f(ndIt#u{iJsG`ufu5 zkVQ{}Q|9*;jyXtZGR{$`2L?xwiV28aKP^~k!{e7@HyCOKTJd5vdqou2Tnu0f=&EsW z;wdgq2+P>vn0pb-;Wu2I_iYvfL7l!nD&n9%Ya{yD$`#v5lcZ-k*z0AG3aAquGwa(Y zGiP_q7VL>xzfPES@_%***87QQ=lTLTy$qK^$}s>|>D!s{LP?=6&bbDz3zlLC?Vq-} z)Pm4405$lky|$h0%BAa)AaxxfL%1z2tPYQ>OjlcX-PCXF?8(ufNHnjiD6)#MgxfNE zdKrjKCq75CwCc6LDY!!CC5oy7spQxF(C9;Q+~_D{Ge_AZl9FYl`_cw+tsNu+`}S)N zrFkc|#vON+hVzDPM_K71NaEi)v=U6%RRI{9w`&_fROOK0XrgUFu^mB@Q*J%=ZJjl; z98ltGn2tOa`i09kH;z;ic0vipDIx|9FfL}?N#`ZnyT|{`Ve%CdJb&SMl1iOLVehWZa&CXH5 zt26dC>Nf2Ti=x-v_{(}=b)s@*is^gy)$jkYbL8LN5!B)T+1c6Mu>HT=kMW-m^V}l- z(;gV$*X+E$zP3sS;>t;$DNNid%j}L050K+p2Iu~-eiGkUs{fju-*Vr#DtStRo!w{V zhl?Vsa@QA)9+b|T$Fdm2eGuad5FEdIaTJJGt(7=7S?haNi@$SKyRlB+H}Do!dQiSA zSso_?d7i~5)cnNc`Y=lg`aoQ*7EmVT_w;9jlrA9hl2CSarG2oW>ie$rFpHpg@EPtsqMae8Ir=w|>T?S*27icKv{~GJ%~WhWgw>4`!(=%nzOtz_8@B*6wx%hO2P20F^b~x zS219jWvCutqGVP4%|yZ~gCD9pM|;{S+Re6Blw(si^rL^+oC5M1X+~Vh^5Z-;V?pJk zU75<`Z#rAVW^FzT#jUCiD^6awDgk;+dTiguYjIVsbK%;XRkvo-4L{C(kX*s*l1}dl zDvX=qQ>q2nox|czenj+>(Gtc}Rbjl(ZyNUGWTZS(WnJqZyO86stsC(^zb4-W)68ho z{+8lbFkN4>!Xi-I|8BliSFD>bp$I{84P#SZ!`xjYy=R2nzLFM!9r zPEu{IFMnPTg1W4|u_!gerUP|jeVP%#jvcY~s@E2-o&m|ty`3*O=E%SP<2S24!1>?p z^^FaC|9@-iasBrok9RF5FV-8%d+hWD82ct&3XKo??UT#i8@51xrVUcHmCl!%G5XL5 zAXs5p3hcKcNr481c{j)VAb6T)F?x^lpl+jR-1hdC*6xgCQI@bO?DA~0{IULB`$WYV zeKlh51~*zhTGP!=-?*+1RUY<>!uE^HK|o)h=7}jHMGN=AO6|?1g`Rr7(yY82hV{)Q z{RtD?GIXFSN?Nqh6Rj+;0P8GtinnVyv*Cy$V)9ibRXF_GlY= z(gWNAMIxuH68EGwAnJpFezztQzeM$Q7BiP*ptn^LpwG!L6(y}jZdQO59XxlO%P|}L zaC&+iutv9+Ice;@o4nbeEij%Z3rq7I8qM&sbH=K$~_>yV7v73 zd6=ig{$E-i@DBTbYje}i|Gl%j`I!IvL7s)or4GMwhw9q912=tQ zb#L5}y523NMy#&6t~ZwWPxE=S*#6VaQbK!g>cnX*PlT&vFbr1BmPulp!L0I2D@vOQ zb!$|xW>y%16c$!@u^Jjx^IWYvhn#HzxFf?PI-O5hp>UU%IImK%Md1&Wawb^OT55t3 zOji3B@+@4vd2xwQ?%N5vTgX;h{7t>nv(P?|+!bjgNmx8Rg33f7x}_e~S|!5(vN9vs zIT7xX4WU6pGarK8&5dLT-Dwb-HLXktvNSs-HT>W2PTaMat=tR_3jhf4hoLArWTG6K$-U6{p)rJSM${9m{%r*LX~i1seY8YB@8h@smX`;*GyZ4Gw*Pi_ z)*tgfJjk=K{b%QgUZ%xoB#-u3eR?S6T`WFV(%#;ZH(UP_`ph5h>Uh( zxCMtvRT5OZI1X093flozA6JE!kms3D1)JRw$xpnz`f1oAR-v04l*To+!XPt9dzr!b zpD=-Ggo;2Xg^eyz$~io=iV~ms&Y;Xyyv_KMXXQ@|IGNyxM=J4>&QIp46o2J5oH~ss z%rJio(+hca$oF;Zn;$-C-k~%!yQ-@*e9b5k3(Pv0u=D()-PTKkUCs*aK)Em437UWM zam5X%4@%;>FbQVMKHcTh+}c{B6n_kz8c(Z2Vo#* z`eN+NZm*7J7#heRnZ7djHiwpLKGehPd9oQZ1V5}_>bZ>UYtj@p*VdD<57xQ?=Gpmj zemy-r)^^3}or=@L;VBn}L)LPiVpOreVsT8$pdr{nuCN)8>?dzV@8GNQ-@)Glb&QYuDQ&T}(A_UeI~omcyY+?D z(64+ED&jNW_reK(yzFI3PecAE_ z@>spMxPHjqwL0xbo=My7uo`|!h5x44rEWE7b=|_M>1kYyy8$DRH==HhBQJr=uPWSM z4c8$ZmT(Sn!ZQp#1*;$+MI}Z8uPZ70cluTN?=%3xa5!X6n}x3?eQGC1xJ}#`_f42S zIFghqo{S`A7>V_ZyTNR29Q_Mj^9E~&6hDIV-EEXc=AIgbc!{ptAQpHI3F-^-=8tiX z;qkfM)1m*Dk^ZqW{%d2$zW;f5^D+P9!#r~RS70

`2^*pU1-!KnDPx;0O{HMiGf* zswnm^_$(Q%ZFu$2WsY6H6)I9^RY{J-_5Rw)iCU}4{WDGlh4m&U{IIj8;QocK`JHjn zL)b}CjZAHh>Mebr7pO!jQ4nh(DNi)=)t~;$B}?lIPI)(Qp-JjhSp;s@> zeeF6yvyKO>s4Y30eWAuS%{*D{oHu$aCq*^`b68;3OlsD(wydK?PX$SAaNM5odXdx4 z8->omZ||}9tgCO4HYirJQjR%RJ=8hblxd=nm_&5$wFtLIqw!0A-1grTQUg%i@V`(0 z|N8Fcj_v>1-FVFZ{~!;$?Ea9)Y3TtTxe=1~|61;p?hVu<0iGRvd_w&{IuNh83um*x# z!1jcw_T|BX&HoHyvTgnw30m(U06O>o8u$P1?e6V9&i{va*!(|8lI#lnt2#%*M<(w5 z&bS{mMrr7s`pzuAmo+GTOG<`Igok=14R0v%%bBVHvf>sk!xw0Km@vhCE@t47h^}A?0sk*9`DyABh~Y2I|oICQk}8q(ZXEL z(+ zVy$#B6CP3^;X$5D`ObEEax3C_t|g#vR`DH2YQmYp6kecsc+R(0)CsGTI)QIf%$|rA z+=a6ZHVmEgbzFO|-B;PH%MLE45i(mQcfKB_>!0~)lmC3^-23^j?d{FR{a;(VTaWVp zAs!~Do`1+;8aLwqcmijic+v%n7AkO&Wap4w&ZG=>J2FiR^$@o-1iY3N)8PQM4^~vn zwd1o~Ht`;sm{A` zf>9FlFvA4TFhMb0*O4hM!OHnH>*Ax=C$ub1FIe{5)o}1)0t&7HI1rKTwiKg*y~6}t z;Uu9;#HyrpmH;y11-0!%rVbL)hE3WUSLC?fjd#I!;v%pmjkN~2=6GuqvBsQiUH7=- z#{gt?yPg-HLAI63`j)^9_r4Yns`_38#u}!96#*(JahGWzFe_>4s=sO+U+)`Hs+Nd+ z4)SXKW+D(XQ5)h^9tzu$4sSNh#hl@#n03}69EF{0`3kg#Y7$5MU0bFF$`cqN5d7Z& z1n+~z<%?{UE!Ks}dJsh{PdUkG>pEIe8g*VIOUSv5cl4}q_Iw<5Ikvdadj?NCIbqx^fDs|hDBFV1Hi9~!c z%9HGRrnX`&SI|-8^No4D(GM7+S(cW_1DAb0K?{Q|2_$GzB@D0&@`)(mf<0^rr6&M_ zIZSX2Y@91!m8*e|B9~PDOD=TU?0$^?+e`n{>|MMUZlWwn2al!ROl0`5P z8cxJP$d!Re=D@!R!RmKjsKczJ$~~$=05t3w0k^)qEfxVdt+lEW6^<$^*$k7~?&CG> zG*~m*_PDM+t4hN7L2aa~0uy9YrK2-IsmP!Z1a*M5q{hJX#mFD`{8z$q^j_U|aewze z?KSUz+S+{F|9g<|e5 zAFY%2x^#l_RIzcPix7U7IE`PF)F3KwdZF4WvZ;l>qt+d%HrmcMH)w>#h0JSLT$Ib8 zZh5qo)`e2ybhh#GRv8NnED4^V=sJ>j2CAP6LLLBs(mAViQy;jzMAvH~;7-q5gwnZ| z8(o_TPeuG3?`Bp{-NPur*cUMxt?P%I{qvTGxdujcaUxrcW}{yU|ne09LQpY5gc1V7 zZ>Gg5nIt51LzD|z7g#zmEYO;~P?JQ?ja{4B&D(027Om4>aRmO^)`V!^X5hNsfMwHg zaC6m$=1>ApjmhU=rXi`?sH>-?=yVJ6O}~p2T<%kp&Y5)66iI=EfDzxuW{y?6ra?t- zb>?t@)rjdh=fB^gNi9wnHG(=hVMp84Mi@&pzz-&p0?)MOY+Aap8M9ME(JyMNfr+ux zyv6P2Mq^rd3!;nc9Cc7V`ep$5x|Ls3dRkQI^}z{XX;i@lN>Kp`ioy5C?*L9G8E+&l zDLYD~mSwYV0OUPoHzIw2_$ZT61Z)e1uIS8ztQ0|=2#6KcuQjLv?E|&|)L%78VHJ&} zx2l7lTBQ~+R9aS+o$J3mi|^_I>RA76ZEe{3Kle5s<9{CJ;p@KvUH|1-%$IYR(AAQE z{TB{;EdcW@Zsy?Bms519#gAaKA#J~FwZ=CagS@##(IR7A`x&8UwcxntmZ9svC}|Sw zLQ~+30hGz4X}QMBv9=KFSV~1x6juol^uB(HgBCM}`;TnvUZ@Z{gEwKatr zr)9n5RzHlzxlzQl;XJL-;E0Tp-{GPpKVdTcftR#0Ie02`wmeSDIuoG!vEXRosc*!- z-AkN`gAKI>V}JG#L#MWK$?!R6yjhSe^CH|1rEa-{JdjOCMI19x1QU~JMP#0U6-ntT zTP63JaowhlZRHrZu2MKPp5EjCAi+>1HPn9IU2ddVj8vfEr%wa@_uZjGE#;;B`|eOl zmY||eC9C~h5cXek&u*Dd5Bu-VSs=RNzxTEq`Tuq{9^?NWNU3d@|0(F!*|y zdu*wxg=pn6n;&x;4K2T*E1|o-o_441^JD@vQviZyoYbWzs_44w30rYcp%iQ?`viE5 z29GXtqDS>+iZB6G!dG`HUM+*K>r1}t&AaPKxoaoGHJyD%vRwy3=J0V; z(|{V9@2&^$yX8M~#@y%m@2%av&Bpo9t;hBMgFIaRvpyDCkm=e#$u4lzPwER_-S8gn zdbVN8dnN)Sv5<{XS3p|5d$=Q7%g*XJ#_4KNk87pP3*{(x<%Jwv+^FN{LMyN$uZ23K ze;Zfi@s8Ey9xv3;t`<5SoBSLEnkl{x8Wn|~fej|}nlz3ws!Ed0>=0o7t;|v6+U?l% z?bMl@hSm@;I)2#LxTr~Dfr3NFMv=M%S(OS7-krV)8igI4b6?xx!eWI)dmu8c-%hTv z%VNE3HeS1gS>kBqmN&lyVAVq>yLR|{M8<)u*X+{LjNo_P${TFYQ7EpyZS1x90LYt5 zY7nRVni>xTFSl76NR*#s(PeupT3KrJxn`F*uqhreJ4Q6XS-G<{i$l-5;kt&Bgvxxw zFgZdAygorumd2&gjdU7^jzXZFtr9%7HLC)hP772{vm|c9woCK`Oz;e474ed6e(wo1 zM+IiCVK+?Uvm0X1b%guR<>>!T`%mBAyQLM_VgGHeZ&>!<=EnN=W|$+=PX;(J?Tca(isw+0zGutI*AQAjH*Xy<$!B&B11C+l zl@#e9*bTqT383Eb2&lRUgILE-F+Q2nNTa%}&g)9z$Jhu1bSMl9MuA}bCQYv8zBd2W z0mUZt?k`CJN|!t>+$~o2YHzPr(6H`@&&2AQ|Z63#H_CA z{RV(qQPr^dB-;Q0r`e^FoD-+3(cX~VKGN&SFJg3}A8K1>PCGOb;~ z>k{MznxF!}6qv>Fgx{x&OSWqvBGMXU?zf@rICDMv2D~9tR9xW_0Zs->3V_(n=u9J7 zXzdm{uA?;y^PAg#YpKLcm8M@tYu}1>Qo2vCc=4?^BYabPU#a07SO!6sA?m|zGkB5} z;=pR>f#ztg~-NW4CVmJ03;li9>@~w5Xmu@fW zpk^q>Rl`%LUD_qV1-xY7y|c@Qp~SzVmw1NlT|FlfRoI1x{gh?LR&yO5&F#LNtk){6 zg8a!lDVO$O9kj1jC2UuY8oUNj^|_TVvQ&MKs&>I@OE_|COSt3L7!fjFUN6km#|ifY zyFxx(2Q{2W!5bu)XTh5qp`XWP>CTrg;1Tv;I7P_}U!+-qmXD*u{#)PKvhzQ0?(RP3 ze}0hX2{?v?pdu})8Nf#XxSFCAoL4xBae4uA7+t~(REC2m;B-n&6TanNf^v$I1Y9K9 zIha8bO>ug$1`3owg6D|IDD6E=9wYK4oS^g3k+BTz3GcWrw0@C+xxCyDAlN3%m*oKsqfd z#EyWMgTXi7{E*F14lmI7n{U8>O57KiOsn%S%4Q={REP&QjbNUaBT^tVn!%EwV#GQ0 zkHO%{6YvUR8Hzj@d<5dAkLNRLi+lv{iUfQdd<4Vca0vMS^}zdEjQw3 zD5b>KY23!(>>v9Z;l^&bK3qRzMY#z>QU42FgO5OLdmf23Fa4{G3e0ZzpePvy{9pM$ z<1hAW@DUt;|KbRI1URKI&USX6opJI$g5!6-FYjI*ocs%X1f{$^?kree-wf1uXZ-d@ z9{%rRoO2B}^%x!k3Q2lTSnG&YSXAjj z`L0AoEsoY(tMdS?TMaB(xjC??4DV5KQ7-GDW}(PkxG<9qAR^X7aB5?7YjdM_RT;Hp z&~SQq+#9(O#&YX+kj5|H+Sx(GWK9%=0u{P+!Sv{07DEaAGzp z#fhtQPnpJxb}0{9D#3GGAs z0pqw~Q@wtE`u^bP)r;3|V!OcEw${o2oVvPVG@GH3s?iHxqyIO;^>A~2bAA2U=AH&Yp3n15=i%uQvm7baH)S4%C#!^+jKGy3}0qp#3UD$C5)}ymqgr&>{;^c|Q;N-7b=UDQTncxph zQyimWhRag$)JbF`gR@5|=_gB_RO<(yeIi(y;7YBDtATt#7qHp;TIhZ3@itTZmWKCT z&Fp?gb*J%boy>NY=`$RR!@wS5^z9FBk%TacP+7jpY`||3jDIRHL2uGXTkkp`bak(z zN*x+yb`JmCimk-ITa<2mkK1cp;=D@PO(#jxi%Nc3OQ`MTIVY;C$^yI)ReZeQpS6}{ zaSws)$XMYk$xnAl%TS)t@KSCS?^qq##oZy?wQs4tqARXk)!kZeuWUzS%T-ZFH7hW@ zrCxzxj2GZxUA`X^>+*|o(W<#18?D;C`DoSa&&ZO%f>e1=Hpnh(Z-g^3G z`gvm7{Vw{F$mLw=Q?lEa(#Lb+g5S$MVqJOApTE`}4!()#x>CVoos^`21YKM^2!ER; z2~IEGY*#5J0k5l- zFG+z&G%Z*`Jh>i~0VEsS8jZkD2&4$b{06Rx+_NSbxWv&V$R_*- z848y}TmzYm)TPyfi;R5?z*UxhO~7TET>*HWRRm;J!9JC|`LwmF=_>?$BlGGo0-tI?f!O>G#v+cBLmq<^Cu=qo_V&|SUHJs37YRDyIZ(!RWr^)35RS6_(K${> z67ov@Owm7^gEH(K+v4TCOHRXi3)z1 z|LcrApXKCwrHRt4S?9xB1Mm4wBzA?6uJKm_Zq*BWh1>Xb5_fGh#jius;F4e76y)o_IqzuKgrnYy6K z%HJxO@K~OeW}mEC^w<+Y{k1Bld|yF*P+XLEkkVceP2t{AK2s345YDi;DEG?*p&a0p zZ-wY$lS8eG+a(th(hS)RgRv%IeCk9;#Z3d_qnQ2+h-o%0JTjV&rFH?$YTsHq)7lRz znkm9Rt6ZjSyEmcyJe}WOCVNHl^K@iU$1SLzr}KuK{ujDtOjDBD38t2dD4mD= z?|t_1eKvWI(zz~58Jb1|Ze+H?vB;&RYP!hzF3Dh{Z60zawCw(NxY>t@i2xk1@-Ec> z%(A4xRS)X(EKBy8Q>_o~a}GHW6di-Ajc`$-|p3Dobo1nTKs>Xf5;OYVWPId z-5Q%BJvlu%eR25y`RgCe{$B&u=l9>eee)_*7o&viikY`)!vCO>bf1akG>ds2wjS-M zp*Kd+8VD@hw1|a4Z~Ti{v&~%`fBoj@`TN%gubwZZH40h>rP4bZyXJb6(lbiw(f_<= zee~~}f8SWQGXMM2zdsFOJj3Z(49)c z9PFyBaqQ7f|LfT4)K>DC>2!3qTIsazt&Q~O>Aa_nUfZ6pV9pK1OSICM#Z9BvZ?Hd4 z=RNFob+=qki=D;66#^H(WlbV^1#<@;QAy_C;Prpzsk(o$je2Kox_*)2cfhl50leeh zuYv4RM^oRq_RIf|esVWTHH=?)#+$_lNSnA1R(sL!?espV`{L+WUcG|(&!QK80s9K$ z64y}A)A^c-aG5J8+5>mnfABA+L})pGsQKMkZ1ECo2=`fNxfWIHMe$4@S41z$n zlxU0jSGS$bFP@Xe#L4r+x6e;&%Z7ig4NQri6qOIVF5~}V+L3dsr)CtLvZiZ^nvo51 zRVgvddT0@)LQT4QsuGV%kKBT-=gE2<^#oZ>wb3& z>UylMH5y&FQQd3FB7T}$XlcTo#hBeuw0pf|6u2$6?eDz9Qque=BfEM!*WCUzNx~Qe zGf3A_#+NZzUuz&7^X%-pHaKL_l59z1su*1%@Tf70MP#&Re~K_V;elEMu7c*V=6$Lq z+Dpn86GJ)u)};#19^m9lq7 z$G#n|PReNAI}^r%{G}|2FGOYPH6Ko6G7;XQFZtC`UO4_Hnizgw|D~g%N8`y+yapNo z1%-x=yCo7a{{2YgB-0SJI3D<|Ci`Ih7KVd`*m&=0=AF$73ftfIUL@SXh^UX;=qI+7 z+z=MScpsc8B-$~Zu|2NU9iI9lv?E_cnKfWEMT=AbD({{=e`LZ-AfEk%$&{=8S1RxH zf+)0v)gyl1!r?!XN5jTI9S3^_)9dCyz`vt0*!bQ}>4`{Uy~ZqqTCU9&$NgHWW% z4rbQ^Q(zRDW+llXnGRz};O%-s=0?BhgAAHUCgt=P8_Z^ z$r%H69#OZXp35w!&8?AcWKL?CcM~rqE07zIjhDCwA7mW zUbOylCysfollOxd;|!kJ8=d4CBEd%+`{u=HGG+mcXzoR5d}?X`=dqkk^ZC(ozGur> zH&$8KFj))`$2Vydb~O7yCTi%&vL&5PfDC` z&kF=E8(%(kF91IG393K#(>VXf6SOS#0ANS{=k1NXUHkms_V(lb9}n{MJ^u%+BYpRA z1W@D#x`#7>7UaeuKwuu?`?H+`m1#6w}w65EgNo)e#etH zxVPhL>VSX2XztFq_ht-SjlKCA%^2tjtn}r=5k#{rJwYu8|BO4!_G4C|)c58WqeH8& zH&#*S-YjX5p*LrV{5TOevYq(C7HmTFE8K2Ji3!2pGHaYl@{^*L$37~|;0c3>FM7X2 zv+m5<)yLb*mT;&jn#Nv%NL8dB3l7}df^pVsnP{B4lO1)-_2SGOl0XNIE&XsxP%(iK zy7_dY&k-SbjKM13)l-@uys(zX2_k5P;aUUER;@PHahKYlV?_3k67e$h(q>){=l$ol zejXpg{-0(A{+%x6llOTRzlRmc$_UC;^o z9`)m0f_PfuUW}Zwd|plHzMU|fzLmM$^v4x|_6mMzE$d$HxQ|wOA8Lb`wq`pQq%mIW zdwt`Kch%xl)Z<`5VoaNycZLEGXOe5@O>|14NtDjyX&PEKxnIQi@^d)%tu8YS@bM*F^&xuEmO zszt)gXU<(PXC2R`0Us}Gs@?kb7$b-mXoM5r9-}q@-DtJBvJ7le=yLSX9_;;2>@)#8nN(sC`edKdLiR{C$ zzq{@evZ@VZs}VOrlvlwR?5;OYqH2wLg=SfCeb4P`L9)Mho2Jbez+epae62goX6HEV zXCB4tm1W>HXg zxkZ_S{WZRy&BB6gnf2LoKIa#(PuB@6?REL2IGCdXULb8&Xz*Arl-=!)19UyrsG3M? zTKiTXU5EGf82&$TO~rDv|91NS_BQtH{J-0KkNJNe=J`_mf8xTKW&8VVuzw~0o@jeN ze_n%8P5)h!mkxj3lFw%foStL%KV)V5=}jIn-XjE{!`$@xzyy7*KCdHO_H=svtmWF` z7X~>FXnL~x^r3{is3_MC(pUy9J4x~RsKqqG^A` z=cZ|Wbnu9Kvpf#4QYAcSr%)edyb}YP79*0rN(jyq{|ar{JTKXGA+We^tI@?NlTpTL zQb?vUso3WqN9L_yO$cXwhLR_582fm37rp`4aM5)OL*W@XbVNQBqdjb5jP`Mdexz#* zS7NnZ6Zn26uf|+SVUxjsl~uRshn^=W1gjTuGfPFih+Ekr$`L&;O1!NSBp2saC4G%v z&|?1M4^5(#{qXmeSp2?AR|#y*pt?SzK?h-rqxqAg_2zkBYRt3|%4U_xC7T37az6Rm zxwJ^L`B?xpqs2+)_EP|#?&SAw3>!CSulw6=$5O)O4OMrKU-cTa0!5qEDvGf4-FM!} z?Jz01quwn{HB#*j(-!Me)VhtLawMN%BeuQ~Yya7Lr*&`#Q(_6mC^x!nmDZ=eY&}&g z`*}SY?*NJ=VcFQ++U}=e%?|gI;25Z5K+!y^*X60#+p5i_s?6o6l)S(*SX?s&Hr`jd zqAj_FE+%~kcbX&E5`tszy(ng~A^yP_s)$YIYMuRPqShB?$@cOS#U!JsjjE;+Jj^kTp??B*8qUokbXZh=_&g%KavHbHe z&BG~P=JWWV78s&u9YfTYt)3U@=Xbj24$!l`i_Ec)w%*-ry%yz8)y5tCC`Rguq%F9O zB;`qtqHZ&hgK6;?kffx8O9v-_n+}i;FpK+Ibi@>uHxYwvKPkQ1mWRP(Lp7RK&*nC- zM_UGl+azbbB^k?fzVsVwk7vKW*vE+f$WbxFWl6jH{jb^ivf@BG;y-qGH+QV~kKOIP zt;hI}hj_k}_>bdy=>2zgzU(j%5A?rMG>FN9enBBVwl!lzybNZj3sj;sLicdX-G682 z_0oEI%i{me&RdtoKVdSpQ_n5D_|Wo;zQiS=YMl9gc{;jYeE4%qmfOpS z+sULh$>OZDAy_9<#P+JOF!MGRXWquGnYUpuZ=r_WLNJSQujkc~X;2vz1QT{vR9-A*0P!58 z{-XG4GV;6f`y#9IWpi!9!S3(w?miTYc6WC@EMi}7&!V?gdQiSAQL$_$6%z3Nx8HvI z5N!JP+iyK1Nqt!Yn-0?Wo<>z0!+dofcqCFrx<{h=a(fmZU*Pz-!v46WK72*#JUo8) z;>gEC_Wk=8M}ItyJuaaiehGbli`$5gs+L8qDA9KTD^0471*|N#@Oo5`)4KALz^z5! zp=|5@uJ;rg1MA(EW|0$!YhCt$`@i=7Keyru_kysCneHA1&~g96&fbQ-|G&4l`I!Ip zL7p#Y|KGfzk=^rm4{-o(SpH)101j64jtgjIqcc9Bo$>U~*Kl@+7y-YBpkMgBdK@exVUCqM)+5;So3+*GqPAsDWc7&z_^PS6ZF5|oh(_{7<8Q+ z9=v=$q)7av;SWPmXBg2}L!UHa!&1rR`yqJPLg=I9Syb}4l-{kxPs`HOnCtudboMQ9 z_OV7{Bp}vcwgk`L{nVp|XARtum?fpSa@>%WJ1 zzL@o27B79Vr-A%St?aV6=Q2)bkYmke@Q?l}6PVw{nDYln(qcfnAFI`dbKlp;V2r_r zVff@I!V}ETFt=XvR><2Cwsf;Vz})(anFC+owcEYpYUrD_j!U@gms;4m{*g-@@ zuCn6t3z!t_X`LA;4?G z&fMJ6#=zaC;Za&1X9ZJlDfHW{FUZWT5wIVJsMO#;Srxn>s91k`m3XE@Sxr8EdQYbC&!r9_1roOy_{ zoI?El<3wK4M6RPfD8NN#n;u!xKEp+CmMe7?`&28as7BV5?bp5Ti`0LGBOMF~J3Fk87Z zx9XUIV1JsVFc1Hb1!do^g&acTBai%`7JL&dYf*NUUcn+hIDX+SKp#x|%>S7_LzV|{ z41xrnqofR43j;90D2d;qNjp%jEKjpNLj+O=h8zp4e0F<9@Xc)xciIM`$2yc}<*a3z z3|41TL6_bCA;nnBX}kJ(9h(jTyHK1!_Cgy(!KcqEl1;h%hZf26`drr{@>m^~Yuo-% zN3_~`;W5t`lLekTZgD7kaqc>8#Huh2p&fFQh@GmVQC&n0nhn=RVv{F56DuigW)Ns& z>dc#T8_QJFYD}V2E9$nYZDCbps+GIxq}jDYBhfcTT+5>bSNT2fp!OMGA;?Kn*(Q_*LUeq{nFH!HLIlSJj zS188S47B8@#=oPNc!r5jb<`LB^T)mL;dof4-zI1+77NHQRbF9{Shg9fu`ll6{p7$c zKJ}zPee50OXHwvaPLojgH@?SBUwH`@UUs%pDbU z$vb3obPT>0VeelXH0oZouaz6^O&VF{xDV~?jrH%b^}#sOVIsNHib*_;g_GW1&GF`4 zKOLwRwwI$uf;lR>k3zM1^iBvQXi_C7$g_UY!eUtls!~)aS#(dconsIP?rKYu1Fio8 zqyMb+3thUbe~$zAVH|mNj)4EgEN~u9)YrYyQ`GDId&@weCQeJRyXLl*gTkz+ zk%gvnDwtvMWmXjtD#HT(RxyDhr;GcHIB6wY%Lo|F^ff`*{BEA)fa0f0LO!%J*<50ma>*%RUWggZ(R=2o!Da zcPg;KsOHJQCNDKCpFN9<+eOv2*Uv)XL~w&+J!ITXZX`3IZ#q($h$3IcvgLsyo(04D zu2x~ZZ@FT9AwCE-l=7w_DnE-`M+^1t4JaYTm|VXR5Y@G_)D^j@t>_fTh}LU zua8R`6sV!IZ_XS@MYafz&3N3Q>&9B0ai;QGZmfTT`c@>z1-#4wETh~Y^V-TDk z9$PVwd4eNM=zGtRQJ*-<1=M{Ga}jJmoSq&pDEt&QR(El9CyOZr1Kr7j_}(4eo|&|+ z8yo-fq2FLXcxT=8i<}@E_5u_w61Y6=nOj1$@2uB z*hDPMClM%9zjSYYboS+e)}qObgeQ4{Q!-fzG}^u@L7EXT$*MFC)-)z~c3fI@-JB<{ zXrNc;+zl#Tq;r_ySTNh{0`OJYMa@$8a~_|^=ka-b`ab_(00030|J3-zh5&K`0I0kk AzyJUM literal 0 HcmV?d00001 diff --git a/stable/traefik/6.5.5/crds/ingressroute.yaml b/stable/traefik/6.5.5/crds/ingressroute.yaml new file mode 100644 index 00000000000..9422be3c878 --- /dev/null +++ b/stable/traefik/6.5.5/crds/ingressroute.yaml @@ -0,0 +1,12 @@ +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + name: ingressroutes.traefik.containo.us +spec: + group: traefik.containo.us + version: v1alpha1 + names: + kind: IngressRoute + plural: ingressroutes + singular: ingressroute + scope: Namespaced diff --git a/stable/traefik/6.5.5/crds/ingressroutetcp.yaml b/stable/traefik/6.5.5/crds/ingressroutetcp.yaml new file mode 100644 index 00000000000..b50eb9dcc46 --- /dev/null +++ b/stable/traefik/6.5.5/crds/ingressroutetcp.yaml @@ -0,0 +1,12 @@ +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + name: ingressroutetcps.traefik.containo.us +spec: + group: traefik.containo.us + version: v1alpha1 + names: + kind: IngressRouteTCP + plural: ingressroutetcps + singular: ingressroutetcp + scope: Namespaced diff --git a/stable/traefik/6.5.5/crds/ingressrouteudp.yaml b/stable/traefik/6.5.5/crds/ingressrouteudp.yaml new file mode 100644 index 00000000000..d7c2624b576 --- /dev/null +++ b/stable/traefik/6.5.5/crds/ingressrouteudp.yaml @@ -0,0 +1,13 @@ +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + name: ingressrouteudps.traefik.containo.us + +spec: + group: traefik.containo.us + version: v1alpha1 + names: + kind: IngressRouteUDP + plural: ingressrouteudps + singular: ingressrouteudp + scope: Namespaced diff --git a/stable/traefik/6.5.5/crds/middlewares.yaml b/stable/traefik/6.5.5/crds/middlewares.yaml new file mode 100644 index 00000000000..513b36f5d8a --- /dev/null +++ b/stable/traefik/6.5.5/crds/middlewares.yaml @@ -0,0 +1,12 @@ +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + name: middlewares.traefik.containo.us +spec: + group: traefik.containo.us + version: v1alpha1 + names: + kind: Middleware + plural: middlewares + singular: middleware + scope: Namespaced diff --git a/stable/traefik/6.5.5/crds/serverstransports.yaml b/stable/traefik/6.5.5/crds/serverstransports.yaml new file mode 100644 index 00000000000..689a57f71bd --- /dev/null +++ b/stable/traefik/6.5.5/crds/serverstransports.yaml @@ -0,0 +1,12 @@ +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + name: serverstransports.traefik.containo.us +spec: + group: traefik.containo.us + version: v1alpha1 + names: + kind: ServersTransport + plural: serverstransports + singular: serverstransport + scope: Namespaced diff --git a/stable/traefik/6.5.5/crds/tlsoptions.yaml b/stable/traefik/6.5.5/crds/tlsoptions.yaml new file mode 100644 index 00000000000..a0c2573fb93 --- /dev/null +++ b/stable/traefik/6.5.5/crds/tlsoptions.yaml @@ -0,0 +1,12 @@ +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + name: tlsoptions.traefik.containo.us +spec: + group: traefik.containo.us + version: v1alpha1 + names: + kind: TLSOption + plural: tlsoptions + singular: tlsoption + scope: Namespaced diff --git a/stable/traefik/6.5.5/crds/tlsstores.yaml b/stable/traefik/6.5.5/crds/tlsstores.yaml new file mode 100644 index 00000000000..f9a40052ba6 --- /dev/null +++ b/stable/traefik/6.5.5/crds/tlsstores.yaml @@ -0,0 +1,13 @@ +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + name: tlsstores.traefik.containo.us + +spec: + group: traefik.containo.us + version: v1alpha1 + names: + kind: TLSStore + plural: tlsstores + singular: tlsstore + scope: Namespaced diff --git a/stable/traefik/6.5.5/crds/traefikservices.yaml b/stable/traefik/6.5.5/crds/traefikservices.yaml new file mode 100644 index 00000000000..59fa4839477 --- /dev/null +++ b/stable/traefik/6.5.5/crds/traefikservices.yaml @@ -0,0 +1,12 @@ +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + name: traefikservices.traefik.containo.us +spec: + group: traefik.containo.us + version: v1alpha1 + names: + kind: TraefikService + plural: traefikservices + singular: traefikservice + scope: Namespaced diff --git a/stable/traefik/6.5.5/ix_values.yaml b/stable/traefik/6.5.5/ix_values.yaml new file mode 100644 index 00000000000..0a43b81babd --- /dev/null +++ b/stable/traefik/6.5.5/ix_values.yaml @@ -0,0 +1,332 @@ +# Default values for Traefik +image: + name: traefik + # defaults to appVersion + tag: v2.4 + pullPolicy: IfNotPresent + +# +# Configure the deployment +# +deployment: + enabled: true + # Can be either Deployment or DaemonSet + kind: Deployment + # Number of pods of the deployment (only applies when kind == Deployment) + replicas: 1 + # Additional deployment annotations (e.g. for jaeger-operator sidecar injection) + annotations: {} + # Additional deployment labels (e.g. for filtering deployment by custom labels) + labels: {} + # Additional pod annotations (e.g. for mesh injection or prometheus scraping) + podAnnotations: {} + # Additional Pod labels (e.g. for filtering Pod by custom labels) + podLabels: {} + # Additional containers (e.g. for metric offloading sidecars) + additionalContainers: [] + # https://docs.datadoghq.com/developers/dogstatsd/unix_socket/?tab=host + # - name: socat-proxy + # image: alpine/socat:1.0.5 + # args: ["-s", "-u", "udp-recv:8125", "unix-sendto:/socket/socket"] + # volumeMounts: + # - name: dsdsocket + # mountPath: /socket + # Additional volumes available for use with initContainers and additionalContainers + additionalVolumes: [] + # - name: dsdsocket + # hostPath: + # path: /var/run/statsd-exporter + # Additional initContainers (e.g. for setting file permission as shown below) + initContainers: [] + # The "volume-permissions" init container is required if you run into permission issues. + # Related issue: https://github.com/traefik/traefik/issues/6972 + # - name: volume-permissions + # image: busybox:1.31.1 + # command: ["sh", "-c", "chmod -Rv 600 /data/*"] + # volumeMounts: + # - name: data + # mountPath: /data + # Custom pod DNS policy. Apply if `hostNetwork: true` + # dnsPolicy: ClusterFirstWithHostNet + # Additional imagePullSecrets + imagePullSecrets: [] + # - name: myRegistryKeySecretName + +# Pod disruption budget +podDisruptionBudget: + enabled: false + # maxUnavailable: 1 + # minAvailable: 0 + +# Use ingressClass. Ignored if Traefik version < 2.3 / kubernetes < 1.18.x +ingressClass: + # true is not unit-testable yet, pending https://github.com/rancher/helm-unittest/pull/12 + enabled: false + isDefaultClass: false + # Use to force a networking.k8s.io API Version for certain CI/CD applications. E.g. "v1beta1" + fallbackApiVersion: + +# Activate Pilot integration +pilot: + enabled: false + token: "" + # Toggle Pilot Dashboard + # dashboard: false + +# Enable experimental features +experimental: + plugins: + enabled: false + kubernetesGateway: + enabled: false + appLabelSelector: "traefik" + certificates: [] + # - group: "core" + # kind: "Secret" + # name: "mysecret" + +# Create an IngressRoute for the dashboard +ingressRoute: + dashboard: + enabled: true + # Additional ingressRoute annotations (e.g. for kubernetes.io/ingress.class) + annotations: {} + # Additional ingressRoute labels (e.g. for filtering IngressRoute by custom labels) + labels: {} + +rollingUpdate: + maxUnavailable: 1 + maxSurge: 1 + + +# +# Configure providers +# +providers: + kubernetesCRD: + enabled: true + namespaces: [] + # - "default" + kubernetesIngress: + enabled: true + # labelSelector: environment=production,method=traefik + namespaces: [] + # - "default" + # IP used for Kubernetes Ingress endpoints + publishedService: + enabled: false + # Published Kubernetes Service to copy status from. Format: namespace/servicename + # By default this Traefik service + # pathOverride: "" + +# +# Add volumes to the traefik pod. The volume name will be passed to tpl. +# This can be used to mount a cert pair or a configmap that holds a config.toml file. +# After the volume has been mounted, add the configs into traefik by using the `additionalArguments` list below, eg: +# additionalArguments: +# - "--providers.file.filename=/config/dynamic.toml" +# - "--ping" +# - "--ping.entrypoint=web" +volumes: [] +# - name: public-cert +# mountPath: "/certs" +# type: secret +# - name: '{{ printf "%s-configs" .Release.Name }}' +# mountPath: "/config" +# type: configMap + +# Additional volumeMounts to add to the Traefik container +additionalVolumeMounts: [] + # For instance when using a logshipper for access logs + # - name: traefik-logs + # mountPath: /var/log/traefik + +# Logs +# https://docs.traefik.io/observability/logs/ +logs: + # Traefik logs concern everything that happens to Traefik itself (startup, configuration, events, shutdown, and so on). + general: + # By default, the logs use a text format (common), but you can + # also ask for the json format in the format option + # format: json + # By default, the level is set to ERROR. Alternative logging levels are DEBUG, PANIC, FATAL, ERROR, WARN, and INFO. + level: INFO + access: + # To enable access logs + enabled: false + # By default, logs are written using the Common Log Format (CLF). + # To write logs in JSON, use json in the format option. + # If the given format is unsupported, the default (CLF) is used instead. + # format: json + # To write the logs in an asynchronous fashion, specify a bufferingSize option. + # This option represents the number of log lines Traefik will keep in memory before writing + # them to the selected output. In some cases, this option can greatly help performances. + # bufferingSize: 100 + # Filtering https://docs.traefik.io/observability/access-logs/#filtering + filters: {} + # statuscodes: "200,300-302" + # retryattempts: true + # minduration: 10ms + # Fields + # https://docs.traefik.io/observability/access-logs/#limiting-the-fieldsincluding-headers + fields: + general: + defaultmode: keep + names: {} + # Examples: + # ClientUsername: drop + headers: + defaultmode: drop + names: {} + # Examples: + # User-Agent: redact + # Authorization: drop + # Content-Type: keep + +globalArguments: + - "--global.checknewversion" + +# +# Configure Traefik static configuration +# Additional arguments to be passed at Traefik's binary +# All available options available on https://docs.traefik.io/reference/static-configuration/cli/ +## Use curly braces to pass values: `helm install --set="additionalArguments={--providers.kubernetesingress.ingressclass=traefik-internal,--log.level=DEBUG}"` +additionalArguments: + - "--metrics.prometheus" + - "--ping" + - "--serverstransport.insecureskipverify=true" + +# Environment variables to be passed to Traefik's binary +env: [] +# - name: SOME_VAR +# value: some-var-value +# - name: SOME_VAR_FROM_CONFIG_MAP +# valueFrom: +# configMapRef: +# name: configmap-name +# key: config-key +# - name: SOME_SECRET +# valueFrom: +# secretKeyRef: +# name: secret-name +# key: secret-key + +envFrom: [] + +# TLS Options are created as TLSOption CRDs +# https://doc.traefik.io/traefik/https/tls/#tls-options +# Example: +tlsOptions: + default: + sniStrict: false + minVersion: VersionTLS12 + curvePreferences: + - CurveP521 + - CurveP384 + cipherSuites: + - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 + - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 + - TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 + - TLS_AES_128_GCM_SHA256 + - TLS_AES_256_GCM_SHA384 + - TLS_CHACHA20_POLY1305_SHA256 + +# Options for the main traefik service, where the entrypoints traffic comes +# from. +service: + enabled: true + type: LoadBalancer + # Additional annotations (e.g. for cloud provider specific config) + annotations: {} + # Additional service labels (e.g. for filtering Service by custom labels) + labels: {} + # Additional entries here will be added to the service spec. Cannot contains + # type, selector or ports entries. + spec: {} + # externalTrafficPolicy: Cluster + # loadBalancerIP: "1.2.3.4" + # clusterIP: "2.3.4.5" + loadBalancerSourceRanges: [] + # - 192.168.0.1/32 + # - 172.16.0.0/16 + externalIPs: [] + # - 1.2.3.4 + +## Create HorizontalPodAutoscaler object. +## +autoscaling: + enabled: false +# minReplicas: 1 +# maxReplicas: 10 +# metrics: +# - type: Resource +# resource: +# name: cpu +# targetAverageUtilization: 60 +# - type: Resource +# resource: +# name: memory +# targetAverageUtilization: 60 + +# Enable persistence using Persistent Volume Claims +# ref: http://kubernetes.io/docs/user-guide/persistent-volumes/ +# After the pvc has been mounted, add the configs into traefik by using the `additionalArguments` list below, eg: +# additionalArguments: +# - "--certificatesresolvers.le.acme.storage=/data/acme.json" +# It will persist TLS certificates. +persistence: + enabled: false + name: data + accessMode: ReadWriteOnce + size: 128Mi + path: /data + +# Whether Role Based Access Control objects like roles and rolebindings should be created +rbac: + enabled: true + + # If set to false, installs ClusterRole and ClusterRoleBinding so Traefik can be used across namespaces. + # If set to true, installs namespace-specific Role and RoleBinding and requires provider configuration be set to that same namespace + namespaced: false + +# Enable to create a PodSecurityPolicy and assign it to the Service Account via RoleBinding or ClusterRoleBinding +podSecurityPolicy: + enabled: false + +# The service account the pods will use to interact with the Kubernetes API +serviceAccount: + # If set, an existing service account is used + # If not set, a service account is created automatically using the fullname template + name: "" + +# Additional serviceAccount annotations (e.g. for oidc authentication) +serviceAccountAnnotations: {} + +affinity: {} +# # This example pod anti-affinity forces the scheduler to put traefik pods +# # on nodes where no other traefik pods are scheduled. +# # It should be used when hostNetwork: true to prevent port conflicts +# podAntiAffinity: +# requiredDuringSchedulingIgnoredDuringExecution: +# - labelSelector: +# matchExpressions: +# - key: app +# operator: In +# values: +# - {{ template "traefik.name" . }} +# topologyKey: failure-domain.beta.kubernetes.io/zone +nodeSelector: {} +tolerations: [] + +# Pods can have priority. +# Priority indicates the importance of a Pod relative to other Pods. +priorityClassName: "" + +# Set the container security context +# To run the container with ports below 1024 this will need to be adjust to run as root +securityContext: + capabilities: + drop: [ALL] + +portalhook: + enabled: true diff --git a/stable/traefik/6.5.5/questions.yaml b/stable/traefik/6.5.5/questions.yaml new file mode 100644 index 00000000000..6dfff0761f8 --- /dev/null +++ b/stable/traefik/6.5.5/questions.yaml @@ -0,0 +1,476 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Advanced" + description: "Advanced Configuration" +portals: + web_portal: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" + path: "/dashboard/" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + + - variable: middlewares + label: "" + group: "Middlewares" + schema: + type: dict + attrs: + - variable: basicAuth + label: "basicAuth" + schema: + type: list + default: [] + items: + - variable: basicAuthEntry + label: "" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + default: "" + - variable: users + label: "Users" + schema: + type: list + default: [] + items: + - variable: usersEntry + label: "" + schema: + type: dict + attrs: + - variable: username + label: "Username" + schema: + type: string + required: true + default: "" + - variable: password + label: "Password" + schema: + type: string + required: true + default: "" + + + - variable: forwardAuth + label: "forwardAuth" + schema: + type: list + default: [] + items: + - variable: basicAuthEntry + label: "" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + default: "" + - variable: address + label: "Address" + schema: + type: string + required: true + default: "" + - variable: trustForwardHeader + label: "trustForwardHeader" + schema: + type: boolean + default: false + - variable: authResponseHeadersRegex + label: "authResponseHeadersRegex" + schema: + type: string + default: "" + - variable: authResponseHeaders + label: "authResponseHeaders" + schema: + type: list + default: [] + items: + - variable: authResponseHeadersEntry + label: "" + schema: + type: string + default: "" + - variable: authRequestHeaders + label: "authRequestHeaders" + schema: + type: list + default: [] + items: + - variable: authRequestHeadersEntry + label: "" + schema: + type: string + default: "" + - variable: chain + label: "chain" + schema: + type: list + default: [] + items: + - variable: chainEntry + label: "" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: middlewares + label: "Middlewares to Chain" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + required: true + default: "" + + - variable: redirectScheme + label: "redirectScheme" + schema: + type: list + default: [] + items: + - variable: redirectSchemeEntry + label: "" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: scheme + label: "Scheme" + schema: + type: string + required: true + default: "https" + enum: + - value: "https" + description: "https" + - value: "http" + description: "http" + - variable: permanent + label: "Permanent" + schema: + type: boolean + required: true + default: false + + - variable: rateLimit + label: "rateLimit" + schema: + type: list + default: [] + items: + - variable: rateLimitEntry + label: "" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: average + label: "Average" + schema: + type: int + required: true + default: 300 + - variable: burst + label: "Burst" + schema: + type: int + required: true + default: 200 + + - variable: hostNetwork + group: "Networking and Services" + label: "Enable Host Networking" + schema: + type: boolean + default: false + + - variable: ports + label: "(Advanced) Traefik Entrypoints" + group: "Networking and Services" + schema: + type: dict + attrs: + - variable: traefik + label: "traefik internal" + schema: + type: dict + attrs: + - variable: port + label: "Internal Port" + description: "(advanced) Port inside the container network" + schema: + type: int + required: true + hidden: true + default: 9000 + - variable: expose + label: "Expose to Outside" + description: "Port to the outside of all(!) nodes" + schema: + type: boolean + default: true + - variable: exposedPort + label: "Outside Port" + description: "Port on the outside" + schema: + type: int + show_if: [["expose", "=", true]] + default: 9000 + - variable: protocol + label: "Protocol" + description: "TCP or UDP reverse proxying?" + schema: + type: string + default: "TCP" + - variable: web + label: "web" + schema: + type: dict + attrs: + - variable: port + label: "Internal Port" + description: "(advanced) Port inside the container network" + schema: + type: int + required: true + hidden: true + default: 9080 + - variable: expose + label: "Expose to Outside" + description: "Port to the outside of all(!) nodes" + schema: + type: boolean + default: true + - variable: exposedPort + label: "Outside Port" + description: "Port to the outside of all(!) nodes" + schema: + type: int + show_if: [["expose", "=", true]] + required: true + default: 9080 + - variable: protocol + label: "Protocol" + description: "TCP or UDP reverse proxying?" + schema: + type: string + required: true + default: "TCP" + hidden: true + - variable: redirectEnable + label: "Enable Redirect" + schema: + type: boolean + default: true + show_subquestions_if: true + subquestions: + - variable: redirectTo + label: "Target Entrypoint" + description: "Select the Target Entrypoint to redirect to" + schema: + type: string + required: true + default: "websecure" + - variable: websecure + label: "websecure" + schema: + type: dict + attrs: + - variable: port + label: "Internal Port" + description: "(advanced) Port inside the container network" + schema: + type: int + required: true + hidden: true + default: 9443 + - variable: expose + label: "Expose to Outside" + description: "Port to the outside of all(!) nodes" + schema: + type: boolean + default: true + - variable: exposedPort + label: "Outside Port" + description: "Port to the outside of all(!) nodes" + schema: + type: int + show_if: [["expose", "=", true]] + required: true + default: 9443 + - variable: protocol + label: "Protocol" + description: "TCP or UDP reverse proxying?" + schema: + type: string + required: true + default: "TCP" + hidden: true + - variable: tls + label: "tls" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + + - variable: securityContext + group: "Security and Permissions" + label: "Security Context" + schema: + type: dict + attrs: + - variable: privileged + label: "Enable privileged mode for Common-Chart based charts" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: true + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 65532 + - variable: runAsGroup + label: "runAsGroup" + description: The groupID this App of the user running the application" + schema: + type: int + default: 65532 + + + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + type: dict + attrs: + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 65532 + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + + - variable: resources + group: "Resources and Devices" + label: "" + schema: + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + schema: + type: string + default: "2000m" + - variable: memory + label: "Memory RAM" + schema: + type: string + default: "2Gi" + - variable: requests + label: "Advanced Request minimum resources required" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + schema: + type: string + default: "10m" + - variable: memory + label: "Memory RAM" + schema: + type: string + default: "50Mi" diff --git a/stable/traefik/6.5.5/templates/_helpers.tpl b/stable/traefik/6.5.5/templates/_helpers.tpl new file mode 100644 index 00000000000..f7b055fa82e --- /dev/null +++ b/stable/traefik/6.5.5/templates/_helpers.tpl @@ -0,0 +1,62 @@ +{{/* vim: set filetype=mustache: */}} + +{{/* +Expand the name of the chart. +*/}} +{{- define "traefik.name" -}} +{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" -}} +{{- end -}} + +{{/* +Create chart name and version as used by the chart label. +*/}} +{{- define "traefik.chart" -}} +{{- printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" -}} +{{- end -}} + +{{/* +Create a default fully qualified app name. +We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec). +If release name contains chart name it will be used as a full name. +*/}} +{{- define "traefik.fullname" -}} +{{- if .Values.fullnameOverride -}} +{{- .Values.fullnameOverride | trunc 63 | trimSuffix "-" -}} +{{- else -}} +{{- $name := default .Chart.Name .Values.nameOverride -}} +{{- if contains $name .Release.Name -}} +{{- .Release.Name | trunc 63 | trimSuffix "-" -}} +{{- else -}} +{{- printf "%s-%s" .Release.Name $name | trunc 63 | trimSuffix "-" -}} +{{- end -}} +{{- end -}} +{{- end -}} + +{{/* +The name of the service account to use +*/}} +{{- define "traefik.serviceAccountName" -}} +{{- default (include "traefik.fullname" .) .Values.serviceAccount.name -}} +{{- end -}} + +{{/* +Construct the path for the providers.kubernetesingress.ingressendpoint.publishedservice. +By convention this will simply use the / to match the name of the +service generated. +Users can provide an override for an explicit service they want bound via `.Values.providers.kubernetesIngress.publishedService.pathOverride` +*/}} +{{- define "providers.kubernetesIngress.publishedServicePath" -}} +{{- $defServiceName := printf "%s/%s" .Release.Namespace (include "traefik.fullname" .) -}} +{{- $servicePath := default $defServiceName .Values.providers.kubernetesIngress.publishedService.pathOverride }} +{{- print $servicePath | trimSuffix "-" -}} +{{- end -}} + +{{/* +Construct a comma-separated list of whitelisted namespaces +*/}} +{{- define "providers.kubernetesIngress.namespaces" -}} +{{- default .Release.Namespace (join "," .Values.providers.kubernetesIngress.namespaces) }} +{{- end -}} +{{- define "providers.kubernetesCRD.namespaces" -}} +{{- default .Release.Namespace (join "," .Values.providers.kubernetesCRD.namespaces) }} +{{- end -}} diff --git a/stable/traefik/6.5.5/templates/_podtemplate.tpl b/stable/traefik/6.5.5/templates/_podtemplate.tpl new file mode 100644 index 00000000000..9e8fe8aca34 --- /dev/null +++ b/stable/traefik/6.5.5/templates/_podtemplate.tpl @@ -0,0 +1,265 @@ +{{- define "traefik.podTemplate" }} + metadata: + annotations: + {{- with .Values.deployment.podAnnotations }} + {{- toYaml . | nindent 8 }} + {{- end }} + labels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + helm.sh/chart: {{ template "traefik.chart" . }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/instance: {{ .Release.Name }} + {{- with .Values.deployment.podLabels }} + {{- toYaml . | nindent 8 }} + {{- end }} + spec: + {{- with .Values.deployment.imagePullSecrets }} + imagePullSecrets: + {{- toYaml . | nindent 8 }} + {{- end }} + serviceAccountName: {{ include "traefik.serviceAccountName" . }} + terminationGracePeriodSeconds: 60 + hostNetwork: {{ .Values.hostNetwork }} + {{- with .Values.deployment.dnsPolicy }} + dnsPolicy: {{ . }} + {{- end }} + {{- with .Values.deployment.initContainers }} + initContainers: + {{- toYaml . | nindent 6 }} + {{- end }} + containers: + - image: "{{ .Values.image.name }}:{{ default .Chart.AppVersion .Values.image.tag }}" + imagePullPolicy: {{ .Values.image.pullPolicy }} + name: {{ template "traefik.fullname" . }} + resources: + {{- with .Values.resources }} + {{- toYaml . | nindent 10 }} + {{- end }} + readinessProbe: + httpGet: + path: /ping + port: {{ default .Values.ports.traefik.port .Values.ports.traefik.healthchecksPort }} + failureThreshold: 1 + initialDelaySeconds: 10 + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 2 + livenessProbe: + httpGet: + path: /ping + port: {{ default .Values.ports.traefik.port .Values.ports.traefik.healthchecksPort }} + failureThreshold: 3 + initialDelaySeconds: 10 + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 2 + ports: + {{- range $name, $config := .Values.ports }} + {{- if $config }} + - name: {{ $name | quote }} + containerPort: {{ $config.port }} + {{- if $config.hostPort }} + hostPort: {{ $config.hostPort }} + {{- end }} + {{- if $config.hostIP }} + hostIP: {{ $config.hostIP }} + {{- end }} + protocol: {{ default "TCP" $config.protocol | quote }} + {{- end }} + {{- end }} + {{- with .Values.securityContext }} + securityContext: + {{- toYaml . | nindent 10 }} + {{- end }} + volumeMounts: + - name: {{ .Values.persistence.name }} + mountPath: {{ .Values.persistence.path }} + {{- if .Values.persistence.subPath }} + subPath: {{ .Values.persistence.subPath }} + {{- end }} + - name: tmp + mountPath: /tmp + {{- $root := . }} + {{- range .Values.volumes }} + - name: {{ tpl (.name) $root }} + mountPath: {{ .mountPath }} + readOnly: true + {{- end }} + {{- if .Values.experimental.plugins.enabled }} + - name: plugins + mountPath: "/plugins-storage" + {{- end }} + {{- if .Values.additionalVolumeMounts }} + {{- toYaml .Values.additionalVolumeMounts | nindent 10 }} + {{- end }} + args: + {{- with .Values.globalArguments }} + {{- range . }} + - {{ . | quote }} + {{- end }} + {{- end }} + {{- range $name, $config := .Values.ports }} + {{- if $config }} + - "--entryPoints.{{$name}}.address=:{{ $config.port }}/{{ default "tcp" $config.protocol | lower }}" + {{- end }} + {{- end }} + - "--api.dashboard=true" + - "--ping=true" + {{- if .Values.providers.kubernetesCRD.enabled }} + - "--providers.kubernetescrd" + {{- end }} + {{- if .Values.providers.kubernetesIngress.enabled }} + - "--providers.kubernetesingress" + {{- if and .Values.service.enabled .Values.providers.kubernetesIngress.publishedService.enabled }} + - "--providers.kubernetesingress.ingressendpoint.publishedservice={{ template "providers.kubernetesIngress.publishedServicePath" . }}" + {{- end }} + {{- if .Values.providers.kubernetesIngress.labelSelector }} + - "--providers.kubernetesingress.labelSelector={{ .Values.providers.kubernetesIngress.labelSelector }}" + {{- end }} + {{- end }} + {{- if .Values.experimental.kubernetesGateway.enabled }} + - "--providers.kubernetesgateway" + - "--experimental.kubernetesgateway" + {{- end }} + {{- if and .Values.rbac.enabled .Values.rbac.namespaced }} + {{- if .Values.providers.kubernetesCRD.enabled }} + - "--providers.kubernetescrd.namespaces={{ template "providers.kubernetesCRD.namespaces" . }}" + {{- end }} + {{- if .Values.providers.kubernetesIngress.enabled }} + - "--providers.kubernetesingress.namespaces={{ template "providers.kubernetesIngress.namespaces" . }}" + {{- end }} + {{- end }} + {{- range $entrypoint, $config := $.Values.ports }} + {{- if $config.redirectTo }} + {{- $toPort := index $.Values.ports $config.redirectTo }} + - "--entrypoints.{{ $entrypoint }}.http.redirections.entryPoint.to=:{{ $toPort.exposedPort }}" + - "--entrypoints.{{ $entrypoint }}.http.redirections.entryPoint.scheme=https" + {{- end }} + {{- if $config.tls }} + {{- if $config.tls.enabled }} + - "--entrypoints.{{ $entrypoint }}.http.tls=true" + {{- if $config.tls.options }} + - "--entrypoints.{{ $entrypoint }}.http.tls.options={{ $config.tls.options }}" + {{- end }} + {{- if $config.tls.certResolver }} + - "--entrypoints.{{ $entrypoint }}.http.tls.certResolver={{ $config.tls.certResolver }}" + {{- end }} + {{- if $config.tls.domains }} + {{- range $index, $domain := $config.tls.domains }} + {{- if $domain.main }} + - "--entrypoints.{{ $entrypoint }}.http.tls.domains[{{ $index }}].main={{ $domain.main }}" + {{- end }} + {{- if $domain.sans }} + - "--entrypoints.{{ $entrypoint }}.http.tls.domains[{{ $index }}].sans={{ join "," $domain.sans }}" + {{- end }} + {{- end }} + {{- end }} + {{- end }} + {{- end }} + {{- end }} + {{- with .Values.logs }} + {{- if .general.format }} + - "--log.format={{ .general.format }}" + {{- end }} + {{- if ne .general.level "ERROR" }} + - "--log.level={{ .general.level | upper }}" + {{- end }} + {{- if .access.enabled }} + - "--accesslog=true" + {{- if .access.format }} + - "--accesslog.format={{ .access.format }}" + {{- end }} + {{- if .access.bufferingsize }} + - "--accesslog.bufferingsize={{ .access.bufferingsize }}" + {{- end }} + {{- if .access.filters }} + {{- if .access.filters.statuscodes }} + - "--accesslog.filters.statuscodes={{ .access.filters.statuscodes }}" + {{- end }} + {{- if .access.filters.retryattempts }} + - "--accesslog.filters.retryattempts" + {{- end }} + {{- if .access.filters.minduration }} + - "--accesslog.filters.minduration={{ .access.filters.minduration }}" + {{- end }} + {{- end }} + - "--accesslog.fields.defaultmode={{ .access.fields.general.defaultmode }}" + {{- range $fieldname, $fieldaction := .access.fields.general.names }} + - "--accesslog.fields.names.{{ $fieldname }}={{ $fieldaction }}" + {{- end }} + - "--accesslog.fields.headers.defaultmode={{ .access.fields.headers.defaultmode }}" + {{- range $fieldname, $fieldaction := .access.fields.headers.names }} + - "--accesslog.fields.headers.names.{{ $fieldname }}={{ $fieldaction }}" + {{- end }} + {{- end }} + {{- end }} + {{- if .Values.pilot.enabled }} + - "--pilot.token={{ .Values.pilot.token }}" + {{- end }} + {{- if hasKey .Values.pilot "dashboard" }} + - "--pilot.dashboard={{ .Values.pilot.dashboard }}" + {{- end }} + {{- with .Values.additionalArguments }} + {{- range . }} + - {{ . | quote }} + {{- end }} + {{- end }} + {{- with .Values.env }} + env: + {{- toYaml . | nindent 10 }} + {{- end }} + {{- with .Values.envFrom }} + envFrom: + {{- toYaml . | nindent 10 }} + {{- end }} + {{- if .Values.deployment.additionalContainers }} + {{- toYaml .Values.deployment.additionalContainers | nindent 6 }} + {{- end }} + volumes: + - name: {{ .Values.persistence.name }} + {{- if .Values.persistence.enabled }} + persistentVolumeClaim: + claimName: {{ default (include "traefik.fullname" .) .Values.persistence.existingClaim }} + {{- else }} + emptyDir: {} + {{- end }} + - name: tmp + emptyDir: {} + {{- $root := . }} + {{- range .Values.volumes }} + - name: {{ tpl (.name) $root }} + {{- if eq .type "secret" }} + secret: + secretName: {{ tpl (.name) $root }} + {{- else if eq .type "configMap" }} + configMap: + name: {{ tpl (.name) $root }} + {{- end }} + {{- end }} + {{- if .Values.deployment.additionalVolumes }} + {{- toYaml .Values.deployment.additionalVolumes | nindent 8 }} + {{- end }} + {{- if .Values.experimental.plugins.enabled }} + - name: plugins + emptyDir: {} + {{- end }} + {{- with .Values.affinity }} + affinity: + {{- toYaml . | nindent 8 }} + {{- end }} + {{- with .Values.tolerations }} + tolerations: + {{- toYaml . | nindent 8 }} + {{- end }} + {{- with .Values.nodeSelector }} + nodeSelector: + {{- toYaml . | nindent 8 }} + {{- end }} + {{- if .Values.priorityClassName }} + priorityClassName: {{ .Values.priorityClassName }} + {{- end }} + {{- with .Values.podSecurityContext }} + securityContext: + {{- toYaml . | nindent 8 }} + {{- end }} +{{ end -}} diff --git a/stable/traefik/6.5.5/templates/custom/common.yaml b/stable/traefik/6.5.5/templates/custom/common.yaml new file mode 100644 index 00000000000..e69de29bb2d diff --git a/stable/traefik/6.5.5/templates/custom/middleware-namespace.yaml b/stable/traefik/6.5.5/templates/custom/middleware-namespace.yaml new file mode 100644 index 00000000000..16156ee5e12 --- /dev/null +++ b/stable/traefik/6.5.5/templates/custom/middleware-namespace.yaml @@ -0,0 +1,7 @@ +apiVersion: v1 +kind: Namespace +metadata: + name: traefikmiddlewares + namespace: traefikmiddlewares + annotations: + "helm.sh/hook": pre-install diff --git a/stable/traefik/6.5.5/templates/custom/middlewares/basic-middleware.yaml b/stable/traefik/6.5.5/templates/custom/middlewares/basic-middleware.yaml new file mode 100644 index 00000000000..98f7d1c170c --- /dev/null +++ b/stable/traefik/6.5.5/templates/custom/middlewares/basic-middleware.yaml @@ -0,0 +1,58 @@ +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: compress + namespace: traefikmiddlewares +spec: + compress: {} +--- +# Here, an average of 300 requests per second is allowed. +# In addition, a burst of 200 requests is allowed. +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: basic-ratelimit + namespace: traefikmiddlewares +spec: + rateLimit: + average: 300 + burst: 200 +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: basic-secure-headers + namespace: traefikmiddlewares +spec: + headers: + accessControlAllowMethods: + - GET + - OPTIONS + - HEAD + - PUT + accessControlMaxAge: 100 + sslRedirect: true + # stsSeconds: 63072000 + # stsIncludeSubdomains: false + # stsPreload: false + # forceSTSHeader: true + contentTypeNosniff: true + browserXssFilter: true + sslForceHost: true + referrerPolicy: same-origin + customResponseHeaders: + X-Robots-Tag: 'none' + server: '' +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: chain-basic + namespace: traefikmiddlewares +spec: + chain: + middlewares: + - name: basic-ratelimit + - name: basic-secure-headers + - name: compress diff --git a/stable/traefik/6.5.5/templates/custom/middlewares/basicauth.yaml b/stable/traefik/6.5.5/templates/custom/middlewares/basicauth.yaml new file mode 100644 index 00000000000..4e0f326a2f4 --- /dev/null +++ b/stable/traefik/6.5.5/templates/custom/middlewares/basicauth.yaml @@ -0,0 +1,29 @@ +{{ range $index, $middlewareData := .Values.middlewares.basicAuth }} +--- +{{- $users := list }} +{{ range $index, $userdata := $middlewareData.users }} + {{ $users = append $users ( htpasswd $userdata.username $userdata.password ) }} +{{ end }} + +apiVersion: v1 +kind: Secret +metadata: + name: {{printf "%v-%v" $middlewareData.name "secret" }} + namespace: traefikmiddlewares +type: Opaque +stringData: + users: | + {{- range $index, $user := $users }} + {{ printf "%s" $user }} + {{- end }} +--- +# Declaring the user list +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: {{ $middlewareData.name }} + namespace: traefikmiddlewares +spec: + basicAuth: + secret: {{printf "%v-%v" $middlewareData.name "secret" }} +{{ end }} diff --git a/stable/traefik/6.5.5/templates/custom/middlewares/chain.yaml b/stable/traefik/6.5.5/templates/custom/middlewares/chain.yaml new file mode 100644 index 00000000000..ef592c255ba --- /dev/null +++ b/stable/traefik/6.5.5/templates/custom/middlewares/chain.yaml @@ -0,0 +1,16 @@ +{{ range $index, $middlewareData := .Values.middlewares.chain }} + +--- +# Declaring the user list +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: {{ $middlewareData.name }} + namespace: traefikmiddlewares +spec: + chain: + middlewares: + {{ range $index, $chainData := .Values.middlewares.chainmiddlewares }} + - name: {{ printf "%v-%v@%v" "traefikmiddlewares" $chainData.name "kubernetescrd" }} + {{ end }} +{{ end }} diff --git a/stable/traefik/6.5.5/templates/custom/middlewares/forwardauth.yaml b/stable/traefik/6.5.5/templates/custom/middlewares/forwardauth.yaml new file mode 100644 index 00000000000..bb90d33775e --- /dev/null +++ b/stable/traefik/6.5.5/templates/custom/middlewares/forwardauth.yaml @@ -0,0 +1,23 @@ +{{ range $index, $middlewareData := .Values.middlewares.forwardAuth }} +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: {{ $middlewareData.name }} + namespace: traefikmiddlewares +spec: + forwardAuth: + address: {{ $middlewareData.address }} + {{- if $middlewareData.authResponseHeaders }} + authResponseHeaders: {{ $middlewareData.authResponseHeaders }} + {{- end }} + {{- if $middlewareData.authRequestHeaders }} + authRequestHeaders: {{ $middlewareData.authRequestHeaders }} + {{- end }} + {{- if $middlewareData.authResponseHeadersRegex }} + authResponseHeadersRegex: {{ $middlewareData.authResponseHeadersRegex }} + {{- end }} + {{- if $middlewareData.trustForwardHeader }} + trustForwardHeader: true + {{- end }} +{{ end }} diff --git a/stable/traefik/6.5.5/templates/custom/middlewares/ratelimit.yaml b/stable/traefik/6.5.5/templates/custom/middlewares/ratelimit.yaml new file mode 100644 index 00000000000..b4bfa938e6e --- /dev/null +++ b/stable/traefik/6.5.5/templates/custom/middlewares/ratelimit.yaml @@ -0,0 +1,14 @@ +{{ range $index, $middlewareData := .Values.middlewares.rateLimit }} + +--- +# Declaring the user list +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: {{ $middlewareData.name }} + namespace: traefikmiddlewares +spec: + rateLimit: + average: {{ $middlewareData.average }} + burst: {{ $middlewareData.burst }} +{{ end }} diff --git a/stable/traefik/6.5.5/templates/custom/middlewares/redirectScheme.yaml b/stable/traefik/6.5.5/templates/custom/middlewares/redirectScheme.yaml new file mode 100644 index 00000000000..070c8fc4a90 --- /dev/null +++ b/stable/traefik/6.5.5/templates/custom/middlewares/redirectScheme.yaml @@ -0,0 +1,14 @@ +{{ range $index, $middlewareData := .Values.middlewares.redirectScheme }} + +--- +# Declaring the user list +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: {{ $middlewareData.name }} + namespace: traefikmiddlewares +spec: + redirectScheme: + scheme: {{ $middlewareData.scheme }} + permanent: {{ $middlewareData.permanent }} +{{ end }} diff --git a/stable/traefik/6.5.5/templates/custom/portal.yaml b/stable/traefik/6.5.5/templates/custom/portal.yaml new file mode 100644 index 00000000000..92e80f287a2 --- /dev/null +++ b/stable/traefik/6.5.5/templates/custom/portal.yaml @@ -0,0 +1,45 @@ +{{- if .Values.portal }} +{{- if .Values.portal.enabled }} +{{- $ingr := dict -}} +{{- $host := "$node_ip" }} +{{- $port := 443 }} +{{- $protocol := "https" }} +{{- $portProtocol := "" }} +{{- $path := "/dashboard/" }} + +{{- if $ingr }} + {{- if $ingr.enabled }} + {{- range $ingr.hosts }} + {{- if .hostTpl }} + {{ $host = ( tpl .hostTpl $ ) }} + {{- else if .host }} + {{ $host = .host }} + {{- else }} + {{ $host = "$node_ip" }} + {{- end }} + {{- if .paths }} + {{- $path = (first .paths).path }} + {{- end }} + {{- end }} + {{- end }} +{{- end }} + +{{- if eq $host "$node_ip" }} + {{- $port = .Values.ports.traefik.exposedPort }} + {{- $protocol = "http" }} +{{- end }} + +--- + +apiVersion: v1 +kind: ConfigMap +metadata: + name: portal +data: + protocol: {{ $protocol }} + host: {{ $host | quote }} + port: {{ $port | quote }} + path: {{ $path | quote }} + url: {{ ( printf "%v://%v:%v%v" $protocol $host $port $path ) | quote }} +{{- end }} +{{- end }} diff --git a/stable/traefik/6.5.5/templates/custom/portalhook.yaml b/stable/traefik/6.5.5/templates/custom/portalhook.yaml new file mode 100644 index 00000000000..5a9fee80da4 --- /dev/null +++ b/stable/traefik/6.5.5/templates/custom/portalhook.yaml @@ -0,0 +1,12 @@ +{{- if .Values.portalhook.enabled }} + +--- + +apiVersion: v1 +kind: ConfigMap +metadata: + name: portalhook + namespace: traefikmiddlewares +data: + websecureport: {{ .Values.ports.websecure.exposedPort | quote }} +{{- end }} diff --git a/stable/traefik/6.5.5/templates/daemonset.yaml b/stable/traefik/6.5.5/templates/daemonset.yaml new file mode 100644 index 00000000000..469e105c358 --- /dev/null +++ b/stable/traefik/6.5.5/templates/daemonset.yaml @@ -0,0 +1,40 @@ +{{- if and .Values.deployment.enabled (eq .Values.deployment.kind "DaemonSet") -}} + {{- with .Values.additionalArguments -}} + {{- range . -}} + {{- if contains ".acme." . -}} + {{- fail (printf "ACME functionality is not supported when running Traefik as a DaemonSet") -}} + {{- end -}} + {{- end -}} + {{- end -}} + {{- if eq (default .Chart.AppVersion .Values.image.tag) "latest" }} + {{- fail "\n\n ERROR: latest tag should not be used" }} + {{- end }} + +--- +apiVersion: apps/v1 +kind: DaemonSet +metadata: + name: {{ template "traefik.fullname" . }} + labels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + helm.sh/chart: {{ template "traefik.chart" . }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/instance: {{ .Release.Name }} + {{- with .Values.deployment.labels }} + {{- toYaml . | nindent 4 }} + {{- end }} + annotations: + {{- with .Values.deployment.annotations }} + {{- toYaml . | nindent 4 }} + {{- end }} +spec: + selector: + matchLabels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + app.kubernetes.io/instance: {{ .Release.Name }} + updateStrategy: + type: RollingUpdate + rollingUpdate: + maxUnavailable: {{ .Values.rollingUpdate.maxUnavailable }} + template: {{ template "traefik.podTemplate" . }} +{{- end -}} diff --git a/stable/traefik/6.5.5/templates/dashboard-hook-ingressroute.yaml b/stable/traefik/6.5.5/templates/dashboard-hook-ingressroute.yaml new file mode 100644 index 00000000000..ec278c26910 --- /dev/null +++ b/stable/traefik/6.5.5/templates/dashboard-hook-ingressroute.yaml @@ -0,0 +1,28 @@ +{{- if .Values.ingressRoute.dashboard.enabled -}} +apiVersion: traefik.containo.us/v1alpha1 +kind: IngressRoute +metadata: + name: {{ template "traefik.fullname" . }}-dashboard + annotations: + helm.sh/hook: "post-install,post-upgrade" + {{- with .Values.ingressRoute.dashboard.annotations }} + {{- toYaml . | nindent 4 }} + {{- end }} + labels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + helm.sh/chart: {{ template "traefik.chart" . }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/instance: {{ .Release.Name }} + {{- with .Values.ingressRoute.dashboard.labels }} + {{- toYaml . | nindent 4 }} + {{- end }} +spec: + entryPoints: + - traefik + routes: + - match: PathPrefix(`/dashboard`) || PathPrefix(`/api`) + kind: Rule + services: + - name: api@internal + kind: TraefikService +{{- end -}} diff --git a/stable/traefik/6.5.5/templates/deployment.yaml b/stable/traefik/6.5.5/templates/deployment.yaml new file mode 100644 index 00000000000..494087cfd0a --- /dev/null +++ b/stable/traefik/6.5.5/templates/deployment.yaml @@ -0,0 +1,47 @@ +{{- if and .Values.deployment.enabled (eq .Values.deployment.kind "Deployment") -}} + {{- if gt (int .Values.deployment.replicas) 1 -}} + {{- with .Values.additionalArguments -}} + {{- range . -}} + {{- if contains ".acme." . -}} + {{- fail (printf "You can not enable acme if you set more than one traefik replica") -}} + {{- end -}} + {{- end -}} + {{- end -}} + {{- end -}} + {{- if eq (default .Chart.AppVersion .Values.image.tag) "latest" }} + {{- fail "\n\n ERROR: latest tag should not be used" }} + {{- end }} + +--- +apiVersion: apps/v1 +kind: Deployment +metadata: + name: {{ template "traefik.fullname" . }} + labels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + helm.sh/chart: {{ template "traefik.chart" . }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/instance: {{ .Release.Name }} + {{- with .Values.deployment.labels }} + {{- toYaml . | nindent 4 }} + {{- end }} + annotations: + {{- with .Values.deployment.annotations }} + {{- toYaml . | nindent 4 }} + {{- end }} +spec: + {{- if not .Values.autoscaling.enabled }} + replicas: {{ default 1 .Values.deployment.replicas }} + {{- end }} + selector: + matchLabels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + app.kubernetes.io/instance: {{ .Release.Name }} + strategy: + type: RollingUpdate + rollingUpdate: + {{- with .Values.rollingUpdate }} + {{- toYaml . | nindent 6 }} + {{- end }} + template: {{ template "traefik.podTemplate" . }} +{{- end -}} diff --git a/stable/traefik/6.5.5/templates/gateway.yaml b/stable/traefik/6.5.5/templates/gateway.yaml new file mode 100644 index 00000000000..85194211fe5 --- /dev/null +++ b/stable/traefik/6.5.5/templates/gateway.yaml @@ -0,0 +1,33 @@ +{{- if .Values.experimental.kubernetesGateway.enabled }} +--- +apiVersion: networking.x-k8s.io/v1alpha1 +kind: Gateway +metadata: + name: traefik-gateway + namespace: default +spec: + gatewayClassName: traefik + listeners: + - port: {{ .Values.ports.web.port }} + protocol: HTTP + routes: + kind: HTTPRoute + selector: + matchLabels: + app: {{ .Values.experimental.kubernetesGateway.appLabelSelector }} + + {{- range $index, $cert:= .Values.experimental.kubernetesGateway.certificates }} + - port: {{ $.Values.ports.websecure.port }} + protocol: HTTPS + tls: + certificateRef: + name: {{ $cert.name }} + group: {{ $cert.group }} + kind: {{ $cert.kind }} + routes: + kind: HTTPRoute + selector: + matchLabels: + app: {{ $.Values.experimental.kubernetesGateway.appLabelSelector }} + {{- end }} +{{- end }} diff --git a/stable/traefik/6.5.5/templates/gatewayclass.yaml b/stable/traefik/6.5.5/templates/gatewayclass.yaml new file mode 100644 index 00000000000..61bf007db1e --- /dev/null +++ b/stable/traefik/6.5.5/templates/gatewayclass.yaml @@ -0,0 +1,9 @@ +{{- if .Values.experimental.kubernetesGateway.enabled }} +--- +kind: GatewayClass +apiVersion: networking.x-k8s.io/v1alpha1 +metadata: + name: traefik +spec: + controller: traefik.io/gateway-controller +{{- end }} diff --git a/stable/traefik/6.5.5/templates/hpa.yaml b/stable/traefik/6.5.5/templates/hpa.yaml new file mode 100644 index 00000000000..bf37117de6a --- /dev/null +++ b/stable/traefik/6.5.5/templates/hpa.yaml @@ -0,0 +1,20 @@ +{{- if .Values.autoscaling.enabled }} +apiVersion: autoscaling/v2beta1 +kind: HorizontalPodAutoscaler +metadata: + name: {{ template "traefik.fullname" . }} + labels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + helm.sh/chart: {{ template "traefik.chart" . }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/instance: {{ .Release.Name }} +spec: + scaleTargetRef: + apiVersion: apps/v1 + kind: Deployment + name: {{ template "traefik.fullname" . }} + minReplicas: {{ .Values.autoscaling.minReplicas }} + maxReplicas: {{ .Values.autoscaling.maxReplicas }} + metrics: +{{ toYaml .Values.autoscaling.metrics | indent 4 }} +{{- end }} diff --git a/stable/traefik/6.5.5/templates/ingressclass.yaml b/stable/traefik/6.5.5/templates/ingressclass.yaml new file mode 100644 index 00000000000..7c62458c82e --- /dev/null +++ b/stable/traefik/6.5.5/templates/ingressclass.yaml @@ -0,0 +1,23 @@ +{{- if and .Values.ingressClass.enabled (semverCompare ">=2.3.0" (default .Chart.AppVersion .Values.image.tag)) -}} + {{- if .Capabilities.APIVersions.Has "networking.k8s.io/v1/IngressClass" }} +apiVersion: networking.k8s.io/v1 + {{- else if .Capabilities.APIVersions.Has "networking.k8s.io/v1beta1/IngressClass" }} +apiVersion: networking.k8s.io/v1beta1 + {{- else if or (eq .Values.ingressClass.fallbackApiVersion "v1beta1") (eq .Values.ingressClass.fallbackApiVersion "v1") }} +apiVersion: {{ printf "networking.k8s.io/%s" .Values.ingressClass.fallbackApiVersion }} + {{- else }} + {{- fail "\n\n ERROR: You must have atleast networking.k8s.io/v1beta1 to use ingressClass" }} + {{- end }} +kind: IngressClass +metadata: + annotations: + ingressclass.kubernetes.io/is-default-class: {{ .Values.ingressClass.isDefaultClass | quote }} + labels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + helm.sh/chart: {{ template "traefik.chart" . }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/instance: {{ .Release.Name }} + name: {{ template "traefik.fullname" . }} +spec: + controller: traefik.io/ingress-controller +{{- end }} diff --git a/stable/traefik/6.5.5/templates/poddisruptionbudget.yaml b/stable/traefik/6.5.5/templates/poddisruptionbudget.yaml new file mode 100644 index 00000000000..9893e521759 --- /dev/null +++ b/stable/traefik/6.5.5/templates/poddisruptionbudget.yaml @@ -0,0 +1,22 @@ +{{- if .Values.podDisruptionBudget.enabled -}} +apiVersion: policy/v1beta1 +kind: PodDisruptionBudget +metadata: + name: {{ template "traefik.fullname" . }} + labels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + helm.sh/chart: {{ template "traefik.chart" . }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/instance: {{ .Release.Name }} +spec: + selector: + matchLabels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + app.kubernetes.io/instance: {{ .Release.Name }} + {{- if .Values.podDisruptionBudget.minAvailable }} + minAvailable: {{ .Values.podDisruptionBudget.minAvailable | int }} + {{- end }} + {{- if .Values.podDisruptionBudget.maxUnavailable }} + maxUnavailable: {{ .Values.podDisruptionBudget.maxUnavailable | int }} + {{- end }} +{{- end -}} diff --git a/stable/traefik/6.5.5/templates/rbac/clusterrole.yaml b/stable/traefik/6.5.5/templates/rbac/clusterrole.yaml new file mode 100644 index 00000000000..2c63e006414 --- /dev/null +++ b/stable/traefik/6.5.5/templates/rbac/clusterrole.yaml @@ -0,0 +1,112 @@ +{{- if and .Values.rbac.enabled (not .Values.rbac.namespaced) -}} +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: {{ template "traefik.fullname" . }} + labels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + helm.sh/chart: {{ template "traefik.chart" . }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/instance: {{ .Release.Name }} +rules: + - apiGroups: + - "" + resources: + - services + - endpoints + - secrets + verbs: + - get + - list + - watch + - apiGroups: + - extensions + - networking.k8s.io + resources: + - ingresses + - ingressclasses + verbs: + - get + - list + - watch + - apiGroups: + - extensions + - networking.k8s.io + resources: + - ingresses/status + verbs: + - update + - apiGroups: + - traefik.containo.us + resources: + - ingressroutes + - ingressroutetcps + - ingressrouteudps + - middlewares + - tlsoptions + - tlsstores + - traefikservices + - serverstransports + verbs: + - get + - list + - watch +{{- if .Values.podSecurityPolicy.enabled }} + - apiGroups: + - policy + resourceNames: + - {{ template "traefik.fullname" . }} + resources: + - podsecuritypolicies + verbs: + - use +{{- end -}} +{{- if .Values.experimental.kubernetesGateway.enabled }} + - apiGroups: + - networking.x-k8s.io + resources: + - gatewayclasses + - gatewayclasses/status + - gateways + verbs: + - get + - list + - watch + - apiGroups: + - networking.x-k8s.io + resources: + - gatewayclasses/status + verbs: + - get + - patch + - update + - apiGroups: + - networking.x-k8s.io + resources: + - gateways/status + verbs: + - get + - patch + - update + - apiGroups: + - networking.x-k8s.io + resources: + - httproutes + verbs: + - create + - delete + - get + - list + - patch + - update + - watch + - apiGroups: + - networking.x-k8s.io + resources: + - httproutes/status + verbs: + - get + - patch + - update +{{- end -}} +{{- end -}} diff --git a/stable/traefik/6.5.5/templates/rbac/clusterrolebinding.yaml b/stable/traefik/6.5.5/templates/rbac/clusterrolebinding.yaml new file mode 100644 index 00000000000..509e92ff2b7 --- /dev/null +++ b/stable/traefik/6.5.5/templates/rbac/clusterrolebinding.yaml @@ -0,0 +1,19 @@ +{{- if and .Values.rbac.enabled (not .Values.rbac.namespaced) }} +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: {{ template "traefik.fullname" . }} + labels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + helm.sh/chart: {{ template "traefik.chart" . }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/instance: {{ .Release.Name }} +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: {{ template "traefik.fullname" . }} +subjects: + - kind: ServiceAccount + name: {{ include "traefik.serviceAccountName" . }} + namespace: {{ .Release.Namespace }} +{{- end -}} diff --git a/stable/traefik/6.5.5/templates/rbac/podsecuritypolicy.yaml b/stable/traefik/6.5.5/templates/rbac/podsecuritypolicy.yaml new file mode 100644 index 00000000000..66bc1458d55 --- /dev/null +++ b/stable/traefik/6.5.5/templates/rbac/podsecuritypolicy.yaml @@ -0,0 +1,68 @@ +{{- if .Values.podSecurityPolicy.enabled }} +--- +apiVersion: policy/v1beta1 +kind: PodSecurityPolicy +metadata: + annotations: + seccomp.security.alpha.kubernetes.io/allowedProfileNames: runtime/default + seccomp.security.alpha.kubernetes.io/defaultProfileName: runtime/default + name: {{ template "traefik.fullname" . }} + labels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + helm.sh/chart: {{ template "traefik.chart" . }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/instance: {{ .Release.Name }} +spec: + privileged: false + allowPrivilegeEscalation: false + requiredDropCapabilities: + - ALL +{{- if not .Values.securityContext.runAsNonRoot }} + allowedCapabilities: + - NET_BIND_SERVICE +{{- end }} + hostNetwork: {{ .Values.hostNetwork }} + hostIPC: false + hostPID: false + fsGroup: +{{- if .Values.securityContext.runAsNonRoot }} + ranges: + - max: 65535 + min: 1 + rule: MustRunAs +{{- else }} + rule: RunAsAny +{{- end }} +{{- if .Values.hostNetwork }} + hostPorts: + - max: 65535 + min: 1 +{{- end }} + readOnlyRootFilesystem: true + runAsUser: +{{- if .Values.securityContext.runAsNonRoot }} + rule: MustRunAsNonRoot +{{- else }} + rule: RunAsAny +{{- end }} + seLinux: + rule: RunAsAny + supplementalGroups: +{{- if .Values.securityContext.runAsNonRoot }} + ranges: + - max: 65535 + min: 1 + rule: MustRunAs +{{- else }} + rule: RunAsAny +{{- end }} + volumes: + - configMap + - downwardAPI + - secret + - emptyDir + - projected +{{- if .Values.persistence.enabled }} + - persistentVolumeClaim +{{- end -}} +{{- end -}} diff --git a/stable/traefik/6.5.5/templates/rbac/role.yaml b/stable/traefik/6.5.5/templates/rbac/role.yaml new file mode 100644 index 00000000000..6c763065d6f --- /dev/null +++ b/stable/traefik/6.5.5/templates/rbac/role.yaml @@ -0,0 +1,61 @@ +{{- if and .Values.rbac.enabled .Values.rbac.namespaced }} +kind: Role +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: {{ template "traefik.fullname" . }} + labels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + helm.sh/chart: {{ template "traefik.chart" . }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/instance: {{ .Release.Name }} +rules: + - apiGroups: + - "" + resources: + - services + - endpoints + - secrets + verbs: + - get + - list + - watch + - apiGroups: + - extensions + resources: + - ingresses + verbs: + - get + - list + - watch + - apiGroups: + - extensions + resources: + - ingresses/status + verbs: + - update + - apiGroups: + - traefik.containo.us + resources: + - ingressroutes + - ingressroutetcps + - ingressrouteudps + - middlewares + - tlsoptions + - tlsstores + - traefikservices + - serverstransports + verbs: + - get + - list + - watch +{{- if .Values.podSecurityPolicy.enabled }} + - apiGroups: + - extensions + resourceNames: + - {{ template "traefik.fullname" . }} + resources: + - podsecuritypolicies + verbs: + - use +{{- end -}} +{{- end -}} diff --git a/stable/traefik/6.5.5/templates/rbac/rolebinding.yaml b/stable/traefik/6.5.5/templates/rbac/rolebinding.yaml new file mode 100644 index 00000000000..10416401867 --- /dev/null +++ b/stable/traefik/6.5.5/templates/rbac/rolebinding.yaml @@ -0,0 +1,19 @@ +{{- if and .Values.rbac.enabled .Values.rbac.namespaced }} +kind: RoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: {{ template "traefik.fullname" . }} + labels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + helm.sh/chart: {{ template "traefik.chart" . }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/instance: {{ .Release.Name }} +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: {{ template "traefik.fullname" . }} +subjects: + - kind: ServiceAccount + name: {{ include "traefik.serviceAccountName" . }} + namespace: {{ .Release.Namespace }} +{{- end -}} diff --git a/stable/traefik/6.5.5/templates/rbac/serviceaccount.yaml b/stable/traefik/6.5.5/templates/rbac/serviceaccount.yaml new file mode 100644 index 00000000000..bcc941eec95 --- /dev/null +++ b/stable/traefik/6.5.5/templates/rbac/serviceaccount.yaml @@ -0,0 +1,15 @@ +{{- if not .Values.serviceAccount.name -}} +kind: ServiceAccount +apiVersion: v1 +metadata: + name: {{ include "traefik.serviceAccountName" . }} + labels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + helm.sh/chart: {{ template "traefik.chart" . }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/instance: {{ .Release.Name }} + annotations: + {{- with .Values.serviceAccountAnnotations }} + {{- toYaml . | nindent 4 }} + {{- end }} +{{- end -}} diff --git a/stable/traefik/6.5.5/templates/service.yaml b/stable/traefik/6.5.5/templates/service.yaml new file mode 100644 index 00000000000..745bb9102d7 --- /dev/null +++ b/stable/traefik/6.5.5/templates/service.yaml @@ -0,0 +1,114 @@ +{{- if .Values.service.enabled -}} + +{{ $tcpPorts := dict }} +{{ $udpPorts := dict }} +{{- range $name, $config := .Values.ports }} + {{- if eq (toString $config.protocol) "UDP" }} + {{ $_ := set $udpPorts $name $config }} + {{- else }} + {{ $_ := set $tcpPorts $name $config }} + {{- end }} +{{- end }} + +apiVersion: v1 +kind: List +metadata: + name: {{ template "traefik.fullname" . }} +items: +{{- if $tcpPorts }} + - apiVersion: v1 + kind: Service + metadata: + name: {{ template "traefik.fullname" . }} + labels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + helm.sh/chart: {{ template "traefik.chart" . }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/instance: {{ .Release.Name }} + {{- with .Values.service.labels }} + {{- toYaml . | nindent 8 }} + {{- end }} + annotations: + {{- with .Values.service.annotations }} + {{- toYaml . | nindent 8 }} + {{- end }} + spec: + {{- $type := default "LoadBalancer" .Values.service.type }} + type: {{ $type }} + {{- with .Values.service.spec }} + {{- toYaml . | nindent 6 }} + {{- end }} + selector: + app.kubernetes.io/name: {{ template "traefik.name" . }} + app.kubernetes.io/instance: {{ .Release.Name }} + ports: + {{- range $name, $config := $tcpPorts }} + {{- if $config.expose }} + - port: {{ default $config.port $config.exposedPort }} + name: {{ $name }} + targetPort: {{ $name | quote }} + protocol: {{ default "TCP" $config.protocol | quote }} + {{- if $config.nodePort }} + nodePort: {{ $config.nodePort }} + {{- end }} + {{- end }} + {{- end }} + {{- if eq $type "LoadBalancer" }} + {{- with .Values.service.loadBalancerSourceRanges }} + loadBalancerSourceRanges: + {{- toYaml . | nindent 6 }} + {{- end -}} + {{- end -}} + {{- with .Values.service.externalIPs }} + externalIPs: + {{- toYaml . | nindent 6 }} + {{- end -}} +{{- end }} + +{{- if $udpPorts }} + - apiVersion: v1 + kind: Service + metadata: + name: {{ template "traefik.fullname" . }}-udp + labels: + app.kubernetes.io/name: {{ template "traefik.name" . }} + helm.sh/chart: {{ template "traefik.chart" . }} + app.kubernetes.io/managed-by: {{ .Release.Service }} + app.kubernetes.io/instance: {{ .Release.Name }} + annotations: + {{- with .Values.service.annotations }} + {{- toYaml . | nindent 8 }} + {{- end }} + spec: + {{- $type := default "LoadBalancer" .Values.service.type }} + type: {{ $type }} + {{- with .Values.service.spec }} + {{- toYaml . | nindent 6 }} + {{- end }} + selector: + app.kubernetes.io/name: {{ template "traefik.name" . }} + app.kubernetes.io/instance: {{ .Release.Name }} + ports: + {{- range $name, $config := $udpPorts }} + {{- if $config.expose }} + - port: {{ default $config.port $config.exposedPort }} + name: {{ $name }} + targetPort: {{ $name | quote }} + protocol: {{ default "UDP" $config.protocol | quote }} + {{- if $config.nodePort }} + nodePort: {{ $config.nodePort }} + {{- end }} + {{- end }} + {{- end }} + {{- if eq $type "LoadBalancer" }} + {{- with .Values.service.loadBalancerSourceRanges }} + loadBalancerSourceRanges: + {{- toYaml . | nindent 6 }} + {{- end -}} + {{- end -}} + {{- with .Values.service.externalIPs }} + externalIPs: + {{- toYaml . | nindent 6 }} + {{- end -}} +{{- end }} +{{- end -}} diff --git a/stable/traefik/6.5.5/templates/tlsoption.yaml b/stable/traefik/6.5.5/templates/tlsoption.yaml new file mode 100644 index 00000000000..ec46e8bbc94 --- /dev/null +++ b/stable/traefik/6.5.5/templates/tlsoption.yaml @@ -0,0 +1,14 @@ +{{- range $name, $config := .Values.tlsOptions }} +apiVersion: traefik.containo.us/v1alpha1 +kind: TLSOption +metadata: + name: {{ $name }} + labels: + app.kubernetes.io/name: {{ template "traefik.name" $ }} + helm.sh/chart: {{ template "traefik.chart" $ }} + app.kubernetes.io/managed-by: {{ $.Release.Service }} + app.kubernetes.io/instance: {{ $.Release.Name }} +spec: + {{- toYaml $config | nindent 2 }} +--- +{{- end -}} diff --git a/stable/traefik/6.5.5/test_values.yaml b/stable/traefik/6.5.5/test_values.yaml new file mode 100644 index 00000000000..596cc786695 --- /dev/null +++ b/stable/traefik/6.5.5/test_values.yaml @@ -0,0 +1,438 @@ +# Default values for Traefik +image: + name: traefik + # defaults to appVersion + tag: v2.4 + pullPolicy: IfNotPresent + +# +# Configure the deployment +# +deployment: + enabled: true + # Can be either Deployment or DaemonSet + kind: Deployment + # Number of pods of the deployment (only applies when kind == Deployment) + replicas: 1 + # Additional deployment annotations (e.g. for jaeger-operator sidecar injection) + annotations: {} + # Additional deployment labels (e.g. for filtering deployment by custom labels) + labels: {} + # Additional pod annotations (e.g. for mesh injection or prometheus scraping) + podAnnotations: {} + # Additional Pod labels (e.g. for filtering Pod by custom labels) + podLabels: {} + # Additional containers (e.g. for metric offloading sidecars) + additionalContainers: [] + # https://docs.datadoghq.com/developers/dogstatsd/unix_socket/?tab=host + # - name: socat-proxy + # image: alpine/socat:1.0.5 + # args: ["-s", "-u", "udp-recv:8125", "unix-sendto:/socket/socket"] + # volumeMounts: + # - name: dsdsocket + # mountPath: /socket + # Additional volumes available for use with initContainers and additionalContainers + additionalVolumes: [] + # - name: dsdsocket + # hostPath: + # path: /var/run/statsd-exporter + # Additional initContainers (e.g. for setting file permission as shown below) + initContainers: [] + # The "volume-permissions" init container is required if you run into permission issues. + # Related issue: https://github.com/traefik/traefik/issues/6972 + # - name: volume-permissions + # image: busybox:1.31.1 + # command: ["sh", "-c", "chmod -Rv 600 /data/*"] + # volumeMounts: + # - name: data + # mountPath: /data + # Custom pod DNS policy. Apply if `hostNetwork: true` + # dnsPolicy: ClusterFirstWithHostNet + # Additional imagePullSecrets + imagePullSecrets: [] + # - name: myRegistryKeySecretName + +# Pod disruption budget +podDisruptionBudget: + enabled: false + # maxUnavailable: 1 + # minAvailable: 0 + +# Use ingressClass. Ignored if Traefik version < 2.3 / kubernetes < 1.18.x +ingressClass: + # true is not unit-testable yet, pending https://github.com/rancher/helm-unittest/pull/12 + enabled: false + isDefaultClass: false + # Use to force a networking.k8s.io API Version for certain CI/CD applications. E.g. "v1beta1" + fallbackApiVersion: + +# Activate Pilot integration +pilot: + enabled: false + token: "" + # Toggle Pilot Dashboard + # dashboard: false + +# Enable experimental features +experimental: + plugins: + enabled: false + kubernetesGateway: + enabled: false + appLabelSelector: "traefik" + certificates: [] + # - group: "core" + # kind: "Secret" + # name: "mysecret" + +# Create an IngressRoute for the dashboard +ingressRoute: + dashboard: + enabled: true + # Additional ingressRoute annotations (e.g. for kubernetes.io/ingress.class) + annotations: {} + # Additional ingressRoute labels (e.g. for filtering IngressRoute by custom labels) + labels: {} + +rollingUpdate: + maxUnavailable: 1 + maxSurge: 1 + + +# +# Configure providers +# +providers: + kubernetesCRD: + enabled: true + namespaces: [] + # - "default" + kubernetesIngress: + enabled: true + # labelSelector: environment=production,method=traefik + namespaces: [] + # - "default" + # IP used for Kubernetes Ingress endpoints + publishedService: + enabled: false + # Published Kubernetes Service to copy status from. Format: namespace/servicename + # By default this Traefik service + # pathOverride: "" + +# +# Add volumes to the traefik pod. The volume name will be passed to tpl. +# This can be used to mount a cert pair or a configmap that holds a config.toml file. +# After the volume has been mounted, add the configs into traefik by using the `additionalArguments` list below, eg: +# additionalArguments: +# - "--providers.file.filename=/config/dynamic.toml" +# - "--ping" +# - "--ping.entrypoint=web" +volumes: [] +# - name: public-cert +# mountPath: "/certs" +# type: secret +# - name: '{{ printf "%s-configs" .Release.Name }}' +# mountPath: "/config" +# type: configMap + +# Additional volumeMounts to add to the Traefik container +additionalVolumeMounts: [] + # For instance when using a logshipper for access logs + # - name: traefik-logs + # mountPath: /var/log/traefik + +# Logs +# https://docs.traefik.io/observability/logs/ +logs: + # Traefik logs concern everything that happens to Traefik itself (startup, configuration, events, shutdown, and so on). + general: + # By default, the logs use a text format (common), but you can + # also ask for the json format in the format option + # format: json + # By default, the level is set to ERROR. Alternative logging levels are DEBUG, PANIC, FATAL, ERROR, WARN, and INFO. + level: INFO + access: + # To enable access logs + enabled: false + # By default, logs are written using the Common Log Format (CLF). + # To write logs in JSON, use json in the format option. + # If the given format is unsupported, the default (CLF) is used instead. + # format: json + # To write the logs in an asynchronous fashion, specify a bufferingSize option. + # This option represents the number of log lines Traefik will keep in memory before writing + # them to the selected output. In some cases, this option can greatly help performances. + # bufferingSize: 100 + # Filtering https://docs.traefik.io/observability/access-logs/#filtering + filters: {} + # statuscodes: "200,300-302" + # retryattempts: true + # minduration: 10ms + # Fields + # https://docs.traefik.io/observability/access-logs/#limiting-the-fieldsincluding-headers + fields: + general: + defaultmode: keep + names: {} + # Examples: + # ClientUsername: drop + headers: + defaultmode: drop + names: {} + # Examples: + # User-Agent: redact + # Authorization: drop + # Content-Type: keep + +globalArguments: + - "--global.checknewversion" + +# +# Configure Traefik static configuration +# Additional arguments to be passed at Traefik's binary +# All available options available on https://docs.traefik.io/reference/static-configuration/cli/ +## Use curly braces to pass values: `helm install --set="additionalArguments={--providers.kubernetesingress.ingressclass=traefik-internal,--log.level=DEBUG}"` +additionalArguments: + - "--metrics.prometheus" + - "--ping" + - "--serverstransport.insecureskipverify=true" + +# Environment variables to be passed to Traefik's binary +env: [] +# - name: SOME_VAR +# value: some-var-value +# - name: SOME_VAR_FROM_CONFIG_MAP +# valueFrom: +# configMapRef: +# name: configmap-name +# key: config-key +# - name: SOME_SECRET +# valueFrom: +# secretKeyRef: +# name: secret-name +# key: secret-key + +envFrom: [] +# - configMapRef: +# name: config-map-name +# - secretRef: +# name: secret-name + +# Configure ports +ports: + # The name of this one can't be changed as it is used for the readiness and + # liveness probes, but you can adjust its config to your liking + traefik: + port: 9000 + # Use hostPort if set. + # hostPort: 9000 + # + # Use hostIP if set. If not set, Kubernetes will default to 0.0.0.0, which + # means it's listening on all your interfaces and all your IPs. You may want + # to set this value if you need traefik to listen on specific interface + # only. + # hostIP: 192.168.100.10 + + # Defines whether the port is exposed if service.type is LoadBalancer or + # NodePort. + # + # You SHOULD NOT expose the traefik port on production deployments. + # If you want to access it from outside of your cluster, + # use `kubectl port-forward` or create a secure ingress + expose: false + # The exposed port for this service + exposedPort: 9000 + # The port protocol (TCP/UDP) + protocol: TCP + web: + port: 9080 + # hostPort: 8000 + expose: true + exposedPort: 80 + # The port protocol (TCP/UDP) + protocol: TCP + # Use nodeport if set. This is useful if you have configured Traefik in a + # LoadBalancer + # nodePort: 32080 + # Port Redirections + # Added in 2.2, you can make permanent redirects via entrypoints. + # https://docs.traefik.io/routing/entrypoints/#redirection + redirectTo: websecure + websecure: + port: 9443 + # hostPort: 8443 + expose: true + exposedPort: 443 + # The port protocol (TCP/UDP) + protocol: TCP + # nodePort: 32443 + # Set TLS at the entrypoint + # https://doc.traefik.io/traefik/routing/entrypoints/#tls + tls: + enabled: true + +# TLS Options are created as TLSOption CRDs +# https://doc.traefik.io/traefik/https/tls/#tls-options +# Example: +tlsOptions: + default: + sniStrict: false + minVersion: VersionTLS12 + curvePreferences: + - CurveP521 + - CurveP384 + cipherSuites: + - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 + - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 + - TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 + - TLS_AES_128_GCM_SHA256 + - TLS_AES_256_GCM_SHA384 + - TLS_CHACHA20_POLY1305_SHA256 + +# Options for the main traefik service, where the entrypoints traffic comes +# from. +service: + enabled: true + type: LoadBalancer + # Additional annotations (e.g. for cloud provider specific config) + annotations: {} + # Additional service labels (e.g. for filtering Service by custom labels) + labels: {} + # Additional entries here will be added to the service spec. Cannot contains + # type, selector or ports entries. + spec: {} + # externalTrafficPolicy: Cluster + # loadBalancerIP: "1.2.3.4" + # clusterIP: "2.3.4.5" + loadBalancerSourceRanges: [] + # - 192.168.0.1/32 + # - 172.16.0.0/16 + externalIPs: [] + # - 1.2.3.4 + +## Create HorizontalPodAutoscaler object. +## +autoscaling: + enabled: false +# minReplicas: 1 +# maxReplicas: 10 +# metrics: +# - type: Resource +# resource: +# name: cpu +# targetAverageUtilization: 60 +# - type: Resource +# resource: +# name: memory +# targetAverageUtilization: 60 + +# Enable persistence using Persistent Volume Claims +# ref: http://kubernetes.io/docs/user-guide/persistent-volumes/ +# After the pvc has been mounted, add the configs into traefik by using the `additionalArguments` list below, eg: +# additionalArguments: +# - "--certificatesresolvers.le.acme.storage=/data/acme.json" +# It will persist TLS certificates. +persistence: + enabled: false + name: data + accessMode: ReadWriteOnce + size: 128Mi + path: /data + +# If hostNetwork is true, runs traefik in the host network namespace +# To prevent unschedulabel pods due to port collisions, if hostNetwork=true +# and replicas>1, a pod anti-affinity is recommended and will be set if the +# affinity is left as default. +hostNetwork: false + +# Whether Role Based Access Control objects like roles and rolebindings should be created +rbac: + enabled: true + + # If set to false, installs ClusterRole and ClusterRoleBinding so Traefik can be used across namespaces. + # If set to true, installs namespace-specific Role and RoleBinding and requires provider configuration be set to that same namespace + namespaced: false + +# Enable to create a PodSecurityPolicy and assign it to the Service Account via RoleBinding or ClusterRoleBinding +podSecurityPolicy: + enabled: false + +# The service account the pods will use to interact with the Kubernetes API +serviceAccount: + # If set, an existing service account is used + # If not set, a service account is created automatically using the fullname template + name: "" + +# Additional serviceAccount annotations (e.g. for oidc authentication) +serviceAccountAnnotations: {} + +resources: {} + # requests: + # cpu: "100m" + # memory: "50Mi" + # limits: + # cpu: "300m" + # memory: "150Mi" +affinity: {} +# # This example pod anti-affinity forces the scheduler to put traefik pods +# # on nodes where no other traefik pods are scheduled. +# # It should be used when hostNetwork: true to prevent port conflicts +# podAntiAffinity: +# requiredDuringSchedulingIgnoredDuringExecution: +# - labelSelector: +# matchExpressions: +# - key: app +# operator: In +# values: +# - {{ template "traefik.name" . }} +# topologyKey: failure-domain.beta.kubernetes.io/zone +nodeSelector: {} +tolerations: [] + +# Pods can have priority. +# Priority indicates the importance of a Pod relative to other Pods. +priorityClassName: "" + +# Set the container security context +# To run the container with ports below 1024 this will need to be adjust to run as root +securityContext: + capabilities: + drop: [ALL] + readOnlyRootFilesystem: true + runAsGroup: 65532 + runAsNonRoot: true + runAsUser: 65532 + +podSecurityContext: + fsGroup: 65532 + +## SCALE Middleware Handlers + +middlewares: + basicAuth: [] + # - name: basicauthexample + # users: + # - username: testuser + # password: testpassword + forwardAuth: [] + # - name: forwardAuthexample + # address: https://auth.example.com/ + # authResponseHeaders: + # - X-Secret + # - X-Auth-User + # authRequestHeaders: + # - "Accept" + # - "X-CustomHeader" + # authResponseHeadersRegex: "^X-" + # trustForwardHeader: true + chain: [] + # middlewares: + # - name: compress + redirectScheme: [] + # scheme: https + # permanent: true + rateLimit: [] + # average: 300 + # burst: 200 + +portalhook: + enabled: true diff --git a/stable/traefik/6.5.5/values.yaml b/stable/traefik/6.5.5/values.yaml new file mode 100644 index 00000000000..e69de29bb2d diff --git a/stable/transmission/6.3.1/Chart.lock b/stable/transmission/6.3.1/Chart.lock index d64d79aeab8..8f9655e344b 100644 --- a/stable/transmission/6.3.1/Chart.lock +++ b/stable/transmission/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:31:26.264273283Z" +generated: "2021-07-05T16:16:02.055653542Z" diff --git a/stable/truecommand/6.3.1/Chart.lock b/stable/truecommand/6.3.1/Chart.lock index 0bca18e5ac6..866ae663517 100644 --- a/stable/truecommand/6.3.1/Chart.lock +++ b/stable/truecommand/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:31:28.088586881Z" +generated: "2021-07-05T16:16:05.334279644Z" diff --git a/stable/vaultwarden/3.4.1/Chart.lock b/stable/vaultwarden/3.4.1/Chart.lock index c14b8d0e29d..4b397c37d66 100644 --- a/stable/vaultwarden/3.4.1/Chart.lock +++ b/stable/vaultwarden/3.4.1/Chart.lock @@ -6,4 +6,4 @@ dependencies: repository: https://charts.bitnami.com/bitnami version: 10.5.1 digest: sha256:70f687e3857498e272f62267e36319bf57c051ca6920a2c625f84be299b5ac0b -generated: "2021-07-05T15:31:32.639650785Z" +generated: "2021-07-05T16:16:11.771841109Z" diff --git a/stable/zwavejs2mqtt/6.3.1/Chart.lock b/stable/zwavejs2mqtt/6.3.1/Chart.lock index 580239e8729..81bcdaa6ac1 100644 --- a/stable/zwavejs2mqtt/6.3.1/Chart.lock +++ b/stable/zwavejs2mqtt/6.3.1/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org/ version: 6.5.1 digest: sha256:49ebea6c66ae70170dffb08df5a4e1f9fcf14d38645d3dd1c5369a77214045ed -generated: "2021-07-05T15:31:37.659059127Z" +generated: "2021-07-05T16:16:19.733463263Z"