143 lines
3.3 KiB
YAML
143 lines
3.3 KiB
YAML
image:
|
|
repository: tccr.io/truecharts/pialert
|
|
pullPolicy: IfNotPresent
|
|
tag: latest@sha256:c319211da48c6fbfc7cfa369cc0763a5bdfb7516b7132e3cb2c953dddeed3505
|
|
|
|
securityContext:
|
|
readOnlyRootFilesystem: false
|
|
runAsNonRoot: false
|
|
|
|
podSecurityContext:
|
|
runAsUser: 0
|
|
runAsGroup: 0
|
|
|
|
hostNetwork: true
|
|
|
|
pialert:
|
|
general:
|
|
dark_mode: true
|
|
web_protection: false
|
|
web_password: ""
|
|
print_log: false
|
|
report_dashboard_url: http://localhost
|
|
days_to_keep_events: 90
|
|
scan_cycle_minutes: 5
|
|
included_sections: []
|
|
scan_subnets:
|
|
[]
|
|
# - cidr: "192.168.1.0/24"
|
|
# interface: eth0
|
|
pushsafer:
|
|
enabled: false
|
|
token: ""
|
|
apprise:
|
|
enabled: false
|
|
host: ""
|
|
url: ""
|
|
ntfy:
|
|
enabled: false
|
|
host: ""
|
|
topic: ""
|
|
user: ""
|
|
password: ""
|
|
webhook:
|
|
enabled: false
|
|
url: ""
|
|
payload: json
|
|
method: GET
|
|
email:
|
|
enabled: false
|
|
server: ""
|
|
port: 587
|
|
report_to: ""
|
|
report_from: ""
|
|
skip_login: false
|
|
skip_tls: false
|
|
user: ""
|
|
password: ""
|
|
mqtt:
|
|
enabled: false
|
|
broker: ""
|
|
port: 1883
|
|
user: ""
|
|
password: ""
|
|
qos: 0
|
|
delay_sec: 2
|
|
dyndns:
|
|
enabled: false
|
|
domain: ""
|
|
user: ""
|
|
password: ""
|
|
update_url: ""
|
|
pholus:
|
|
enabled: false
|
|
timeout: 20
|
|
force: false
|
|
days_data: 7
|
|
run: once
|
|
run_timeout: 300
|
|
run_schedule: "0 4 * * *"
|
|
pihole:
|
|
# If enabled you need to map '/etc/pihole/pihole-FTL.db' with additional storage
|
|
pihole_active: false
|
|
# If enabled you need to map '/etc/pihole/dhcp.leases' with additional storage
|
|
dhcp_active: false
|
|
|
|
env:
|
|
HOST_USER_ID: "{{ .Values.podSecurityContext.runAsUser }}"
|
|
HOST_USER_GID: "{{ .Values.podSecurityContext.fsGroup }}"
|
|
PORT: "{{ .Values.service.main.ports.main.port }}"
|
|
|
|
service:
|
|
main:
|
|
ports:
|
|
main:
|
|
protocol: HTTP
|
|
port: 10600
|
|
|
|
persistence:
|
|
config:
|
|
enabled: true
|
|
mountPath: /home/pi/pialert/config
|
|
db:
|
|
enabled: true
|
|
mountPath: /home/pi/pialert/db
|
|
pialert-config:
|
|
enabled: true
|
|
noMount: true
|
|
type: secret
|
|
objectName: '{{ template "tc.common.names.fullname" . }}-secret'
|
|
|
|
initContainers:
|
|
init:
|
|
image: "{{ .Values.image.repository }}:{{ .Values.image.tag }}"
|
|
volumeMounts:
|
|
- name: db
|
|
mountPath: /home/pi/pialert/db
|
|
- name: config
|
|
mountPath: /home/pi/pialert/config
|
|
- name: pialert-config
|
|
mountPath: /tc-pialert.conf
|
|
subPath: pialert.conf
|
|
command: ["/bin/sh", "-c"]
|
|
args:
|
|
- |
|
|
dark_file="/home/pi/pialert/db/setting_darkmode"
|
|
temp_config_file="/tc-pialert.conf"
|
|
config_file="/home/pi/pialert/config/pialert.conf"
|
|
echo "Copying config file into it's directory.."
|
|
cp -f "$temp_config_file" "$config_file" && echo "Copied config file successfully!" || echo "Failed to copy config file..."
|
|
{{- if .Values.pialert.general.dark_mode }}
|
|
echo "Enabling dark mode file..."
|
|
touch "$dark_file" && echo "Created dark mode file!" || echo "Failed to create dark mode file..."
|
|
{{- else }}
|
|
if [ -f "$dark_file" ]; then
|
|
rm -f $dark_file && echo "Dark mode file removed!" || echo "Failed to remove dark mode file..."
|
|
else
|
|
echo "Dark mode file does not exist, no action is needed."
|
|
fi
|
|
{{- end }}
|
|
|
|
portal:
|
|
enabled: true
|