fix(incubator): small fixes (#2282)

* fix(doplarr): fix secrets

* fix(browserless): don't set default token

* fix(kimai): use fpm, supported image

* no secrets here

* 0:33

* different path

* localhost

* try other probe

* nomessage

* test

* test

* test

* test

* test

* test

* tetst

* fsgrp

* 33:0:33

* 0:0:33

* 33:33

* 0:33:33

* ls

* rootalltheway

* 33:33:33

* 33:33:0

* 33:0:0

* 0:33:0

* wth

* 82:82

* 0:82

* 0:0:82

* spaces

* 82:82:0

* 0:82:0

* 82:0:0

* 0:82:82

* 82:0:82

* 82:82:82

* 0:82:0

* pers 0:0:892

* try other nginx?

* again

* apache

* portsd

* update probe

* update tag
This commit is contained in:
Stavros Kois 2022-03-26 01:15:42 +02:00 committed by GitHub
parent e50b0d75b0
commit 7c0f901a9c
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
8 changed files with 83 additions and 16 deletions

View File

@ -20,7 +20,7 @@ name: browserless-chrome
sources:
- https://docs.browserless.io/docs/docker.html
- https://hub.docker.com/r/browserless/chrome/
version: 0.0.4
version: 0.0.5
annotations:
truecharts.org/catagories: |
- productivity

View File

@ -105,7 +105,7 @@ questions:
description: "You can optionally apply a TOKEN param that will restrict calls without a token query-string parameter"
schema:
type: string
default: "admin"
default: ""
private: true
- variable: env
group: "Container Configuration"

View File

@ -17,7 +17,7 @@ maintainers:
name: doplarr
sources:
- https://github.com/kiranshila/Doplarr
version: 0.0.3
version: 0.0.4
annotations:
truecharts.org/catagories: |
- media

View File

@ -9,10 +9,10 @@ secret:
SONARR__API: ""
RADARR__API: ""
DISCORD__ROLE_ID: ""
DISCORD__TOKEN: ""
env:
OVERSEERR__URL: ""
DISCORD__TOKEN: ""
DISCORD__MAX_RESULTS: 25
DISCORD__REQUESTED_MSG_STYLE: ":plain"
SONARR__URL: ""

View File

@ -106,7 +106,7 @@ questions:
description: "Comma separated list of trusted hosts."
schema:
type: string
default: "172.16.0.0/12"
default: "localhost"
# Include{containerConfig}
@ -304,7 +304,7 @@ questions:
label: "runAsNonRoot"
schema:
type: boolean
default: false
default: true
# Include{securityContextAdvanced}
- variable: podSecurityContext
@ -319,13 +319,13 @@ questions:
description: "The UserID of the user running the application"
schema:
type: int
default: 0
default: 33
- variable: runAsGroup
label: "runAsGroup"
description: The groupID this App of the user running the application"
schema:
type: int
default: 0
default: 33
- variable: fsGroup
label: "fsGroup"
description: "The group that should own ALL storage."

View File

@ -1 +1,18 @@
{{ include "common.all" . }}
{{- include "common.setup" . }}
{{/* Append the hardcoded settings */}}
{{- define "kimai.harcodedValues" -}}
persistence:
kimai-config:
enabled: "true"
mountPath: "/etc/nginx/conf.d/default.conf"
subPath: "nginx-config"
type: "custom"
volumeSpec:
configMap:
name: {{ printf "%v-config" (include "common.names.fullname" .) }}
{{- end -}}
{{- $_ := mergeOverwrite .Values (include "kimai.harcodedValues" . | fromYaml) -}}
{{/* Render the templates */}}
{{ include "common.postSetup" . }}

View File

@ -0,0 +1,42 @@
---
apiVersion: v1
kind: ConfigMap
metadata:
name: {{ include "common.names.fullname" . }}-config
labels:
{{- include "common.labels" . | nindent 4 }}
data:
nginx-config: |-
server {
listen 80;
index index.php;
server_name nginx;
server_tokens off;
root /opt/kimai/public;
# cache static asset files
location ~* \.(ico|css|js|gif|jpe?g|png)(\?[0-9]+)?$ {
expires max;
log_not_found off;
}
# for health checks
location /health {
return 200 'alive';
add_header Content-Type text/plain;
}
location / {
try_files $uri $uri/ /index.php$is_args$args;
}
location ~ ^/index\.php(/|$) {
fastcgi_hide_header X-Powered-By;
fastcgi_pass localhost:9000;
fastcgi_split_path_info ^(.+\.php)(/.*)$;
include fastcgi_params;
fastcgi_param SCRIPT_FILENAME $realpath_root$fastcgi_script_name;
fastcgi_param DOCUMENT_ROOT $realpath_root;
internal;
}
}

View File

@ -1,15 +1,15 @@
image:
repository: kimai/kimai2
tag: apache-1.19-prod@sha256:e4a92b3a87c782a8ad75fcb8468c654232ea8043efe5409877e1b06c7562f95b
repository: tccr.io/truecharts/kimai
tag: v1.19@sha256:c397c8f343f90c7997cf524d9b05636571c017db8d9e6db3c6328abfe3cd3b81
pullPolicy: IfNotPresent
securityContext:
readOnlyRootFilesystem: false
runAsNonRoot: false
readOnlyRootFilesystem: false
podSecurityContext:
runAsUser: 0
runAsGroup: 0
runAsUser: 33
runAsGroup: 33
secret:
ADMINMAIL: "admin@mysecretdomain.com"
@ -21,7 +21,7 @@ env:
DB_USER: "{{ .Values.mariadb.mariadbDatabase }}"
DB_BASE: "{{ .Values.mariadb.mariadbUsername }}"
# User Defined
TRUSTED_HOSTS: "172.16.0.0/12"
TRUSTED_HOSTS: "localhost"
envValueFrom:
DB_PASS:
@ -40,10 +40,18 @@ service:
port: 10198
targetPort: 8001
probes:
liveness:
path: "/en/login"
readiness:
path: "/en/login"
startup:
path: "/en/login"
persistence:
data:
enabled: true
mountPath: "/opt/kimai/public"
mountPath: "/opt/kimai/var"
mariadb:
enabled: true