fix(incubator): small fixes (#2282)
* fix(doplarr): fix secrets * fix(browserless): don't set default token * fix(kimai): use fpm, supported image * no secrets here * 0:33 * different path * localhost * try other probe * nomessage * test * test * test * test * test * test * tetst * fsgrp * 33:0:33 * 0:0:33 * 33:33 * 0:33:33 * ls * rootalltheway * 33:33:33 * 33:33:0 * 33:0:0 * 0:33:0 * wth * 82:82 * 0:82 * 0:0:82 * spaces * 82:82:0 * 0:82:0 * 82:0:0 * 0:82:82 * 82:0:82 * 82:82:82 * 0:82:0 * pers 0:0:892 * try other nginx? * again * apache * portsd * update probe * update tag
This commit is contained in:
parent
e50b0d75b0
commit
7c0f901a9c
|
@ -20,7 +20,7 @@ name: browserless-chrome
|
|||
sources:
|
||||
- https://docs.browserless.io/docs/docker.html
|
||||
- https://hub.docker.com/r/browserless/chrome/
|
||||
version: 0.0.4
|
||||
version: 0.0.5
|
||||
annotations:
|
||||
truecharts.org/catagories: |
|
||||
- productivity
|
||||
|
|
|
@ -105,7 +105,7 @@ questions:
|
|||
description: "You can optionally apply a TOKEN param that will restrict calls without a token query-string parameter"
|
||||
schema:
|
||||
type: string
|
||||
default: "admin"
|
||||
default: ""
|
||||
private: true
|
||||
- variable: env
|
||||
group: "Container Configuration"
|
||||
|
|
|
@ -17,7 +17,7 @@ maintainers:
|
|||
name: doplarr
|
||||
sources:
|
||||
- https://github.com/kiranshila/Doplarr
|
||||
version: 0.0.3
|
||||
version: 0.0.4
|
||||
annotations:
|
||||
truecharts.org/catagories: |
|
||||
- media
|
||||
|
|
|
@ -9,10 +9,10 @@ secret:
|
|||
SONARR__API: ""
|
||||
RADARR__API: ""
|
||||
DISCORD__ROLE_ID: ""
|
||||
DISCORD__TOKEN: ""
|
||||
|
||||
env:
|
||||
OVERSEERR__URL: ""
|
||||
DISCORD__TOKEN: ""
|
||||
DISCORD__MAX_RESULTS: 25
|
||||
DISCORD__REQUESTED_MSG_STYLE: ":plain"
|
||||
SONARR__URL: ""
|
||||
|
|
|
@ -106,7 +106,7 @@ questions:
|
|||
description: "Comma separated list of trusted hosts."
|
||||
schema:
|
||||
type: string
|
||||
default: "172.16.0.0/12"
|
||||
default: "localhost"
|
||||
|
||||
# Include{containerConfig}
|
||||
|
||||
|
@ -304,7 +304,7 @@ questions:
|
|||
label: "runAsNonRoot"
|
||||
schema:
|
||||
type: boolean
|
||||
default: false
|
||||
default: true
|
||||
# Include{securityContextAdvanced}
|
||||
|
||||
- variable: podSecurityContext
|
||||
|
@ -319,13 +319,13 @@ questions:
|
|||
description: "The UserID of the user running the application"
|
||||
schema:
|
||||
type: int
|
||||
default: 0
|
||||
default: 33
|
||||
- variable: runAsGroup
|
||||
label: "runAsGroup"
|
||||
description: The groupID this App of the user running the application"
|
||||
schema:
|
||||
type: int
|
||||
default: 0
|
||||
default: 33
|
||||
- variable: fsGroup
|
||||
label: "fsGroup"
|
||||
description: "The group that should own ALL storage."
|
||||
|
|
|
@ -1 +1,18 @@
|
|||
{{ include "common.all" . }}
|
||||
{{- include "common.setup" . }}
|
||||
|
||||
{{/* Append the hardcoded settings */}}
|
||||
{{- define "kimai.harcodedValues" -}}
|
||||
persistence:
|
||||
kimai-config:
|
||||
enabled: "true"
|
||||
mountPath: "/etc/nginx/conf.d/default.conf"
|
||||
subPath: "nginx-config"
|
||||
type: "custom"
|
||||
volumeSpec:
|
||||
configMap:
|
||||
name: {{ printf "%v-config" (include "common.names.fullname" .) }}
|
||||
{{- end -}}
|
||||
{{- $_ := mergeOverwrite .Values (include "kimai.harcodedValues" . | fromYaml) -}}
|
||||
|
||||
{{/* Render the templates */}}
|
||||
{{ include "common.postSetup" . }}
|
||||
|
|
|
@ -0,0 +1,42 @@
|
|||
---
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: {{ include "common.names.fullname" . }}-config
|
||||
labels:
|
||||
{{- include "common.labels" . | nindent 4 }}
|
||||
data:
|
||||
nginx-config: |-
|
||||
server {
|
||||
listen 80;
|
||||
index index.php;
|
||||
server_name nginx;
|
||||
server_tokens off;
|
||||
root /opt/kimai/public;
|
||||
|
||||
# cache static asset files
|
||||
location ~* \.(ico|css|js|gif|jpe?g|png)(\?[0-9]+)?$ {
|
||||
expires max;
|
||||
log_not_found off;
|
||||
}
|
||||
|
||||
# for health checks
|
||||
location /health {
|
||||
return 200 'alive';
|
||||
add_header Content-Type text/plain;
|
||||
}
|
||||
|
||||
location / {
|
||||
try_files $uri $uri/ /index.php$is_args$args;
|
||||
}
|
||||
|
||||
location ~ ^/index\.php(/|$) {
|
||||
fastcgi_hide_header X-Powered-By;
|
||||
fastcgi_pass localhost:9000;
|
||||
fastcgi_split_path_info ^(.+\.php)(/.*)$;
|
||||
include fastcgi_params;
|
||||
fastcgi_param SCRIPT_FILENAME $realpath_root$fastcgi_script_name;
|
||||
fastcgi_param DOCUMENT_ROOT $realpath_root;
|
||||
internal;
|
||||
}
|
||||
}
|
|
@ -1,15 +1,15 @@
|
|||
image:
|
||||
repository: kimai/kimai2
|
||||
tag: apache-1.19-prod@sha256:e4a92b3a87c782a8ad75fcb8468c654232ea8043efe5409877e1b06c7562f95b
|
||||
repository: tccr.io/truecharts/kimai
|
||||
tag: v1.19@sha256:c397c8f343f90c7997cf524d9b05636571c017db8d9e6db3c6328abfe3cd3b81
|
||||
pullPolicy: IfNotPresent
|
||||
|
||||
securityContext:
|
||||
readOnlyRootFilesystem: false
|
||||
runAsNonRoot: false
|
||||
readOnlyRootFilesystem: false
|
||||
|
||||
podSecurityContext:
|
||||
runAsUser: 0
|
||||
runAsGroup: 0
|
||||
runAsUser: 33
|
||||
runAsGroup: 33
|
||||
|
||||
secret:
|
||||
ADMINMAIL: "admin@mysecretdomain.com"
|
||||
|
@ -21,7 +21,7 @@ env:
|
|||
DB_USER: "{{ .Values.mariadb.mariadbDatabase }}"
|
||||
DB_BASE: "{{ .Values.mariadb.mariadbUsername }}"
|
||||
# User Defined
|
||||
TRUSTED_HOSTS: "172.16.0.0/12"
|
||||
TRUSTED_HOSTS: "localhost"
|
||||
|
||||
envValueFrom:
|
||||
DB_PASS:
|
||||
|
@ -40,10 +40,18 @@ service:
|
|||
port: 10198
|
||||
targetPort: 8001
|
||||
|
||||
probes:
|
||||
liveness:
|
||||
path: "/en/login"
|
||||
readiness:
|
||||
path: "/en/login"
|
||||
startup:
|
||||
path: "/en/login"
|
||||
|
||||
persistence:
|
||||
data:
|
||||
enabled: true
|
||||
mountPath: "/opt/kimai/public"
|
||||
mountPath: "/opt/kimai/var"
|
||||
|
||||
mariadb:
|
||||
enabled: true
|
||||
|
|
Loading…
Reference in New Issue