diff --git a/stable/ipfs/2.0.10/CHANGELOG.md b/stable/ipfs/2.0.11/CHANGELOG.md
similarity index 90%
rename from stable/ipfs/2.0.10/CHANGELOG.md
rename to stable/ipfs/2.0.11/CHANGELOG.md
index 62493bb3b5d..23f993b7dfc 100644
--- a/stable/ipfs/2.0.10/CHANGELOG.md
+++ b/stable/ipfs/2.0.11/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [ipfs-2.0.11](https://github.com/truecharts/apps/compare/ipfs-2.0.10...ipfs-2.0.11) (2022-05-23)
+
+#### Fix
+
+* missing sections of UI ([#2738](https://github.com/truecharts/apps/issues/2738))
+
+
+
### [ipfs-2.0.10](https://github.com/truecharts/apps/compare/ipfs-2.0.9...ipfs-2.0.10) (2022-05-17)
@@ -88,12 +97,3 @@
### [ipfs-2.0.2](https://github.com/truecharts/apps/compare/ipfs-2.0.1...ipfs-2.0.2) (2022-04-09)
#### Chore
-
-* update docker general non-major ([#2460](https://github.com/truecharts/apps/issues/2460))
-
-
-
-
-### [ipfs-2.0.1](https://github.com/truecharts/apps/compare/ipfs-2.0.0...ipfs-2.0.1) (2022-04-03)
-
-#### Chore
diff --git a/stable/ipfs/2.0.10/CONFIG.md b/stable/ipfs/2.0.11/CONFIG.md
similarity index 100%
rename from stable/ipfs/2.0.10/CONFIG.md
rename to stable/ipfs/2.0.11/CONFIG.md
diff --git a/stable/ipfs/2.0.10/Chart.lock b/stable/ipfs/2.0.11/Chart.lock
similarity index 80%
rename from stable/ipfs/2.0.10/Chart.lock
rename to stable/ipfs/2.0.11/Chart.lock
index bcff501ae91..2a43c70b023 100644
--- a/stable/ipfs/2.0.10/Chart.lock
+++ b/stable/ipfs/2.0.11/Chart.lock
@@ -3,4 +3,4 @@ dependencies:
repository: https://library-charts.truecharts.org
version: 9.3.15
digest: sha256:2780c5c9011b217ffa252e93a89e58c261816b385c5618e522b90f86736c9e78
-generated: "2022-05-18T19:41:53.255657063Z"
+generated: "2022-05-23T20:51:13.493702761Z"
diff --git a/stable/ipfs/2.0.10/Chart.yaml b/stable/ipfs/2.0.11/Chart.yaml
similarity index 98%
rename from stable/ipfs/2.0.10/Chart.yaml
rename to stable/ipfs/2.0.11/Chart.yaml
index 9213f207e04..a0c5ca1eb4e 100644
--- a/stable/ipfs/2.0.10/Chart.yaml
+++ b/stable/ipfs/2.0.11/Chart.yaml
@@ -1,7 +1,7 @@
apiVersion: v2
kubeVersion: ">=1.16.0-0"
name: ipfs
-version: 2.0.10
+version: 2.0.11
appVersion: "0.12.2"
description: IPFS is a global, versioned, peer-to-peer filesystem. It combines good ideas from previous systems such Git, BitTorrent, Kademlia, SFS, and the Web. It is like a single bittorrent swarm, exchanging git objects.
type: application
diff --git a/stable/ipfs/2.0.10/README.md b/stable/ipfs/2.0.11/README.md
similarity index 100%
rename from stable/ipfs/2.0.10/README.md
rename to stable/ipfs/2.0.11/README.md
diff --git a/stable/ipfs/2.0.10/app-readme.md b/stable/ipfs/2.0.11/app-readme.md
similarity index 100%
rename from stable/ipfs/2.0.10/app-readme.md
rename to stable/ipfs/2.0.11/app-readme.md
diff --git a/stable/ipfs/2.0.10/charts/common-9.3.15.tgz b/stable/ipfs/2.0.11/charts/common-9.3.15.tgz
similarity index 100%
rename from stable/ipfs/2.0.10/charts/common-9.3.15.tgz
rename to stable/ipfs/2.0.11/charts/common-9.3.15.tgz
diff --git a/stable/ipfs/2.0.10/helm-values.md b/stable/ipfs/2.0.11/helm-values.md
similarity index 100%
rename from stable/ipfs/2.0.10/helm-values.md
rename to stable/ipfs/2.0.11/helm-values.md
diff --git a/stable/ipfs/2.0.10/ix_values.yaml b/stable/ipfs/2.0.11/ix_values.yaml
similarity index 100%
rename from stable/ipfs/2.0.10/ix_values.yaml
rename to stable/ipfs/2.0.11/ix_values.yaml
diff --git a/stable/ipfs/2.0.10/questions.yaml b/stable/ipfs/2.0.11/questions.yaml
similarity index 99%
rename from stable/ipfs/2.0.10/questions.yaml
rename to stable/ipfs/2.0.11/questions.yaml
index 31dc522256a..f7ba556dd98 100644
--- a/stable/ipfs/2.0.10/questions.yaml
+++ b/stable/ipfs/2.0.11/questions.yaml
@@ -170,12 +170,26 @@ questions:
label: "Value"
schema:
type: string
+ - variable: secret
+ group: "Container Configuration"
+ label: "Image Secrets"
+ schema:
+ additional_attrs: true
+ type: dict
+ attrs:
- variable: IPFS_SWARM_KEY
label: "IPFS_SWARM_KEY"
description: "The IPFS_SWARM_KEY creates swarm.key with the contents of the variable itself."
schema:
type: string
default: ""
+ - variable: env
+ group: "Container Configuration"
+ label: "Image Environment"
+ schema:
+ additional_attrs: true
+ type: dict
+ attrs:
- variable: IPFS_PROFILE
label: "IPFS_PROFILE (Initial install only)"
description: "When starting a container running ipfs for the first time with an empty data directory, it will call ipfs init to initialize configuration files and generate a new keypair. At this time, you can choose which profile to apply using the IPFS_PROFILE."
diff --git a/stable/ipfs/2.0.10/security.md b/stable/ipfs/2.0.11/security.md
similarity index 99%
rename from stable/ipfs/2.0.10/security.md
rename to stable/ipfs/2.0.11/security.md
index 09b777ef399..d6364a5ffd2 100644
--- a/stable/ipfs/2.0.10/security.md
+++ b/stable/ipfs/2.0.11/security.md
@@ -69,7 +69,7 @@ hide:
| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | Expand...
https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
|
| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 | Expand...
https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
|
| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 | Expand...
https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
|
-| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 | Expand...
http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-1642.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
|
+| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 | Expand...
http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
|
#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2)
@@ -90,7 +90,7 @@ hide:
| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | Expand...
https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
|
| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 | Expand...
https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
|
| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 | Expand...
https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
|
-| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 | Expand...
http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-1642.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
|
+| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 | Expand...
http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
|
#### Container: usr/local/bin/ipfs
diff --git a/stable/ipfs/2.0.10/templates/common.yaml b/stable/ipfs/2.0.11/templates/common.yaml
similarity index 100%
rename from stable/ipfs/2.0.10/templates/common.yaml
rename to stable/ipfs/2.0.11/templates/common.yaml
diff --git a/stable/ipfs/2.0.10/values.yaml b/stable/ipfs/2.0.11/values.yaml
similarity index 100%
rename from stable/ipfs/2.0.10/values.yaml
rename to stable/ipfs/2.0.11/values.yaml