From 180f243e6b1e4510af1c28b4e773be5e6f14a455 Mon Sep 17 00:00:00 2001 From: TrueCharts-Bot Date: Sun, 29 May 2022 15:28:58 +0000 Subject: [PATCH] Commit new App releases for TrueCharts Signed-off-by: TrueCharts-Bot --- incubator/jellyseerr/0.0.1/CHANGELOG.md | 10 + incubator/jellyseerr/0.0.1/Chart.lock | 6 + incubator/jellyseerr/0.0.1/Chart.yaml | 26 + incubator/jellyseerr/0.0.1/README.md | 38 + incubator/jellyseerr/0.0.1/app-readme.md | 3 + .../jellyseerr/0.0.1/charts/common-9.3.19.tgz | Bin 0 -> 44150 bytes incubator/jellyseerr/0.0.1/ix_values.yaml | 21 + incubator/jellyseerr/0.0.1/questions.yaml | 2433 +++++++++++++++++ incubator/jellyseerr/0.0.1/security.md | 116 + .../jellyseerr/0.0.1/templates/common.yaml | 1 + incubator/jellyseerr/0.0.1/values.yaml | 0 incubator/jellyseerr/item.yaml | 4 + 12 files changed, 2658 insertions(+) create mode 100644 incubator/jellyseerr/0.0.1/CHANGELOG.md create mode 100644 incubator/jellyseerr/0.0.1/Chart.lock create mode 100644 incubator/jellyseerr/0.0.1/Chart.yaml create mode 100644 incubator/jellyseerr/0.0.1/README.md create mode 100644 incubator/jellyseerr/0.0.1/app-readme.md create mode 100644 incubator/jellyseerr/0.0.1/charts/common-9.3.19.tgz create mode 100644 incubator/jellyseerr/0.0.1/ix_values.yaml create mode 100644 incubator/jellyseerr/0.0.1/questions.yaml create mode 100644 incubator/jellyseerr/0.0.1/security.md create mode 100644 incubator/jellyseerr/0.0.1/templates/common.yaml create mode 100644 incubator/jellyseerr/0.0.1/values.yaml create mode 100644 incubator/jellyseerr/item.yaml diff --git a/incubator/jellyseerr/0.0.1/CHANGELOG.md b/incubator/jellyseerr/0.0.1/CHANGELOG.md new file mode 100644 index 00000000000..c060968bb1a --- /dev/null +++ b/incubator/jellyseerr/0.0.1/CHANGELOG.md @@ -0,0 +1,10 @@ +# Changelog
+ + + +### jellyseerr-0.0.1 (2022-05-29) + +#### Feat + +* add jellyseerr ([#2781](https://github.com/truecharts/apps/issues/2781)) + diff --git a/incubator/jellyseerr/0.0.1/Chart.lock b/incubator/jellyseerr/0.0.1/Chart.lock new file mode 100644 index 00000000000..ebfe2ca6c38 --- /dev/null +++ b/incubator/jellyseerr/0.0.1/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.3.19 +digest: sha256:e46103d57a30e2ea0a853b41314e8ba213e9ee88882734c471030c16702946d3 +generated: "2022-05-29T15:18:41.599618833Z" diff --git a/incubator/jellyseerr/0.0.1/Chart.yaml b/incubator/jellyseerr/0.0.1/Chart.yaml new file mode 100644 index 00000000000..74f801c25cf --- /dev/null +++ b/incubator/jellyseerr/0.0.1/Chart.yaml @@ -0,0 +1,26 @@ +apiVersion: v2 +appVersion: "1.1.0" +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.3.19 +description: TEMPLATEREPLACEME +home: https://github.com/truecharts/apps/tree/master/charts/stable/jellyseerr +icon: https://truecharts.org/_static/img/appicons/jellyseerr.png +keywords: +- jellyseerr +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: jellyseerr +sources: +- https://github.com/Fallenbagel/jellyseerr +- https://hub.docker.com/r/fallenbagel/jellyseerr +version: 0.0.1 +annotations: + truecharts.org/catagories: | + - media + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/incubator/jellyseerr/0.0.1/README.md b/incubator/jellyseerr/0.0.1/README.md new file mode 100644 index 00000000000..609b36c03c6 --- /dev/null +++ b/incubator/jellyseerr/0.0.1/README.md @@ -0,0 +1,38 @@ +# Introduction + +TEMPLATEREPLACEME + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://library-charts.truecharts.org | common | 9.3.19 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/02-Installing-an-App/). + +## Upgrading, Rolling Back and Uninstalling the Chart + +To upgrade, rollback or delete this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/04-Upgrade-rollback-delete-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Adding-TrueCharts/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/incubator/jellyseerr/0.0.1/app-readme.md b/incubator/jellyseerr/0.0.1/app-readme.md new file mode 100644 index 00000000000..19b9fd7cc6a --- /dev/null +++ b/incubator/jellyseerr/0.0.1/app-readme.md @@ -0,0 +1,3 @@ +TEMPLATEREPLACEME + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/incubator/jellyseerr/0.0.1/charts/common-9.3.19.tgz b/incubator/jellyseerr/0.0.1/charts/common-9.3.19.tgz new file mode 100644 index 0000000000000000000000000000000000000000..3f20020f4d5d572f5205e6145ddda3826601ea15 GIT binary patch literal 44150 zcmV)vK$X8AiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYcciT9UC_aDdQ{XC@+jd{;X<4?loBgfZNq75n9zL;?-rdEF4n zV(0!K4@~e!lu}IM30MtVFiFhM2r@)jD?~I%al*vA@3T1Ie}M>3Q<$#7jHKW)&5&Rq z+FFn$nt%mk37zzMbIcamv>T9RkEIz3M428;653-aLcJxV45dBwUb12f2fQH-07p)FZ&0J?wWV-sz zf4mrU2jgzP)BmQmgg9mp$0!xR&=TTk0&qMd|Cs~sl62kzAcnlZ76Aar(kMs2P(c<~ z7_fDMCK|ogO5<|e-R};LTaPsUYW}Zalp*>+0-$#O4+ewre!n>X5BHzu|D!z5K&J!V zB`E%Q{ua;#1$c%75RiC==UEE*TyH%C{~4kg%p%4MUmyggC?Yp4lAw5%#Ai!5N0Sx+ z0@j6qu?B2`fGPlj2&0$*%nP;vNKry4W+Yutz1cQ`Jq|`k)BS#943aF0KtduMtXn|*Iu}1C;B5Amu=5mA-l3L&_A^e=4;f6uZK-~P zQ#9ultLdJ@Zb)(ivjH@l(5peW-yQacgZ}YgWaxbe(P(zm9~|u;9UP%>ynlE+9nX$t zhvV51nvG_I>F97Y9S(=nqyE7m>K_lLusOtcsxAVKkSEt{@}2W_Jcu)X0zE8 z9S-0y91Q|^JUl!I&~SL%A0B&$xX|`i)Qu6N3qsho)YbK>scRrNq^>T%8CJEh7!Ibh z;ryi3;S|mKaL^yXY5!n0=@6i z!{hzwY;-U@JPOhA5elY9`)GR5pY4Z7d?KMXB(Q|G364Y7{qEqPJ2cFDjKclVQ6KgZ8tu;x;cR>~n4$0> z9L<8^;NV~|hSS*~7!42%(fD}(XgVB+N5OG03=R*D_BS@Yo!BLm%~M2w*Rkdm&Yq$+5tcq`h3v%zQ_?C&3pj}Quu2mRsr zcs3YqZhJezl6X#TL0DO>hOi25Q^LyP8zDJ_J?QqkN1Cojqr>sxXfTHG_z)gVkA`Uf zc+A;zczAdi_V;Il;IMxH_uESVg!{P7{_Py(x+jLX9&Lc8~QBD=a z0E_`yp)|!I5(WjSlAsy>49HCUnq^VMH_vLz{Z5s3pzv}iW;jKn3<%K-$5@OLFaYeD zm|mQoynZzSGZ<0SY6T=_DTyMK8n`Hi(+H^rMt|+Lfcg+lgsq{7MP3x}O@3E={|F-- z0wN446u^`tm_%f~L^0a~Aw)|OQ^WvC0cDV(Sr$>mbs1?V$O}7^3q#RE7y%f^gh2_N z!~&1JPR|0_Gi|kiUF$WbYy$rFcL`saHYiylMfhg`0AVMPZ^fTBE_cUZ0=|5$=v@S- zDB1?BtZ>&p-LhG`BX6_i6s4SzLqu_kLXeP<$~hn50MZE<)G$z%%u^U5Kv@bIny*FC z?@0M?s1pLtsY#B!o=yC5LsPdUJuiz~03# zQG^&OgUG>4U@rwJI2eHEF-iHB6Ou9*Gb6KwI0Zj^IFp^xkSCxmez#kyVJ(CeuP>J{4tMCT zfuq+{J`IE+wxtS*sqBFP(>blF%|BaJPr^{vz_AfAfDsKT6LSji;h(NGv~KGeI8QNG zC8D*b!{{?h;fdQ0=Yvy?1h~XY^iL9_*5&_9z=z9ItB_ppIPf(PG>wd1{q4zxY^5bX z6j!D>ijh=C^irt+NJV7{6MM0e3!Q>sD0mLp0%Vkr^#Vmpu;TjCG(uFAOdwlKz&E{b zO7(ba3qskR5;7dX zC|ZL#WDCTlCXTs&Ohx}hJ@w+8q-+Al#btVs)E zMeri%E-|X+Yj^c(j+TGna-dqMyhIG8OB^E#ZWf3WI-fOidhn_s&0-2}Fk67j%m3Eg z)NL`gHoDX8z)=?BI0q_iqT>^HDA7*In53M8Nll0_ky zA|Ta;um#j#W*8JSirRvn7(GeLe|CsY2(sleq5&8GiA0i&9c%Q$q^LK8$;sD=|x$;!-@;tT}_rX^%g zmB~ODf^SHAEwwPCM2I~;;EPxl3Mvf{#|))27>E%( zj}WAM-~haVDVl&w4r97bAfm#b!hH|wLr7?`oGyrPtR=K`pK1@Ix#dN=|Hmx{; z%Zd71SqR$UB1qa5b*E{+t}5U2;6RrE^5@z4scr3|rV;=h(AIifzdIQAd&5zo@_Ujo zn0WjKb?lce46ivQ~wyu>qy4Bf!>#DQ-%4rW9c0SQU6NQ!XEH@i%#6r5kx)^$xX zWw=}OarsUS2w)2+bZ(05O)g(;P#mP|giq{T^WT%}k60&#DmvraTE2;YJlH9~MFb%=U`5CXw#j|$wxz462jS)k%i%Bme0qrqJ zuW1j*d_Cxdkiia2gaXM&r)LdoM-OWUeNG5PorHuP9M4F)lx2A@KXTN>Na()4efRR! z)!UOduk<9FVHAb$(JY^I;?23(!10ODjY)_&6)Vl>~!cddm*@GIW0@s%LX~4ppYd*N05XN(ql8kn8M5>^p z&wM~J6XI6zFhz`UXr(0unA$eC2W_=2kjKV)>7@v!!2;QufK;@4O34yvyM`C9kQR)tmwGOr z|Ms^O&Hn!Pof@GLkT^gIqdi@(qm(%u&-urg3lmF@(2gqDdnOki9M3y!f%NO$mRuh$ zbQzNRk2Xam%FO2oqTfua;DF5;OFfbpx2dDULAX`&5!KibJzK{NckH zA9U9YCa3eMRgI$&rX*3r2SeLTm@D7HUZ+|Is(GV>pGyPDg^QiARcG-DkhK1uNk zM`&(aK2ik3cX71l?S79VB;~0&$r5JZb6xKh4Pc~HHUofD;4Kk|n`%K}M4U0HAC(Bt zP_PanRMjz4z}i(^3jNJ8FDdPSW48w&1uzCU#>|x1+ZTg5q?sx9YakS&tV3eeeq7wP-0XB({zmhY$0{8se zIlz<~v`_rgC$2wm-R1_77bqZcNGD*>S6>s9VzI~;-g5~_GG;y; zsP{97qbx<2ixg3gF#nRDwT2Miir39F^E12o{2<(Jpg*zuHtg<_?VkDF5B&GW@E3AT z*qYtdTHzzi(7o(z`o zGhSv(j@7}p`~4S#gFfFC^16bJIF=wwz*HJqF%z?b`e#)2#2NQnEvd0W$4AHAdWf-w z4BRYmAZ^Dp%%=vi-ng5QZz!<9f+eC9&W&vn+@zQ>6nAxVQctW?6H_D%VF9u}c3^^g zeAgcl7;>+k)$`JNQQR+Edmk;PwmL|p+76^VOMLtB4S-KPD5yOZ3`2Q# z!qHT&V`dA-w~`buaRgI+I`R!?$!|26jaW~F9|n#~YgzdSRMqe-X?fi@@LC@ySq@m* zDPc#f5jd8M2HoS!kvPO)LATr8wS==c72+$zQaU`s7z{L+JK7EG^E z$oIPn1qoXHC}HjRN=ch@Hk;wk61-m9C0e&~JFf1M0#(zS$nno8 zEt3{3WkeP(c)&WKQlep#O2Mn;1hRT;-6_C{I`Z$@TolhEbirV7y$8;PsC}8iNWFM3 zJ7eAmxH$P9E^)NhR#po{%hk_t0%p7@7J>uXE>Xfll%sKWz8dZE|Bme@usA3HfA`W( zT5lT=&625tO1BoMe2uaMYNH|1YF;i{H;UIp&(aF{xMW{k>(iTB)q6GEKDAyy)H3RRyP7UDd8+&DB*+0!N%0Z@pSss{P{csIMAV zJijc}tvtBCYKU8>u%2X$L^!^-X(#>hY@x`Rdk;(rTjZ``lp`RpfDYxAVwW-U8pqdV z+MA<)qAxbV*tm#+B@V;r2Byd!!SC^B6u#kKkoZ)hjF?SiCTq(wTB@-Wq8Yxnzg!8y~z0BIL&j#acETfU0^&K2KUWlG5$(W0IPdcb)c%8Sx9)kPrnljW zpu$zIiD-SMH%`=cs1k9|j^+Nw0%)A%+G3#85IlQUSc?~gvV0x3*EI1ZpQIA?9|;vV zp#)OyDZO5yh0nC5amg!WVukN0-^^}A0vP35QW2>HvPF&*2axN({8PT;$uT>JY|#bH zPy)vG-*etc8?0C>Lar}!mC_122ma#)7<31tPQL_6db^*C3-HcI%M4a(NiUO*`Ae>J z#yFX?0&k`OMS3eXhAdR_W{|B7Q$c~de0@=5moE5@FWAzRRCw%i@hCZqk3gc_)Sx>$ zay(c>EoopJRVDj6T+?9@wJ_3`fs`k?*tbC8fM!lz+%+vgDZ?{iUpGPqh&ySgC}qy+ znalph8{WsnMFltEyh0hLaEmUVgALZvF-tfvo!T%mO@hQ>p>!A`>}d)uvs1n~_Z;yzLJUc=n;$6;#An_GqJer{DK-T~NjRnV>L(-Z^%Qw)TVL7*dk7UZ$H_`vJ&f{wZ| zBV+=mFs8d&Es$;#eV%}5%UC=Q7T5yJaok^W~KMMCuv z`=)qp;`*e@3?R329L`&FLD#_lSy(CL)Jv%%)a z45B&;g&R^wx+3$s+D*G8mA5pg$oA^(DHn{SaE`#Kxu26uYX^X^A5kQ(YJci{+5_P_ zhD#i9wM@n};lvbICaEQzooYe_>HN?47oYYV*B1iQ@;apVMq1ZsSB0Nsx2A zLNTDSSF%&(`dKV2#wY|k78<*IASO;#p@a%I9&wz?C(D8u`-BgD*@z88Zk{?eZ!52! z8z?WnrzjIwaRB;^sbI+~`npbsV?m_}9-6LAzjEGln9WJ6ieUWn7(dcR1HLO5}C z9J6hctDVNYDCT>zvd0XwL?OZlevJit7nV? zYP|O35Np7EqcD*y(Mp~VA|u=pSa_Z zxkCy)v`mOdO`&L0JJP)LEr*#cli%S0tI_@Q4esMj{WOawRXg7XQ$Nk(C%$OT7cJ{B zKq!@hC<(z*Ef%*?b6X|HxtGzjH^niSktjr|^gofOvmpttQQF~~QKACf-GyZq3a5IO zc?K@uy?h5$h)l8PBEo|5U&7;k8WBN=5^fxNC!=X+ii-?qWKc}RKC>j1^d8;bD&t@w z{n?crgO@39GrQ(IM)9noX6>e1Y5NVg+~#@%XVy=;sZYh(((dt3y8ZTTIN{I21-~r^ z{FbBdjQlGV@`cO*%*{|s6UpElPLud1Pc^g>#II2 zT`Nt?_2$SI4l24VVjnA zcsUXu703hy!qR&Od!&{v((WjK@eVjAsOCs$VqO7l?UqK$(XelQl1FdLbw|f~s^BYq zVBLhZbXoThvzou0^X0N9wq-`o(U2!^oI~aFmNspGLS!K!v%0GH%d#uov?a=59H4GXQdk_I>0q5y#ak5KDk5~EZ9U>|#Y_7jsO_8twZ(UNdLzsy&z^yI zDG*18Ai|Vcq2i}7xXzMNE7ogs6vr0mLjJu)`@pu>pZLBxWN zz@ft>p7^r^CFZ@|memh4t~jxxF%PLi27X2$qnSt*lA?etmnaT}!;uw|CXXVdYRW4Y1Vjj~ zl(A04CgCg}V3JV|Iam;E`3Ukgq$?wuz=#rnW4;!M+hhwa@Tv47q#(^=zJ<0zf~x4k z5oRnx9JE1X56~=F@W$WZ81v!nYR8a}7~c@x535=h%f3n~&PWuI8xb`B8Hl*J*aI;9 zM@E^vLIWv?5tr#OUCVgZDh#^ZUZl|)OjB{`1kM;r!8bXLzv+tbaC}7Mx*H_f1dRIq z{!$$Jm|l{c~nJ}3|)C(DlZHQC|aQuMto{?_$F8fV3h7I zCU#yZoOqO@Q>~XJ3_}yaytZZI+xhYQt!lmt&RBz{fl8(&Zq?y{n#yi#bbzF>uprj)2iWS;YQ?L-=wStE3z=L9~qCZs>SrLoP z#cLUZQ%5zDp3mBTmc)SK5Czam?_*iD#E!r*XQ`bS@0Cm-Hk0YbjEAAXSZ()KjuFBn z%laK7>^LC<@XYo?M)4{)k(Bc_fs!k6o|q#Ph?iZy)wW1*_|(i{xm%N^zsHfe%2Pg3 z@*ZN`$_nfpWUP{y|F6qYP+!YuR}WxH-QJj5GN*ESwOgLGLCIau>R_jvmQq>hebTc~ zI_CfWRt*d3CTm8XN4y+7FwNq)Oo?1(;XLt}$BN@hJQ%NQ0;t>YjoI@d#Dtx2{Wj9V zs{f!u!=atksLGKj^uIihp|(iz9UJDXr|nH0VHJ^yDMFme>+_boXhc-J4n{zd%0`^Q z(0~FF&s=s)WLh-lnNA00M!s}FOkzt46cMn#w3QEiue+kW#dbxoAhpc_0{sPKW?Z@Q zz}No;id~c$pC1aC$}lE;#ig4yOcEXJT22dn1zR{Gz=g?1j8iTY4NqD2I00MX^%AEt zAf&An$$KKvTKO|5i2=b6m{}P_R>_wYv4 z)o?Tnpsu@!-MLYCM3wI#MdMKi#hij+v36Icv=Gr1@_ELUM&Tka_I9exYs7cy*NAdH z3b+cVLlar8%hrlGywc9@$}XrTB!A=Yjf`S0b$awU5$V0KHv1+r2epyG2zxx-t@IVH-`e6Z4?K}yo+vI5-Hj`<8|+L79E;n{MT0^hDXpa1p`6OXJ1;Z= zgW>*gV7>KW1f2LlI-aV+HjjH_wPO`{_Uu6-;0VAenoa7`?%W~*j?;ksBaes!_Q!+% zq2vQAyi17>ViS&J3r5H->s8?sz%~IC3U@LKx9@?<4km}LTX&blj_T6?D0(INV z?v>Zw^*!$Gbh0ERO9pXdDP*}$7LmC$`_KhWfDSAYk!!q#qE@dj>GtciC4*yARS7iL zlniXInsiI8$N;^SPGo97od+JPE-& zb8}}@Y5=O13tROfBKk_82^XQ19A2UKZI>7D?$=evtwc2a?dC;{7+nx~2UE|Blw_O* z#Ov6kb`p7(ZZKO2o#UK@_ck{)4s~WnQW3{FcT)+nCWm%AxcopRW^($2c`0&5X$)a^GlQ$SeNpoR9tvBb-jt1 z_02=0eTCB?MImi#o)6rtQX*a%jAhPxDeMJb#e^Ys5BtOW*B2_eu(cxaA$a*6XWlH0 ztOK|AD8zL8Zl%0hvmS|}kK3sw=j(8~eYaG_W*t+7AGvEJo|9X3O;&8!HCgzvy7rex zdgS8KGue@PS9z}Wa}ws6*1If;ZrMh^-|vq{Bk^y)-!J|<+#etOWiT3!_Q!+Kc(nhQ z{;)qBjsF7r_uNAkQLC z!=Dft22V1Fa-vd!$6%VLlh1RqyJ||e^=P6+hWR?Z+=#7utY82t)j%%vX#BVJXf z?+{I0ir%TrumCt%CkgGX2I^3YWBcVxMgMc(D86G;Q~xfPDo3u@nb3nf**BF+V;3@PXk7|5L0k=O_)hVmC*c z935rNd9TjUwf?St=DTT?UpL9j8`;3g3Z-z4tVT9acN0duODGQQpS3-d7Xt6Ilgs@2 z;T`(f057Mj`bS4e8vXZgEp&fJPkH@^QFMp3-uG-+|N95SzPtVpMuYLw`u`}8SpQX? zd6ur_ZOhzr=~xzImQrx0&RJ37Az0k6fM=6f>vW{q4E9eg$?nKELzI* z-&~BiHz}}T{tt$O{lfe|*dGs`=Ko_nV*bAuGr15M(o6;&zD_%vsAR=e6WH)i)ijp5 z7OW7N&}ze(c`1zN2t4N%_Q3P}#?Iu0Q4;c(u5y!?E^QT*%5MrtNF1ouMCa?*mMPu) zRt6ih4&m%bYNhCw^8Se+P~M|`u!*Q{}@lL{f7%R*8(IAm4ZPo%$+)q)khs6ZDaN^Y}fW0SCpATnkWngeiKR~ z^UWP>E4qSkFSZsUeRE6&c6DSWBmWJTQ8g?h8}0M|3I)_E($)8PylB=TX@}gk@TkVq z!crTTQY0f@{)j0f=~_khv9|D5d%m&~u*okdkXS+%EM8kfQ#UwWUH7$Tti}?&=4%Ds zVi*8Q2~>d8cYNd2R7W=kjpvl5kfHgS?`QRTxkB8)?@6C(>= z4rI6Vg+vjK=O2<#ezu4Jrf|a;WXR5PxBAtA!3AFQ9y4%j1*e%f+ znEH}S<*Cb;FBV!2*fF&c2Su}lpaJ@&uBSUB1znn@a|F6s3|A0Ga2g>)0;hqAN2RbT zsJMSFo4@*O zS^PB|pS?fSL7d8#e5p1NRsiW3^OgD_?D9KBF{2SxS##Uq`R;C=_20#OqwT+QJLA6@ zKDWK5hX1@ea9dWx$;IgBJ@A}G)({j)$jTxf&p_AY*0VpVemO@dlNVqIXhrO=tIl6n zZO~?s>{N(81DDPv-r004<7>0jq-eDc;zo=LdQWKta~k@Xp$_xSM?ffLKZ>ZzZL1wG z*@}#SQr4AM^{lfWZ^L)0itjKu zVQwLwI@`&od}vBY$T{x1E$TU5n(+cyiYVU{OrDgKj@jzEZVuPcc;@ z;I++cv%FAUw$t)a83Luz&q2yD4(2y}yVpnJdhBZ87zXcP=-bYwsJE912`?;DLTzWQ zvK2(v?q=k$*X)g5=l_VvFSb<<{j#}yuB?ih`4>6? ze`~81p#68dyG#M4cs8Cu%AN!UCaNje1v^qp;^f&ab(Eyu zYF%sU3lLRBUVTnDLkMeOaXTmmzc?Z#IEIp%^!3Qtdkv2n)(E|NC?1J87+SE)q~C;| zO^6bX*2kuZ+VHl=_7<#TuO5w<#;Qk60oI~3<394Ll zggG>?V>}K$VkgHi4>@0p87Hz1xZW<}xk_S@y2d@c@uIg%;%0ai1M6);HeIzj(R7Vw zs1;+IZGoDu+8i}qV*_g6WjG4+8-Yuh)U$PdU9MZr#5vIXhIRcla3r>xKxVN{7#`OwHc2rG5|vGqZZ{LQ z?*Bi^Q@a0uo=1RJ2}eZ+yW2(s5UY^i88BG|8yx_($JqJDQ`^19gsBfuVKL%bD=%%< zsvYzT*fAFb1Ullo6pG@-u5#rQ)l}R+(dm*g$ZFT}A>_z)iq-%Du~feCZU1shMK>?$ zI<{%cyV={zYN_pMx2f-+q^u*(id*gC;qaF~l_&Kd^C`=JzT)5S0htt zPxAj!o~`0P!YH!VhmU!F(|f%LC{<36i;&>Vf@hHJ1th-1jEOLn;%1BG4J2KNRECB3 zBtpNVi-Q7j_sZaxJ6ss7YGLd9ekEyLhAEPd^3UQAeFRtSilhK?{rGOf_Z^Ny9M7Ld zal2+x5+M}`6ejqGlw?T_sff1o?rS zJQjVAA_OVwzSXZwsz()ZHLiIX4_$|qn#>>1bGW?z%boFkY5*J7|NcRLTwMPT`-e~K z|6@FA{YT)!lO|s+;?+yFwxW0zV&&Y*isdyg^e)?EPAnYo(Y|J3QgEDMl+ za%6L(Qs}P?@`ySi1wJ@5p|kven(Vyrs*9~w|5T|AJPo4+gwvKQC{7v z1N+5mOL3{W`KQmNsl%+Bn6mD+--Tw$O_%*@c(HidZv!)yF8diA9_X&0g?g#Ux~qP= zo_*D?K+@mts-Nk>(@nqIJeBJ|lpC%4Py;sU|A(dXpYdq)6#wf{9!vkX_t#tR16)^v zvhB_-(UlN4>>C^tfp`C)SLf2wS=vbKR$&s~J=coIm{4e>WV7+wdKv}Zy5|juXa47Y z3iq@J*f9S``@=y||34f*-T!@*=N9q*E);{@cLZR^K}HpMzA~!1np);dDvf+PXOm;} z^9dF=fS}ch-;oLVz9I~tpaB6(tUMp&g11{wU{X9n!AZ-Q;;#K3!SLr4GxSb)`0RpT!7mxH!+_>#+Z@m$ z5wMduUSP#Y3g|EyyVIH zXEDY9CQnKKm(KA$>#{`e%DVe-n;pR>{eL(p#D5$PhNGwZKacWA{a>s8jOeUxh08J| zZt1jddJ6Xdj#XG7lw0vD(!b5|3dNgqzm;yyc)WnB@8f7&U+-IRk|bOn$n8holRUA! zGU3B86eGJ?V8eZ^_rz*DV9j*8j1zev2PlCu+`Hta&6IQ z$0kwDP8);we{*q5@q%gtnuyx(suT*5)upacS(>3X zXfH_?vvbH6ZP4!U*CNwyJIE*_%Qk4QEZh_ZyLBWB%X2_m^DQ#f&aSFc4F7@JMmQA& zt3SMI7iEG6z-`Z~8lF~_Tg_r`yW5S14oJ~-G^zqfe({F4-3X_On6=?%OQWG6^u7fz z5ku*c%XD#5P3C@f&Po5TxKo`Umr6ET1=@~dg;BMeX=35+6hNNyhMMrCyz^~;5IEZK z)ZXH14?JHG%Iw&|3OavHE6@0LmA?k12eDCqB6+^M)#_QlYn&GBfP&g@nkq&1xj z8^in7%>^sC?;Yks)!)Ch9`vvJG}QlHm-NnDakJMZh5n zU_o6LK|d)la{qS zpm_Bf(+!J`E>tu=>)O(UWPXWFlPuh^%tcONC67f>_p_|+7-POTVQ7rWx_vIrPlVYC z&(@-;o~%A2sWoN*#VeeWSR}An!4z{%q+NAT>AN}LrHQViNO`>np05NU%YDE0ba-WV z(r+44!CW*Xiwi-{>U^DbIA&X|L7)vx_a#nk8(**O+z2TtXO<~fZc^UxeT}j@vlK6d5zqc4{cbH^ z+pcFEW!R=_WapUW+qkCXzJnBvM@>s#7@y&sCC$E09t!9!+ywMeLRha$>7s|jtCT`% z2hXPRvwHWX=8jDn8)K>!w>fOP?UruKQtN88{@?LRz=rjIFgPsae;@Yu564gI|6@F6 z{ePFB_~ZFo5TuB+4Tcd_W)^Bze;M+7i`Bnm6zV*}Oup@91mgfvcLvz8C;R=~OQ_xR zyTmA6SCC?4!u7^O(4KABh~?mG@Ea6y5qOFKgJ5NwXP=@LQf)xEwn`m z!#JGW0)o47E5K{wz~U@kj&p+2?B9?OO~CMA%ohQMmTGP5fNQii`l>W2G4kI8QoO72&xBRUU2Mzb!mu=9d z$HQ9&IRnEulo2X=Qyll`Lj2tc#6L7bC;>R0;TW^^W~A@gNb`WtX8CVAb?eI@8{~ig z@Sr6BNByV!ACK}>`G47Qbsy9DD-W?-?fO*;-0OGzGF^BOuP@&+_rN}1Ic;h^zP3`v ztLDFs!YuSZ73=h&^uN()P@4bar~KcK@)-Tk#Q2uuy`|09g!#6DSyxYBUr_K$lkKU1 z_y#7ozo*sF4LUa4tt_^>U4!}>E~5$fRi5aGjl0$W7mOuWk?{JvO2ld6asQ~VKF-r5 za6if~Lf5tLgUoP*WG8!Une@ze(XjvaSdqFBxyD)_3L=bRlkq1@qluHvr+8H(NMVB1 z)GytzsBUjg^SciJAk!-|O5MWM1_l`pT=*i-pl}!~TyTg;0HXz=%)BjLdjY&LUpxG{ zx=J8hTwSTX2LB;83>8-h{>4lfjpYBs?*E5F&;GyvB>x}fDa-%6?*HwjpuGP#lGwBV z*WWhm|J`Cu_Wy2;JMRCt*wkC=+#hjMZ&>2KHuW|=9)455!Ry8#)7a-mE>~T?GQa2{ z7UV+G(F)on#}?fgT}(kLxr^pHc+FcX70yh)i{N_RMMEi&Hzke;oVAzxuOz z{WpX9Q1+j};r?OC|K}G5+K5u>UmwALFUg|5Pf{$5j19I#NsP+a}HF7n6#zO%fE#%%-HgeGg^U#C=)qhF`O-GV)A;rOlJT>SUN z)th%OKfHdm#i=o;-XHV8nDftlofRu8Jp3_n#UTT4{~AZp#SLb`!foyQv-hulK6(Ax zZms?9ZQCmH{@sVmS62h4#Ncq)9gMsEZofAew*85&B{3_Q;=@#7__(2IIW?bNyXqxu>hKOi5!(cu(Rt^sO593jlVkfMNgk z*HznFt_yaHeY_Xqk3Ga67pOnD4fU(Jl%!zChn^O@8AYj>?z{En5=iL{Nkd5)6tBKd z$x`|%NIgy^2?d)oa~5o}TE<(*m;E6uuLs*tCpTzx=>n!G?3#j_j1n37wT4qIgNHLl z#!OOjzTldUuGz%dftQW&3dM-h^OQ_QL(Yq){tlfDtvsYRMI-(1VdH=F$Ae+X|NANa z@8diV5dWjNckDb=cF^axxM}Ly{k+Pv`{ViBtCJ6xKTc#s^}@2!MC3LTx4(kvc!c8M z_u=MLH~)=Y`i>UBjq`t8_WynI|9PCJ%KrDW9{YQ-04kADFE^}X5WjUV$LWstJ!7&f zxknZ-acq6N4`AW5`rPE zxHhH-vAc{K+FeF|yGyx~SFir-^!10AuU@`=b@}tV_di`+ot=LimDs5azd-vxzs;&4 z?ZyS#HKxjDX8uE%au5qF<>hAH{}(grZ1I%zKNar(KJNYNXOsWO;r>Cv|L?FreA@p# z%2S*F6&A9;!bm&ezk$iU=6=;lCJNyLlo*|5QKa*OY_>snigy~`z(m*1L0P3rIcB@= zC5Bu_QW^2P{yZ1zhNg{^ctxy9 z?)MsamQ1>B5Qjoz0_^={*420y)9F@8*$w%0HMo0BqAQ6}YJtDb%d#W_I~v@sW5ldl z7n&^#)$$*GW+;tebQUv|&R~G(gW3N^CI7#}!IS^@qdZ&5|5u77fZ>ViMIfU%p38jU zrzfvpfge7cZ5ID!p36PL3um=hG;hgl{P|U>wiG*ADkdiINvQVq5$y&s?gnu%>tfPd z4cba(Db@IdF&HfPhVvy7@!v3sJyHyR?r=d?OhYbSnryNo>o} z1?cMeuQQF^{Q^k+{2vU4MgOnC_+bCZ|MyXzt@Xb%l{oGpv_F$#>^^iq1#C;r&(4c? zXT7hOWbb#N_1RP@>wNat1{$A*;PWKKOPH=NRIb0t3oy6NKy(Vg(t(RfP$R1sj#-|= zjFHzkzP@L$D%|x&o&>&%MT&$kbh9)7?)RF3@Ssp04^N>6Efkrl)S6C=$Vpj*Co%0qE}TEqHmy&w=&_%^jeS`?1J1ex}(xS-fN9Op==7g2;-- z1%wolo6ayJ(dY$((*UnPP`}743hko^lO$AEQ1{9-oMjl^q#S*kC>^S;P;UeG-n%2l zPB{zY`!gS?7nW@kfA0L1vqBY+-O^6ThP^eM(75nQa-o+sLA{E-xn)rDO%7O z3xH+LehH}5rX#X>i$;mluRVyqaBRDKK+NO+6jQlWwn)1YcJ1qIiqaS{M1wSJgIyP= z{QRULItG=yHk|K@-5qja7?)KeSR9t6cSM$34#u+CI4tXiV0j1XSGQkD_$`_%)4U)} zJ;N_V<%g}<4O5G%?X^{FF+b#9CxOMY*hJlrvZxe1)kr-SS&6#K zRRQP#ky1Jjb7}!Gl~vm5oRNSCW5*Ist>-SaJ>tZcsX0szb95?E6eO_98DjVat7k;bk2H(& zqd7GKD-ZeQh~=$|OyQnESTL64!z!|Y+rezDLuZ*O+!{S|*V62Vd|GO!Tq99Bzeh`T zvzcd`;kAHjc`gGI=|ob~c8VCp@s_9hRu@%$y**l>XxXKUo_6QzB*MYC zJptDUCB8%pci#Zj>8-cSb+K{3y7iU}1_7e<4GEFSC@D4(rq|}Xy#alXVEA*28G087 zs4cEeSxTMbGY3Q@GGuL+C?lzGFSmAb6#vs{;Q09X2iz`hNlS!Mprl}GgB>7^-ImN~ z=hJo`ktvMY;JIxfu~Cc|9~xdl;PTom=1SomJIK$cXD zFDAC+jziyWk`hJ&61hXM3)(+kUY=hV6K%bPR+C*OtfDknAWo+RV+pOWX-Z5qUlbdE zOfZ`_4h$SG>+7uRD90!r2T5 z`OUwaK+Y#Gr974E+O%=J5W4Dn7|->wSk>1_l{Be>R>|TWcc?ZEMpZW`qFmyh%w+ak zS*GyPRkM8+>VZl}O)qHqsfsFoI88`WDN&3Q>N#~8mb9?G@SnOS9WemaZ2FWqr0|IT4o(|4c6WKrM2iix39W7t(oQ7{V2jUaRKQT5{q_Q z9MD&Myr}$od3tWS2k7?`aCv&(^4ak75_#u6$QBR6ybzo=@(Q`O<)P1xP<5R};w=fq z`2b&5rPWHVtpd4NecatOoz$@sT z_doZG`9BAThokY6{pT?rVgGrLSeC{r*^=0D3f7f2AC<$wwfi)-(^Les*wIFrw?v8= zVJXuHa`I|3)c>~sO8>Y0f7-?Yf=k9~7ugh1E<&VRVU1i!6q95KN z@uPY+$p6vd;jnc7fBa_bH1&)!bv;tqw3sfv~TrWZQpnmVY{`; zL$(m_d-*%nZ~>G#t`~i9_RsuHQJ?){d$7*aqTi`z0{;3kiEPc5>$IYWFThUj7s(4f zuk`N}<^3=U--=tILTQ(z6|QF*`I5I~PSO`(N3K4y(600|tb|#&rLyBfiKWwj4aXS_ zpAT}me);l^zw)kU1Mys)9LVXrAmo}uj0m~T63|`^+MsQMIJE6{+j)(4-Y?6goOjIi zB`@%qDQWA5=H&}-xgsIU0!Z~*NCykDJsDoq)zOXU%ME4v*mGt_iGXr38Og!!k)tOT z5V{4N8un7VcQF@=Gr{^^5Sq+2(m2>EG@YX<*A`Q8h~#g?dwx{eP~vaI*UY)k-sbAB z=BtvT?W$e26R6H0W{+E0dNS8rrqmd%3|a?Fel}yNDsZV7PHi15j;+NM1*z)+^1LJp zDkf86!ge_#(Fa&LV3z=QI-S<`!C@rOf-loHXSO95u9QTPGPR^I4o{+F0pDgza9}&y zXe0{8Q^#&BSx{naHIoo`thmF`zedcD7{CVyQ?-#m?iY*d1mfOa>B zZ!2$$O8S3w3Er-~UCdRQ z#?CHAnz-SxP|AKJQRqZEw)}Xi3cLO>zT{)d6~=ozsqGZ1YNX&btM4mS7SC@l?Rw8! zo1y38cDq&`KP7j`%1vKI7b&&V$w8Y)_q(pA(RS2r3j}2+^4^p#eC>Mus+7}7Y0t*l z60RVQFn2EB)WN4ceVfN3674Cm(q3Trul>`2xzf)9izbt(GNu z3h(;nu!x#vhefm-s1?Ld2yqG={Djt$5WfOOE?A1=d7fXuSy(v4YqYL|nBo;=s42)V zj}e{x>3Qg9!}@<8;h#3fe;*u-OZmT_^1nXLqtAa*j8+J6aoU?fwdLgufM+;>3;|44 z(6TH=VfEopK}K5+uMO5RkJs-G7oE$DvX=-YrzBZhR|gY%iV}k-k5QYwtIS&q==%J<=+1td&{VQNO~6Kq;oLRa)&_*cW{l?fH=cYPk3uh z_}!5bv@Ps7o0+xWw;1IV-9#z5Xl+j_Yq9&?(dw3@*Fi43N?6WfQkHslBB)yIZ47)Tz>H>Eo zlWW27yfK`wh@-_TULVo!YTyL%)p;~Tlm8$%2JJo2z6ImQPt%^S z-BY`g)oxd}uV<ZP7Icw^K`V>d3w_h)4wNmCq2tAGL(**PLUp+= zjwyq2fZU$hZe~x?_0Rg$$$!Z@4<7$zba+_Q|Hq^LlmEw~JVH*r`kX+OV_RJ1ATt@h zg|k7Wc(MhH@&G2W??zH_{c{R zU}w4(L;UjX1uu)^xk$RZ+ijiAKq^-N2}I>^rivTHJFIfSPZ7u{$CCmmkXP8&vrO(J zWU)sRDS?;?lbdzG={o_MVUuFP+xA_bn)z1z%p@_M+gUaVKyo`ZHQU2=-tx+O5j zyl?r_nz2`xS93;|6581Y;i&Z7f~~;ns3mdK-??U*q9hXj_5ZI8+E?xE<%{lBQLHPK^&|*L z7BemqxCE*133ckcEzDlaZ0i>6%AjD*=xJUp83{@*gu7KxV>hT|iFHkkB6FXjA)rcw ziE~4iBq)v6Ab^}HG?VBxlf*0~QG`+vYGo6Hn9`T)#A8UY@{y`?%5OeINkrC5a}--J z1-&eN{^ADgsRj(ulEf5Mz!hIF(AHongAC2GNC5UhzEA~xusb!^Y8ilF1tT1SVw*dE zrMvAajC@kLa)IXK+Lk=||3JGd{%h{Pw889`Fy6G}{SwCcEX}1rmrH?06TudV^4`te zB!t%g>hyn#Sa$d9&ztQ(gJCKD-{U+UmKDQpd4Bi41#eI~m-8SZ0gTiVs2nBq z)reHK{kHm9w*Y+fg zVtY@9qCenMC;xQ-(1*4E5BK|r#rQAdgTp8L|D!xYySelb}F3J6Q!W zPl*&N*UQ>k8AYk5$_`m#mhbpw&0+xjCGT~Z*Is6n2}uDq>|f=YTRkpUcm!D*R_rDluZYiMXy25o(W=aMmkQ!f?snqDULes-zrEwU}8 zVH4J^ZmAjR^ZI^9_Ty96ZqqS=75wdDv|)gX++O@rH7pOq`(F6ljziO#;BBl{sCZ_9 z)2yPkjAE6`lspMUPG^y@L?)9_6qXYirDd9aDQ5=63@s}X-H0~I7GNj#M}#R8=EWVI zcF(%Xx9diq5b+8aT6SY6m7Z;!Er0(~4!&TEIMqv8Uv{Q=zV6a6L@T_Rd>e>l0ogzw zS@L&Ip`2wr%cqsB$N=-)_RZHzJ5z}*fo>Pw=o{1)*?Z14h*va#k(dr8SQf7ficz>ifM!V&p(TnLjDAQ-mQcV55NDSQ z8QDkQ({-1i8UBnyRblc1@Z|y=jE}5-3+9@;CGxK!TK!P`s4vHB{ z`7m2OP|e}k+k=XcPDprB7;Fz!{2hC7TPOwYJxLP&MkGq)otm4W@BrD4k@JE+>g%Bc zgFYDc!LXcm;PxnrOY=XRf7mqBbTJFW#rm69-WeAsN7@n)kw$Xb<7wfWu7IY!4hSI zcMb-8%hc~wYs`DUS#NZeNSdz7N~9*R1-DL(G#L`Dm5ipVUC&qwfVQPOWpoRBikly? zdYraliJ@v|$crgpIhy5`hPP#jVFR8RZeohzUAbad#R-nmQ^;Q=L6tU*b=;wp98soV z#TQu#O3QQg55q$+V`K>#4qz0mMJuN#=T~oEU0!{6_V(q~#jE!p&rV;Jm+MoQoP?og z!3{FX$g=XYkbRY3!*vXoIH>%tn|_&+q^|9X@4E4d&w1IO5XM$Ve{~ zJCv~L^$V%;S4a`HS#i-%Y7tjoZ;x|wYiu`4LxYgWbD48J`2c>cK_zyGK4d+1&9jX;u5 z@!NQVZt(x#-#;wGe;*FU!>9aDkMf9nE|&{T^AM*ZIXnfB3b)T`lp%RXXGT)-W=XQx zmipiyWD3{<3L{~f#jPotkyPK46Tt-{X)dnG8fZCExeR9oW)!9|=Onpo51mnA+{!EI zCFBjq+RZaq*2zWJs?MrAMFm|JH#Q3O(_Ip4uWRneH;%1BK`C8&w6^<&E-8zH#J&1j z)7P)9jtXyHAaM%-yo7TV|3UQ}MhTA58GqkRQ9>wYBwd5AUndoX7&Q62ogq))Ng{E31E0pFZB_LP96DGC@Laa*=_yWjlVmoMeK zFE9-G=T)MUvwe>vWcW@bD<(|lgYi^R7yB?3#oIvSRSp*9CI+4N;9z_-IT#;--YSWE zx`lrO!D2~5{(b)cZrpF+*I$9`lPoiXSSPbwC9#SUy(ey+uSv!SKIZ*=`~Agg1Wrz0 z)BjI&Qj$`J#N#vYY7abLB*Fw)WN-^x&U{J^eElkOuO!Q^lt?m}3e^!^3Vo=?x(wy( z*LwUnG;Dguc|hu!vL_SU2>IYctQb&E`Bf52xN4FZ%qQ;XR@pjTIaxVSPMgJK#!jm~ zs<)hUY~nM`rtU}eA_q_^;lch%d#!pl>VGN*07`Fv52#-M8w?J{h4^2?{{HAG{^O%O zU*sLZORm>J90N1l`U+qOa9q6EZe0|t*5f$1Qw>dOah71%oIglR-&`*#RuEtE=vZ!z z^DK(aNrZ#7qtl3Q-Nby%7j{Q6P>Z`~rB{+k+cBw7+Dy}2^6}Oj$>XG^{PLwn!Pv9~ z*JenKCi=`$c#_VkV~&LKg{Z~<_NqRjkb5R}%Rb$yM-EPTcYb@s%n!y~4q{9(4P_yY zoloLTMc;}JHPw3Z7CLCDl?cyJunx4L%>2ANWX6@$SnlDLh*Cbq%$jR`e3O5hSfjH& zaBF&cz*{rhXG25rYT_s&=O4~qsu?KE*6z5eVd(NwZbZNw!iS4j@2~C*Q%7l9*QkC1w3$eD(g-$;+#EZ(slS)%$nv3S-qCwEgaiDzpAh+3l&+ z#M_T&FV9Y{KAv5iefRp+)yr2O&rV-m6xvx49Og|~!nFY9<@>Xbuijsso}8b2clP@1 z@~i|2Mv(_+1LyL8Do5(_f67rh-E|{gc{VE7d*Jy>=J0Sf2F82j`E}ugbX4VER;8_o zdvNLQXn*~a}&^Y=b>Z4#E*zZ%aEP%FFCsj0GqQ*sH z7xR6~w^q`2*?4MgK))cVjmX*xi-q)+7FGZA`UX&&2mTiC3W7!M?UUE_#2*so_o8wPt{T|J1 z^4jkw*4UVK@*X)b;BsQ!+(a6uM=y6*2GMb7m$sz9OAuhm*NN~+zxuq&V-X5HHee5_#pf=JiTQ%Sx zIvGtn`h%yQw+?^#`xN=kvr+yhB)n?`zzyer{ZYRd|MhUNKYo(`kMYR!zt-hKgh!K- z6$>d`eg4;NH97!HNNC6ZbBuQ8ln%9Sps()_>R5 zw(l0lG(Qe9Kb!^JDdKKSD|%tUIgK*PQ2ISiDf=0-#gDRNVc%I%p{(M&SslVyB^K=x znQ+pj#hwK(2ubwYrU9&zy19lo3gvl^)2~p z`$nukrBl^~zKa~IG_kq;r1-hPx#c{C0Xj!17P5lGp{Qh)_@Pvwg8#YrHEt7T^I5l3 zFFDLsh@Ltamfqa7c6Eep%x(!K4`h9N5GFQt4G1n5bU^(xdM0-$Ug4v5FZqDj+y3X} zug=|2$9SplSzoIp^4DlhYnu5LWHJ5){0b;ZnaCKtTR5-EJ#}Ay6W+nYp6xDzx0vcSfK4MCl$Ow%)vw^HSg~rj9&}+Swn?yRZSWST<`d;u z?F?}D{ztIZpP&x&d?3A_w;xU)m}b+p;YmsHkVL)B_29gn#(S8P2tz8BQS0a3_kJ-6 zkx3T&^=r%ieRt?^CN}kA?&`nq4waFFL}b3cNKypDQxa2_LaeR9~F^~FQu)VzGt-s^QH5A-OAh|ojmIu*mh z`->DU;)pN@)&o!T7T{0x$anq@;PpxC9!1* zFxTI^_Wy4FFXBKRBmj2h|BuFfoBxl7U+#bUBp=ED#T)~fONB`SVzR*Deq3LL3FZ0r zX@*xY+bI93wo`3pUs2!HgPwX_TzYB4)K#}SMR$T{mU}b>knx_fm&=Wn+^8B8F{HFW zS2infdn$vG)KhtSv=>DkeJz%S$Khe^CjMHC?#(8Z_gV|ClV8iIgo9}EN{K`Mcd2}V zoLH0n$wn3FYISG!rXP1YhC1zm%8TlpNi3#Px}54#7Fx5ffR@i_io&`m(SAwBTDf#Z ztf#dEN)vC&c^f5>H(hR!H$lIYT6Ip}+`R5o8rO`R*?Yn9>w2-S#CAXw!hbuuB_rPY zu}Zv_fJPsdsI#B&2laS%mW-t@5IgDA&6?d>YZIx6p7_&UM^l!{9QsO{o(ljCmxwDo z1qgwx6M}QJ1r01ruSs~jor~_bxTP@6|n&@ zK1VU!mlxGN7VoMIP!m|{%1x`wbTN4=zsmd8`|}sywUiJ{`V<9!bE*5U87q(0M2_p zodN2$xxfE)K&G!-7Uw1cXi4KJ%7&bLQ&_3TViSs<4sC}5`o%0Q_*9#XvPPfm$h;Z8 zrYBvoSwkuHP-Gz(K1lk+-tCS=!y;awsx{}1k5>1PJRarFr zxpU#@K5boGyyaXs)u+3rY0E@?@!mhqXHWV6AP3M6`9Bzr$9DdQH~NzQ@ku_y|Fc{E z@8t{1&s{D5wPuK>q<1R-xkXj{>~M9PT(V%>wq!TqNC9t@<<-XaUHD4hDzPgQ@au|Z zQAYJWrVJ+w!RX6u?)Wd@G`@!$3epVCQ3hZF%FXdSPo$xU<+p#?XnwP;%dYJ)>DoxV zW=oXaV~T)8gAp;?mv7IctKRC?rjWOJeTT9PN413nM4G&CBDh`>s!G)_W6+mtbbq4q zVvjv$#o6CswKzdypDR_I1CN1_rHH!vwg-4lGU-*^hS1J8>XgzVbydI2-WF@C$gdQrY6H*(ebuq0{zcq?_f)lFWm9srKcmVw$$i9AOrF&G_GW;T}E z$hACJsEY!sE7y>3kXM8O2<~8vBTzx%sW`o^(Jc1!+&#Jz?*X4${ojnJKmJ)ogoo5e|mLsdj9O^?_OV* zO0bm+4Q($Wr1}ao6j9@$sI-&D5GR~R*7kb!`t{Avm#5d)KfJy={}|ot(aZ>8-4s%K zPqN6B)&4nET?apQW{@sBN1)S1Vdp2K)G0^fZwjS#!f>3Ux7yHOVi>J(0=jEXGUzTl zU;k>(@oyc_O^x45Gw@pnq&QiCf94SX=l^^Rpp-$jrvH^gjR>GILMiC$-y)Kry2`c} z^H+pjW{9GM)ybFE@jnj!|1S}b+*}6i;Qzy+Z~K4z@t6BQKFz0w|LeLv6hM%{BqA%I znS(fm(DDH@tr<}O!;DZ0)@dXb5sEOQ+OHtO2Aj%;f2pd@MJUXIGfHmG5g8<%E#r1l;)tx0tgSnS_3@LJUTbLC#y`E#gLKi{%2) zw~W`Yu^MJ9sETH3hVC#~%Q#s=Zr3U3-1!~QkqB7y(G-RSkpfUhZ~3pI*(Ib@MM&u% zIa4bCEXmQ12Lpp5a7sb?20R7Q$7VF^@%M8Sa=Fm~hu{O4jRp}4jm!Ls{`Ub^l0-ES z?M{Uq(G15DoKk;#0;}MtIc}*!Suuos3yEZ|SL+oRdi6t7+o+aW4Ool}O2TrfG&f;I zZ*^~$#OykY)mY@=HowFt$H#xVJNeVy|M}BhSM_od1l~v-x!M~{{r`rdOcr!gNSF7j z#oFR@JV7h_zr1|DaWcwb$iR@EUPAAAA?6!1C})T57xgmjU-PT?kipBg=1wKHrpO)IS!xGVp3^Zhdy2ee6G3Qsd+K z|AxbA{NMOX{>LZz?C1ZJE8vm*f29g7b^brqpw9m%A8qshsl~e8|7SMZ=Kp*B>c#7a z`u}8KP5ghV*Ynex(`TpG&&{4|iIxB7yh;-DpXtPtq+v)$aI^E^6 ztHH4Zr;-29h2zKb|J6~u!~f?b>_PrN1-4`ms-J`~En9@9Rs&bkNo<8s#RF~co;b9w6?y~lcY-S5qzo6+F#**!j6`A>A& zJ?du<`%l;QZS4Tu<^SuCD*nH~|5E?!lYI8_{}t7pAIAk)sTSSX$}1prK-Gh2z^`#4 z7EibM5sOCKU5R$P!khTnJK&U~ty6pLOh@?LK)U!D(+t6A1G;ZOE#1bSxgh!NH_%C8xP$+X{L#qb|9yY_CI0V|d_FJ#Ur8{u zb^%(#VNdDsDII~2;RD>y{g*C2hV#!5p}YKl3W0s0sXw=Yt?7J+>&}601)AM?1F&^? zw{{HXV^-V5MgMls;7&SquPxkz1#Hv)G=3cpf_}*Y-L5`tw?k{+-OKydO-LoIOoRBm zF|P}E+;`O7fselfEjyiXTeQ>9&f<*a4s6gnL$}g7h@f;)C83? zi3Xq=`WWr$Y1h-fp2o-N&E;?8YvLnz>2f-LoNntqkDnd$Z%vmF5B0?TQAu++T0bfm z`{Hx`1AX?e|1%Wf_QwAn^}l^Tu>HRS|4aSHPxAS^?0>P;9%A|n0JT=X1pRv%{G#`V z+x!KX9cF(tyAVd}$v64^2pz9u4TkvF2pfGQ=YRma&44dA*kNQ>p|vrqYr5QKF7L2+ z1vFD7kUxxq@wB837{k0n2goO^eeeSB-L)Sc$8OpRY!6FCysyBtv`^%SHnS%Tv>U_U z*NS*ZA1>Qr*Mzp}$Yn7!=kvIZQE5ohGztoX2mOLQWOL5iEK4z3VeX9<9Sk~sqjiO{LOSx_i-;y%ZN znmhN6g~Z>YJq{qhM&%Z5I-v9I>(`y)ew3%;j;zkJ)2j~u_a7Z~LyAj_bo9^_SLmZT z$}$w4uQQx1uH`NGI9XgQ5|aP?{5=ZSqKxzb09{p}6D1+iC-W=F!sYY#X@=xA+vbVA zNap$VSI{e6kjg(K<*GEvPQXQC{4B{dlZDI*(mnaO42kz6il&tWc=>gs+T1n#(P-_kfAZ=ZtUm4(Q0; z@=<2cya_8MW1Ft$o;rR&j4r?3e;r|#d>K1RlZSzT62$D9S2NFq{si5|D7=0 zd_GbVS^O|0tCS=tVfkF3_bh|o^F{ko8=6YRv!96SnGC&Wd7a`t=E*=IH@I^oN+x6n z^oj?0+X@oKD}ts&P(`#oYc58eZ)&~qgb7~0GdE}3vP)TR3PgMg8$ChZFxYriNgD6 zD90XeH1Nzx929nRbG7ChI{yStJ!QVx7ywt&FZqc$r^64 zeKy#ZE%j)->C>nhvZqJTGz?kzc#4LxrFZEWpW6Q0X8()W+y~nJU+r=K*T}cx|NYU( z^S;>spW?Hh{crLHwnQM!xG^Myw}E0Ml?|YlkNB?xp31`i9r5*w5M~^jL$>TO(ql^` zTZ7IbCNmfdvAKl-lzYe}U=gdYE8zF?UX4Kh;spj5RxAF?2f)a+xFS1mSzH2fB7}$4 zlK`~Ua^Qnkj2c)|4xRrf7kh)1nR!-kBC`Id>O!4F#%WJ8OTY1%_6sJe>T@;zO zw1_5J(i=G!OGy8YHaV!`-DfBlW zk^5Qyu-JFHk^H{TCM;p~h$D!&b^sZlL*+_=#aT7oGE9}Ree}UHmHXWTRD;j&E&O-L zf2E~=Z29jE1N;8>(Qy2w{>vx%G?4#)&y5H`8B8K>bju~;T>5GS>E=ecFJ}NnE$2{n z6(fR&k_1F3jmbt{w5uhZX-ut|l{&Gm z4}6M#0iABA+^BL5vBKvY(D`TQpPf$inm-Nc`t0=O^X@;sy|y3%!$($zSj2+h_g(c$ zSB#>#>JBI^upAt6SjE5r-c7uHPg`Dl)_6f)*(G#!1<~@#)B)hlYoK&o&KEU)icnxq zohDu_QYS41y}RG2=`%O8-k&XD##GWcsO{iE^R=aKMZLW~Yg^S1#EzlZ_G;aFPOz@}^pD14En?CVB7R4TTGIQl||R3rZTpg+d^Hu2%)bPkS5N z)h;ZC!pXa!eAi_-S#(r@hJ6yl(pW#yM=roA?uu8Q_VoFVti^Fy|Mq7TJGpKD-@`1y z$>PBtfF1ka_kw}F|NY_c%l`iqp9cH?2e}*ooRKwCuIr4%v2bC-#kP%~uO!v}1}?U^ z|E~yP+xB=ZG*d+vN5r-V_yfq$0=@qhClTm$vw!|G`d?pvpi9^vj!xwDxj&p7{=9>#x9cJ*zrEvf$6*5lDq%R&;km!_B74V9KT1AENu2a4twBr5^n%W#G4!? zkfIF4I6=LG-ud;<*NkN7;0ZVrOBTF6y9N=?=s|CR*|GRnqJPkv{X07r|LPx>i(~$e z{z~tX;{wnOhPUff$Ub`Tmma-O5B}1d!P|qs^w^63O)|VV_{;x)@C3YtnaGE`IDbwL zdTB=fg+g}F!x4hVvUx`Sb8lsdU%r0PTSbrF$JYJtdqY34 z^FR8*m;8@U^LYZ!mM~eMm@NJ}%l>w7aPU_sViUem+E#bk^LzfF^S8eq!@nIodGZAO zSbFf&Q>~3GFk7x?LJwit8i}-DdJNN)il94~p=0ySpx5h_ARU6IeXrl|dO^28Iy~Tg zaqRexJ@|`CEe4T1F_t;XF-S<#UBQ2mOf~-&zvqovw&Cn-j^Be$gd?F4&bi`;-ltNV z>vTH+ClL-IBN=%56JZ$n>|6>AA@C+LAf7sPrDRA|=VgX)}_C)5F8|t9|Mill_pW8InnP zNT%k9c-FlC05Jn|k^!7xCaLd_no-{$xhH($pl#BYwo#e3NiA*d7&eR|u+Czk3z9Vh zzr+AiK*XPBnx$L zm@Jq9GL*^F1{cah2g>`2u^N;IWt4~8QQl`a`_ugvo1P+nI@xD8E7;BUia*`5S6uo{ zYxTy`ZcOFIAGRCIhWd%WO+Rs|C#|#-hA8U>y})LE!6OjuHC#X*UqG^>a}rX`Tb|)8 zdImGZxe64A78#zcx$4LH?`*vgy?K-UM4|4@n|Oy7PtVYb+#&FeWbdRIO|(%9v&DLa z63M&#QNzVM+Ol|E8e4mXtvrvWy5_ZG1m2(-z20C8y-t0tExoq3X40EmBHtp&#Bz#b zat~G{L*Vkw#rg4@i*s?PBpfJolZ4Wt@q#~lad9rm51MH;UNCi&@6zL1s&Sq@-QHI6 zXX{leqU%z~!ljz^uE?UI2&fXH`7qHX%uobys)k`d{!$D>;2H+cF$`Y2VVLy%ahYd( z<#7nCeg5p~`RU&;UcCU)a{|8SyI$xkD7ow2!Hfd3W)w#VkU9SiP$d2NVj%X^x$}YW zz50QWc-M@Ce9(F*3|mt|+BO#4%)a>tm?4}jz`Z)|kY_d#w`-JI!xxQWkC;)AS6HB6 zo{^OtybP@%7N<<7X-ef-dClaW=Q-q_B+NBdt(c{F)3?T|V3+-Ff6|6s`qO5Dh_~ND za~;2w4_edgSv315%|mN_ge1#Q$oQg=>;Z^kZWikhbdUB^xN^EjgDrH|aR~XKCEcUS zTze+ng9@*VNqAdJEZ+-ZhWJ9@k0meVW?+6Ur^cg^iNo7F$7AGL2cy>OU}UX>QF$Ho z?eRFJ;<)qXAL7~=nUX96CIqoT!^scalRt7z{;2ij4^8_>LNbZp+G znxvfjGXik3$PlHH=6)kb7H{vQd01=3$Oo-y4oWl+4MV2i^;@}k{K>QtL+94m4B*eUSLToZ>r1bLkTWEGL zuVHKEHME%5u*AID**X4X)JVhS?e}$f_>*D7eKXv)Zyfw_*qT2MOqZ90WR7R!6CFwO zpy3)COb=@raU!HEhB3eiVR*h#_KO_YW`bujbPJwAty@k$Xg#oH!80&CbA3Y_Z#J+& zLxvQ%8PdQdcm}Nn&%hEq14Hom-N0{5vw9#RtOWi2h8wl-FhwP@F8bRFp@AiY28Iwa z>DOyq`j6kedV6txar*Pyi|dPLFQ5N>{`~F5+4JiY(77Wx>L`y?Lcoj5Hvm%rDa8wJ zq=^yn8*Vk<&8`P75jAKnq6U_T8WpmBW1TKC7$JGwR0IGz>2ZjNL2D5aSR!Izh=>wB2ItmD za{@FmG({nv<4{m?wu_L!#gc>8EIF`Pa$vAz-!OcdEyjk%?|6&x8@O0<(3&L&7E2CF zEV~^Q9{%a&^C!tG{@2A?7PV?4D$|^72+4`qpOYmp4n_VgL~dr6@qE6Kd{DgXpUz)g<#lF2^zYUAdaAm=9UVOqy-F!DQQ}b16}KYQA+uT1u2}DpBt6B8$jzGq?3%>~vdC>$AA!g9mLzdwC98 z5!y^W9JsQZ1O}$6RQlaOteTJ{LepU!7iZ&UkUAsa=IrcBV%yLKFc`?ZHhFb+J$#rU zP_Bt_ckmYw#t0_sR9>Ww#m1G_1%&GivkgeOfeOJ4Go70u=@qF+EW?Wh%5(s}&L?zD zL9?7B-rlr$EMN@-w+4ghHek*4%E2Jm0<56{Kj@FQ0c(g^zl52Zs}lbft1v<-6@^Lo zvRf=enWvVJ`<`>nyVS#WS?u}dwoC-yR1s_T&?By_M;R5D0@*ILyo57@6pj|L=2HH&>XI9g;M^;l?wDfBUR1=~Yx?MpUERaaBOd^z_ z$jHBw)Hl<#gKdsjr_#}uddnl_o76jU2ql3nd1(35R(;lxLK$m0Jr0xLBJ4MLsUnpc$4NJqF?GCgUIrOPf zTYYL&)~7~geac=MI8j0-DMBf#(qk+nRKzen&EWq@udLn}x8?#Q7GjoK3>!+Hp;P*d9NN>Ut@bo3Yfqz+_T)P=^eh4g&D7ao;8bTv4((~w zR(rA%^hYJ_$z6iTBCug9=0{9 zhh>v`STd<=(&&ZP7pzktZn(+oUiv{pQ!)^yq-&iwG|>ZTqUV^hiioQp%lh-9VcQtp zVOa=StH{K#Bud?3sn*1L4OfY`WtH@s zmD%I%ZQreojF2}c3FnDyE3;8mP9IJdt|6|M@~w+nST!w%B`I&5rsi5aC4zmb@# zSOqDDB|%9#u!qHq}&%SguLj`vNSew9GVG*{>16Gb=8c+|QjL?#icbolYHCu}p&<<8c~A zdis^yfzv4~V!k9WdIn>dgeU{2d|VXy%~Zg?+fy320-J)?flYxG*c6z7O@7zg(_h#h zHFJpeM^1-m;0kvNT82A`H^&x{6O+h251jf9Lo@sC(9FOU;}o=xaSE&$r@)MHGKth7 zYK1uil87*I6zPlI&6SNPp(K?qQX>VlKWe5H^+!&_HE=~m1+Al^0xK#iFr%WpEjJ>l z`=5>rmE=Sej_`DdTZ9*gGCo41aWI|_MshS7o#@1Z_KWoZBnvpvkA)s!5l*EV26^XzcVtJef*NmhnTVYCt^cN#B zY-Z8;L#IU(I0CqWwgFs0&r)Eg<}g(K)!eeXgBj;3YFS8&hGht@Vw@ll&A>W~DS!)S zNO$0fhzi<9L|MW3fe{gzZ3u$*rJgs%-AO9ZPOD^q>3g zP%Kx4t=0v$tom9(&s5b!Hhw)CF14t&R%9tf!G37C^nv#3KpBnxerPx)d0RAWIldnn zE`ixnUiR%t@%BN(Ri~(RnIfx7QNKJX11B2wlhV3ykX1LRU!D{<8ugRXzFdzz8s0u= z)L&mRX?uOiq-PfmDvyRM7TsCKr|oEXr5hb5#XTb1@$g)Bo!8o~^DMj0GweEVDg%5S zsMPNlueDL*Sw@X#7&SXksh=LNwaV?4Rc_Bvxwm6dukw2BR9@wm@XMNuSLnSQmx&XX zdd1aitGIe)#nmemSB}QWiAKHR>a|r|t@>A9p}1~Gqh6hCUHr)K3K zX(q4GgE$&4Yr<6@sbzVje4P%;xCHy*;^HIi*+?0U{(flGOPbcDg{;a#ULk3=qv2v@ z4@trD?N#FK#%0V=u3N40K^ttwmfVw&3{-skvey;7MLmslz-QyTtCewb&h7Vs~tdUH4@nB@=Dh?EHD^I({Cz#QC_jI3HW$d~Azz z-;thik2ADb!z>c_fQh@o7Ko|)e`-TUWLGZiTWw$Qre|SqZs1BCh-7^$bN}96zEbgm ze0@R&?h%Mc@@FOv44!TfI|O9S0GX>R^_?Wuae{GcrDj}KYR0xwQ=y2zA0vk1jlPI% zovbN}a_WTtKHqUD5tmh!TFgnt$HPToow77;t1OMn3d-2hlPcsXnn>)3EjMpmlVqrN z$281vTJIkpJM^7#TYYC-)_2C1zEd-4@}S}_P3*`W7ru3h(YUQ*G%hPfV@ok|lqVH$ zInZe30pl+Y%4iI?4V&UUFi8j#=|V3tWpag!^b`42Zez}k(u{mywShI^(#l&NwdXjAKh@+|xNYZ5AFdmC*s^s?0dqnk+3(;^kmAi^rJCa17Dg z#VXCnorrJ}e<2Vha$@-wF|W#}n}oslSj}FeXuqi|*l+Amwa0B$ZT_OAIF$5;YJiL2 za-s;lbYL&nGvhi7KF}||JG%laoMmcihmDeFro)NjTHk1$#yI3lM{}Z3#Sn^AJWHc< z4WCObX|I)(hp(iQc=jSKZYq_pSVKqF8CN|^_k)P{uh1OIWV^qpqit0lGlm;3{Ta~$ zGcPtIw;AP%0mTstIT3O`8ij{UT^Cu69X8Imt&KA-+c;y(#;Fdbs5s6ADc6Lc2&=q= zY?;?-k@9tpVmsbN!|EHiwfaWZWjJHY;w!2Zo6GbHQI@SkCW~H(#V+o?;k?oakS&I)SjrLB zQmBF}Z+J&sUBr04&4ihK5 zSwWAftIDy$vYzs`Ar|sguS9xKwr4zN%}zxlLzESvOISwyPMcL8nYs#(C%+tuJ2i!>V$6X6iz zN>K4s-s;Z9ulhbGLKA_2;uVfz22#iv%910%mYC*!+(QaxYa9#FoFS3av4S{ZD1p4Y zkWdC@h}|QUNWDvf7v3tankk{rvJHUY5~Dkg;)1}K<0vn#Kfn6#9_O9lN?s_%nI%0q z`1^W>vIH?iPr$psedCLZpS#{W(e&Jq9tQ^>z!gdf#f)Sd@BxTmy$|3m%D6QEJ{)}L z8lMlP|M*`5;zgbgC+HBvbZ~IP2Ln?8!FMQLftPAnWOnGm52shJE?&Jj0XN@WT!XXk zPOomj#Wi^K`UZUe{PfigxOokpJqH)Bu5V6XzI=WT&M&T>pWVFtZ_(qm%!fTV=z>d; zqX)tz3U7rW@Z&FQ9Nu>M7GYqq#u1{0C@A=Uk7SGE6-?GJKK_5j8`u1eKlQyA;+2-<{0Ktz!Ks6C%3A#THmxNGsc+l;34^HD4T;au%QLb8|><&es3vS9w zTm=dLK_sB!|4S6Fy2^F%=t5vC|M$ItKO9^9KM4Hs7ykb#KAeZiIAhLPx^Kl2I5;rY zGo~QT@Cs%)-UucfaV9Jj%8gj}uTHO3JTm9*y@T(_J-S2L5x7SxdseoEajf`11(d-g zf>|Vcl|A*qMIzaLe$y9+fLFpEGcW(rq0w@|0-OkrAkQ8&Qxq&y>}gJc@Zrxkg(S$XNiVv|>#Iz@Tap0>AHdB& zzz0BC#yS26@UHXb=B)D$d;r&of&6MyaD!Lq-y}gCvSGRwcb|d}%2msO{Q8@KAZ|(B z0GMoQtz8P1C=>aA+}Pz0vkkxut!NKChvBl`M5ar!j`OS5sPGltqD@aqrlOWa2oo@q zhbKLaH8(m9JUQ2&Auj(v2qvoiQDV|mnFb0dUraFO?{`T;d%UT*=ug0xu9S6#BCt*( zl*t7o5Gp$Dg(Q;vI*|$($VJVwZs*`Ra^FsDv$-Z6u^U!&Dbii>$M*VBAV{DXUOn-c_)Dc5zp?&qQ&64M52q&PXD-)E&$)?~|$<2#fB-o^yhKDJLMG2Qlzm z?I-}M%a2hcLEYmx=IczF>x?M3V?IsFzh{uCl`YLu<=`t_-FQ=acg6KcvA$_hv)p>=C}?>+A3Mu5tI=lPUj_I~xpD zaMLSzFCb`WdqR2!DH;uG;K>JFl<+qr8*~r+utW)%5wX+QZ2rLzM2Z7hwWaW5ZW&^HoA z|aBq>Tzq%xIEhQ@?ubukACVKQq=t_ql@@@1{zsQtVm>x89n zsduR`oD5DNqZ7X8txReX#ORWc%BE}~^m0&z#A6v*^Mx&bRu}o^rCl&vitT$zqCKTy z4c?7-dXC{PhHgM_$IkPfY+i0cek4ww_tlV(=kM*w#nX(e7{u`-ER`ITu~c&XC?*T3 zTGJ&Kw;BlTJ|?%g`7+TRRkW8}UCB|YS5|6)HCb~8{OxPbfZlG+9(YcB7r z;hM|eYq;imVo}(5^R<>jwxn`_EJT7Q??y5^2cTPABN92NH&-t?pqHXW@#N3T4eVmg5Tm8l~-g(?SRe+m!?M@eW=|z=^Wps$+3R7 zQ#|6vaOb4MVF{B#NFx0{lMiz+V#Qx7n;WX)xcJ{l#;@pMlPgP{oJ);FoA7)IyuEzY zbCc7{kKxOLyM#PP;)f*;mtv9WwZ-4mChknh-Le7e>Pz_pjQ+%E7`lR7ET#4^int0a z7r+e7`I=yvXvv7|UG6N%mOZgJ3wN}&2l;MOMNcZ|)-#>vj6sCpHRB0=ki|M;9J~*Ga6e1k-iu0Hy#XWW8A0h}h90TbU!5Te@?@MWiXNz$$meDqBW}9adCq z-T`mk18-rBBfZjvO{HHt0(wSBX2e{JPUmx+V795*1?Omv6Ke^E?2PH}=R#8PyuF4<)3;wpgj(sdkPk{E}UZG16*McAb@^(te2D!Y(7 zfU7N4 zcPPua7!$@DZ=vl>ZNL?~LI7DaLPHo!O7e;Qt6su?v1oT?WU zoWe}qx=2hnkb9w6z}hVq)4Z);F?Kf%R*eCCkB;j)tFECzuix|Z5}Nc;Kbm-bG@Q=* zqv>$qO-IB26hd!;CczBNqQ2)1A~+fi<_JyUY!ps?9}VV1{^ww_2UdC=X-j15Qc{hc z(!(7Ks)!_XEP*qvg%*|f4UdaZXt@mS@nvT?`*lmD%Sy>Q+Y~ylab$3dHu>?r5=MWP zApWdy>XmU->Qk?XO|Lt?I5nPf`!O=SoB9rcTCfphum)c7mS`XXcN1ovTc{A$$bs=r z+mM1Hc%JTqthx%KitbDKUzwaDgj%slYM;p}S+xv{e!}`gPh&ks(aGm4>c<1vz zUadtTVloF2qL^EmDT!$HvWO92!Z^yZ%GEu^SO~ z$~YH0gk+^vCHfa$gfp1J8ICc-$lCNB7)70vAAdUPL>Wo>UxE#s6{pl9s)4W9veD8D zO_*fOxKXJs#uslc__i)bL2z_rL~WTl{P}I6QDQO&+^z_L%xeMez$0sj}3`#mPQuDB~+4O4KcS{rOrd;P^+2joct&s zc1}8?T5IR1BNkuhq~mvf`{}4d5zN9RqWQe&<3e!$>RO-w(xY5?)!}in_N(j$tl$P@ zh?4jYfrQ3{+^$o79zhbB@?yA8C}QhWt==f1H5#wltLHi*gb~m=i`SH)>|2~s)&Y1f z{5h}k!w(?z0kMrrO@F{_`JHT8_ZAmw5)&!blp+5TC%4qCY#b{^Lne*OvSrGh;dUe! zH%>J&Yt>s_b+2uRPr#pl{T1}C)YStb9`m=~{tV8F2I7N~ zyKghHQr`gR_4Hhb-z(x>KfFof8anh-5iq3QuW$37p)7&%MZ!=vhasxkmv1Oi5m8v> zBtynTXpT5w5Rnve-(wA=r=vLe-oA$!IsqaSYPLybvGdyr%@={jBZH@P=B+SA`2$=q z9<7QNhbWwB&NkXW>4D2UT1>Mvi6ZA$yuU?EW-#u}*Ky35LT>nM5tArkI71@Cg7<@y zLTymcFjdUAx>?L-`*a8sKy(vLfxH36hZ2@y`Rg%a z;W2MXK^LrGnsT%*E_v$=QS~Z+E_m$2_b!a0uIj$ah;U6I7Ip;&-FwWI;?FLWcpo3; zlxn6`GtNI02_WYcD7|U6$zQac52ZJ>UqF1j);9!})F<&sXin1GledC$1o$FF zkZwSV!&_~h&qd;~KL6$B`VqjZlw=Gh%&{|dM8-~E0)JICMmyaJMZ>nAg4v;>yE}&!33>kLo&EGr|RO-O@i@GZOP>#=uDKtm99_)mkKD zM=~l%_~yk${(P0n8-=O)b`1hj_I-=rqv(4aMKR*soz|GfxmrN9o(_|oKZ6y2SG`)_ zMI--4zGiG#^D3f6cwxANIO)zH#i0x?6e=*8OYGDO>L{IM5Y6$e`Gm_b!3k3sBF$C# z1g#*$p@=d&6Dl(mI&(hT#kiZ$L^^1iq9l@#Wu}PewCIKAu{img@}VK`*1CK`*&xvP z73=RQMJdgNj=R$Rq9hW5l+}?IT>D4wC-Fy_b%-t5MepG%jZrTq zA&dnh;Y?Nw7uyANY~&oj9G>f7As@U5aDNM*&|wUcD3|S+Yg3$|J5=Cxihm z40YDc-@XBU&mVNXeLB){WiE-MH3zx!_0|@x^Fj}b8)7QYl^gUbQgiq2RkYr_SM{YR zBECi0GTX{{HXT5pcak$Hl`BO}!%8GcO{+LKeQ`AmTD9GmH?Qj1j8=Q`|;8Lf0AlRq{!a^`!k*@?HMiY(h{fglf|aU$<|rAK^g^8XMEd%fOa z4_pXkIzt?pmGmaT1o#@jk)b&XoJkUIipSzDnBAg?OHS2!4f-suE{Q^sxp{e=t1tNw zJmV5tM$f*|cl}GvZncKR|>ho-F`8yBlo&uvws-a4yu zLxg3|rr1j`k#>Ug%?KTlZ%V~x-(0=C=1tcW83CJ|fb(ZPv&XGx&iOT~?gM8NOuN%& z-ATQy3MXK3pCJ<3TX=fa|?&&E3a?a0bd=EFY zf}0h0Y)?%Yc7wUmFYfBF+DT=41aDz_c816PqH*X)gJ6y#e-h0i-ye@>;}HsH zqj?yNN4_7-!hs(Jg9!EmFC2J%IG7BFyAU#_=bmJ@`B3h#u*=Qs#6$&X4{7VYEbX}3 zLNZ;#N;ML5f|X)nfoX08TEtaA7LJ97p(a;S)fVVffoTuZCPlQT&J*ZKpbg#) zYc+nGxdeoJxp4R2!$j3=5e4!RpkD+bfAgrYPSw#${+yFn zaupe3uLhwx$wE}|Y)HW%p6R$cQ2iu2&D z-LoW4>nqs`Y8ZbImRKnlK&8JZzeU-$=#>tu-yQ#z)A%!)|IC)?XZhma-W}zqB8-4P zcmJ%S3#bWwwr1spVPqIO=irfD5_(rVddm=uL}Yu-^44q_&rPB#c^!bm=oUs^O)nJx z+gei7>GTE8(~6*+7&6cKhbAUNzpN2uIYqS`%hjuS@n)T?PW2@ll#5N~urKD~w2d!> z?zyFXVR-zB?*KpXM*4tj5u;rqF~$$qLE)2~kXu1SS$* z%a@CqZ>|$@#ET;E)ad$9Y)J_;S;z4aNJ#Z=M6U7(_Kw&Q5T$!`s7MV3?%`k0TpRL@ za%zPn`IoMQCH#HwN-XhRPpv_&$3j5Yv#xN=Vo@7GW`JwoZB%UOyh12uRF>y-U|5Z@ zO7B7)TvcV|qIo5{>ZG_B{Yd@!-Q^KT@4_R1Rw>(@!(KH*ICBmfT8nJ6Wfmz<5asz2Ud3~U>P zS!>Bv#aKk3%&;@T?mI%6V5+h@0>Oz<+c=MbEQPyTQ% zrjF(EsaHuISJbDH7E=@`G-8Q)Cls+u<9;Sb+>ba77MiJfnUjoz3zy_Rk+;f-i>hn8 zlA71vi~m|Q|Ac#>z%O5@3WtxfA!@q&y!VBH@aM2S40JyFE;0HlZW5VRSm7)f+)l5DPMtdOsizM@pvqP zD+@I^kEj$dSEh4X^|qrQ>AW`%#eVJFqD|+dqpLu4jykEVyt3MKMcw}6)ux+2{p}}9 zF<0G6xZ7<$3zh!>v&o{!ZA8n4TMcM6kb7CrR=*$FV53Wz37>xb8B(4orX4uC6Gnh| zH7}E1x~Pgih`))xBAitf2#IZPg(AGJJtxpXhpGi5pz}Rik!;f`)*A$DmCh-6dUg7J zcLoKI6bDNi%Fyc2^qYyfQ_fKhatRsWZ>ghd64m%!6`mCT8|fU`x+4t^;N3O;H2C%vLS16mO*vI6%cM^k*g;F0Y#M>(JFont=uX8t>;{D zE3`_9tmLM~t*-C78PpT?8BL==^|PJCJD90TXMc#jtI+-YH?KzYbDsEY?bKF3!+Fov z$sc6LD`Y>{sef<=_#>umrzASvStg{WW`{0iS$@A|0T2V&%l&I}RNiV{cEbR1?JjZl z?$^$ozTk>>=VUmV9O-XoqV%{7lIomvUW;q?zQ=S0S-9*Rb;Rv^=6m9YHxy;+yLkbZ zXjkOAm&1oOazJCJSH)#cK*nI~D%mJh&EL!os^jw2d(~6h0_e7g5mj%coMtWuR=_nX z5eaydEiy!ZsT7peT<@}Iu{FxMfby=sur}q6O;`tmSc|SX! zYg%}`s-*)EYG6Dz1C+zse2GU z?FucredHxt9A8heLaej_S^N(yiorZ?b8I*Qui#^^{;52r5>8-o$AG19acN3 zYMlMvpr{D!kA37#qA-g5XcT(W*?c}7Ov7LtqQQJH9*$;Hggig!&nMAjFbe$XWHg7c z-w%ePKCDUYun^MfW;TP)b*sHPK-IUoBC*UQHoiZ@Nu;aOa9F*tc(&VAFWa|fH+Aq- zUk?Dg4O{hWt4V)a^#<$-{Q+PLcrCIanoOOj74AUsN<7RQtRLg%XlN2Ff0L;F+ooCw;6; zWXv1oK)GZ>NtkU?l^~@g>yeDh5T})*bb|=2xx*BzazilL%t*A6o$FaNj`h{W0dpKH z8LEqITC;lj=HgsA&fa`~dj0p#Nxw8Rm#PNC8;UY;aSopH7Y+eR?z(p{1G>6SyeV~3 z@9z^)A(t7x!!cT*=QM<|Smw%?cGNKofb!*2tt5KXN%i|t{+d1qz9NKun>)Srr6|Hb z_=*TWqWrCiFR-SffUXO(SM9F6{@)IlbKdS@mAiC>8xzrwTe+*$$u7;f%J}oav_awY zTe!k8uBkJ_6;+&qxqdFTR&lg1(_8X9I?vLKW8xhPM?h1*b|a zGx{;wAAw7eb8^0hvHC%k@5z6u;_|pfdrF`mIbF;-XY#hDz4pbmSzHMxbCRv3$gAuO z3AF9DSTdGw+ZF3FosEpG9eIN>2`Vw zRMP!Ji&W;dWH~&M5zmP@+)A6Ph}MlBm_*i1-wLB)#UlZCN4X0=(mG-yO;SulXN0XP589biaFZe)+Bkq@~Y) zP&R)G?-KyQ&DmwC>fr*hVyB8SwS51)xq2y{ihXSyDs3Z*!EAxpu9aKVTr}ES&K2qC zFR^+t0P~Ejr2bsgG!{>U8{u66@SR99)YnicCxW@YG<#A3a)qomJPX$G_q$X87Ly=~ zCn^1k4^gBTj@HhK^!1$o2^WTIRg}+5>lvWI$#?LF?!0G>r64%!=nyQ|fnchc7K)S;kC}y`^JD%~RZ?w6RPmi4#GC6J< ze3uIN-J*t*K2T?@Hh{bF*1Ea*@AAe{*Svi65{3wdOMoIQZcACqyIgd3IA|3a#2c>GML|apWoWJ_1NPF zoS_%uZpSU>9%WGN4nB&G>Q6qbJ{lZ-wA6QoBD&izSS6_!F=NR zlVCEOplB3~r?b&~G9QoT6Eq*p{n=nVnDzVp*~A-;kvH{c(3=g=a6al!r_-I7$y1Pn z(>MlKc(G&@T*>QSBG47$_9k1SGeIx7%m|;zgRj1PKCh3wI{H|?`lVec8nQK|bAX_h5-5 zbaDVd7cdeY@Lvv|6uxI}0o`GAe{k?uamB$hL-TJsTJRP;tw*xO@y}cU;P9Ab_-@k+ zDeVX|=bH{g@7b~Vo}u`g4rQAd(IrBx1CIZ8aPZ`bsQud&?1F!N^5hA)4q?K1$~tEB z;Nalk19(Ni_n4NLJ(nfxB+_^HaDI8x-Szn(dMsqH?vaak5hP$fs>9~@p0+QaFP|@; WFP{g0{%-&P0RR8EvS4HYBm@9<;48TR literal 0 HcmV?d00001 diff --git a/incubator/jellyseerr/0.0.1/ix_values.yaml b/incubator/jellyseerr/0.0.1/ix_values.yaml new file mode 100644 index 00000000000..af1d5643ffe --- /dev/null +++ b/incubator/jellyseerr/0.0.1/ix_values.yaml @@ -0,0 +1,21 @@ +image: + repository: fallenbagel/jellyseerr + tag: 1.1.0@sha256:23f922ec6fe6ed3fdd486aec95b5a7760b29d03fdfcd9a78367c18f1d92b1638 + pullPolicy: IfNotPresent + +env: + PORT: "{{ .Values.service.main.ports.main.port }}" + # User Defined + JELLYFIN_TYPE: "" + LOG_LEVEL: "info" + +service: + main: + ports: + main: + port: 10241 + +persistence: + config: + enabled: true + mountPath: "/app/config" diff --git a/incubator/jellyseerr/0.0.1/questions.yaml b/incubator/jellyseerr/0.0.1/questions.yaml new file mode 100644 index 00000000000..d130178229b --- /dev/null +++ b/incubator/jellyseerr/0.0.1/questions.yaml @@ -0,0 +1,2433 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + open: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + - variable: controller + group: "Controller" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "Recreate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: arg + label: "arg" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: env + group: "Container Configuration" + label: "Image Environment" + schema: + additional_attrs: true + type: dict + attrs: + - variable: JELLYFIN_TYPE + label: "JELLYFIN_TYPE" + description: "For Emby users set this to emby, otherwise leave it blank" + schema: + type: string + default: "" + enum: + - value: "" + description: "" + - value: "emby" + description: "emby" + - variable: LOG_LEVEL + label: "LOG_LEVEL" + schema: + type: string + default: "info" + enum: + - value: "info" + description: "info" + - value: "debug" + description: "debug" + + - variable: TZ + label: "Timezone" + group: "Container Configuration" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: tty + label: "Enable TTY" + description: "Determines whether containers in a pod runs with TTY enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: stdin + label: "Enable STDIN" + description: "Determines whether containers in a pod runs with stdin enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ipFamilyPolicy + label: "IP Family Policy" + description: "(Advanced) Specify the ip policy" + schema: + show_if: [["type", "!=", "Simple"]] + type: string + default: "SingleStack" + enum: + - value: "SingleStack" + description: "SingleStack" + - value: "PreferDualStack" + description: "PreferDualStack" + - value: "RequireDualStack" + description: "RequireDualStack" + - variable: ipFamilies + label: "(advanced) IP families" + description: "(advanced) The ip families that should be used" + schema: + show_if: [["type", "!=", "Simple"]] + type: list + default: [] + items: + - variable: ipFamily + label: "IP family" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 10241 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 10241 + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: externalInterfaces + description: "Add External Interfaces" + label: "Add external Interfaces" + group: "Networking" + schema: + type: list + items: + - variable: interfaceConfiguration + description: "Interface Configuration" + label: "Interface Configuration" + schema: + type: dict + $ref: + - "normalize/interfaceConfiguration" + attrs: + - variable: hostInterface + description: "Please specify host interface" + label: "Host Interface" + schema: + type: string + required: true + $ref: + - "definitions/interface" + - variable: ipam + description: "Define how IP Address will be managed" + label: "IP Address Management" + schema: + type: dict + required: true + attrs: + - variable: type + description: "Specify type for IPAM" + label: "IPAM Type" + schema: + type: string + required: true + enum: + - value: "dhcp" + description: "Use DHCP" + - value: "static" + description: "Use static IP" + show_subquestions_if: "static" + subquestions: + - variable: staticIPConfigurations + label: "Static IP Addresses" + schema: + type: list + items: + - variable: staticIP + label: "Static IP" + schema: + type: ipaddr + cidr: true + - variable: staticRoutes + label: "Static Routes" + schema: + type: list + items: + - variable: staticRouteConfiguration + label: "Static Route Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: destination + label: "Destination" + schema: + type: ipaddr + cidr: true + required: true + - variable: gateway + label: "Gateway" + schema: + type: ipaddr + cidr: false + required: true + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistence + label: "Integrated Persistent Storage" + description: "Integrated Persistent Storage" + group: "Storage and Persistence" + schema: + additional_attrs: true + type: dict + attrs: + - variable: config + label: "App Config Storage" + description: "Stores the Application Configuration." + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: security + label: "Container Security Settings" + group: "Security and Permissions" + schema: + type: dict + additional_attrs: true + attrs: + - variable: editsecurity + label: "Change PUID / UMASK values" + description: "By enabling this you override default set values." + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: PUID + label: "Process User ID - PUID" + description: "When supported by the container, this sets the User ID running the Application Process. Not supported by all Apps" + schema: + type: int + default: 568 + - variable: UMASK + label: "UMASK" + description: "When supported by the container, this sets the UMASK for tha App. Not supported by all Apps" + schema: + type: string + default: "002" + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: true + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: true + - variable: capabilities + label: "Capabilities" + schema: + additional_attrs: true + type: dict + attrs: + - variable: drop + label: "Drop Capability" + schema: + type: list + default: [] + items: + - variable: dropEntry + label: "" + schema: + type: string + - variable: add + label: "Add Capability" + schema: + type: list + default: [] + items: + - variable: addEntry + label: "" + schema: + type: string + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 568 + - variable: runAsGroup + label: "runAsGroup" + description: "The groupID this App of the user running the application" + schema: + type: int + default: 568 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Minimum Resources Required (request)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + + - variable: autoscaling + group: "Advanced" + label: "(Advanced) Horizontal Pod Autoscaler" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: target + label: "Target" + description: "deployment name, defaults to main deployment" + schema: + type: string + default: "" + - variable: minReplicas + label: "Minimum Replicas" + schema: + type: int + default: 1 + - variable: maxReplicas + label: "Maximum Replicas" + schema: + type: int + default: 5 + - variable: targetCPUUtilizationPercentage + label: "Target CPU Utilization Percentage" + schema: + type: int + default: 80 + - variable: targetMemoryUtilizationPercentage + label: "Target Memory Utilization Percentage" + schema: + type: int + default: 80 + - variable: networkPolicy + group: "Advanced" + label: "(Advanced) Network Policy" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: policyType + label: "Policy Type" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ingress" + description: "Ingress" + - value: "egress" + description: "Egress" + - value: "ingress-egress" + description: "Ingress and Egress" + - variable: egress + label: "Egress" + schema: + type: list + default: [] + items: + - variable: egressEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: to + label: "To" + schema: + type: list + default: [] + items: + - variable: toEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: string + - variable: namespaceSelector + label: "namespaceSelector" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + - variable: ingress + label: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: from + label: "From" + schema: + type: list + default: [] + items: + - variable: fromEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: string + - variable: namespaceSelector + label: "namespaceSelector" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + + + - variable: addons + group: "Addons" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: codeserver + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/incubator/jellyseerr/0.0.1/security.md b/incubator/jellyseerr/0.0.1/security.md new file mode 100644 index 00000000000..f7e4e1e7beb --- /dev/null +++ b/incubator/jellyseerr/0.0.1/security.md @@ -0,0 +1,116 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: jellyseerr/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'hostpatch' of Deployment 'RELEASE-NAME-jellyseerr' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-jellyseerr' of Deployment 'RELEASE-NAME-jellyseerr' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'hostpatch' of Deployment 'RELEASE-NAME-jellyseerr' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-jellyseerr' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-jellyseerr' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-jellyseerr' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-jellyseerr' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'hostpatch' of Deployment 'RELEASE-NAME-jellyseerr' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-jellyseerr' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-jellyseerr' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-jellyseerr' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-jellyseerr' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-jellyseerr' of Deployment 'RELEASE-NAME-jellyseerr' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-jellyseerr' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-jellyseerr' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-jellyseerr' of Deployment 'RELEASE-NAME-jellyseerr' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-jellyseerr' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-jellyseerr' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM |
Expand... HostPath volumes must be forbidden.


Deployment 'RELEASE-NAME-jellyseerr' should not set 'spec.template.volumes.hostPath'
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv023
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-jellyseerr' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + fallenbagel/jellyseerr:1.1.0@sha256:23f922ec6fe6ed3fdd486aec95b5a7760b29d03fdfcd9a78367c18f1d92b1638 + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: fallenbagel/jellyseerr:1.1.0@sha256:23f922ec6fe6ed3fdd486aec95b5a7760b29d03fdfcd9a78367c18f1d92b1638 (alpine 3.15.4) + + +**alpine** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**node-pkg** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| ansi-regex | CVE-2021-3807 | HIGH | 3.0.0 | 3.0.1, 4.1.1, 5.0.1, 6.0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3807
https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908
https://github.com/advisories/GHSA-93q8-gq69-wqmw
https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9
https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311
https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774
https://github.com/chalk/ansi-regex/releases/tag/v6.0.1
https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994
https://linux.oracle.com/cve/CVE-2021-3807.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3807
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| ansi-regex | CVE-2021-3807 | HIGH | 5.0.0 | 3.0.1, 4.1.1, 5.0.1, 6.0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3807
https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908
https://github.com/advisories/GHSA-93q8-gq69-wqmw
https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9
https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311
https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774
https://github.com/chalk/ansi-regex/releases/tag/v6.0.1
https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994
https://linux.oracle.com/cve/CVE-2021-3807.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3807
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| dicer | CVE-2022-24434 | HIGH | 0.2.5 | |
Expand...https://github.com/advisories/GHSA-wm7h-9275-46v2
https://github.com/mscdex/busboy/issues/250
https://github.com/mscdex/dicer/pull/22
https://github.com/mscdex/dicer/pull/22/commits/b7fca2e93e8e9d4439d8acc5c02f5e54a0112dac
https://nvd.nist.gov/vuln/detail/CVE-2022-24434
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2838865
https://snyk.io/vuln/SNYK-JS-DICER-2311764
| +| minimist | CVE-2021-44906 | CRITICAL | 1.2.5 | 1.2.6 |
Expand...https://access.redhat.com/security/cve/CVE-2021-44906
https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip
https://github.com/advisories/GHSA-xvch-5gv4-984h
https://github.com/substack/minimist/blob/master/index.js#L69
https://github.com/substack/minimist/issues/164
https://nvd.nist.gov/vuln/detail/CVE-2021-44906
https://security.snyk.io/vuln/SNYK-JS-MINIMIST-559764
https://snyk.io/vuln/SNYK-JS-MINIMIST-559764
https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068
| +| moment | CVE-2022-24785 | HIGH | 2.29.1 | 2.29.2 |
Expand...https://access.redhat.com/security/cve/CVE-2022-24785
https://github.com/advisories/GHSA-8hfj-j24r-96c4
https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5
https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4
https://nvd.nist.gov/vuln/detail/CVE-2022-24785
https://security.netapp.com/advisory/ntap-20220513-0006/
https://www.tenable.com/security/tns-2022-09
| +| sqlite3 | CVE-2022-21227 | HIGH | 5.0.2 | 5.0.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21227
https://github.com/TryGhost/node-sqlite3/commit/593c9d498be2510d286349134537e3bf89401c4a
https://github.com/TryGhost/node-sqlite3/issues/1440
https://github.com/TryGhost/node-sqlite3/issues/1449
https://github.com/TryGhost/node-sqlite3/security/advisories/GHSA-9qrh-qjmc-5w2p
https://github.com/advisories/GHSA-9qrh-qjmc-5w2p
https://nvd.nist.gov/vuln/detail/CVE-2022-21227
https://security.snyk.io/vuln/SNYK-JS-SQLITE3-2388645
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805470
https://snyk.io/vuln/SNYK-JS-SQLITE3-2388645
| + diff --git a/incubator/jellyseerr/0.0.1/templates/common.yaml b/incubator/jellyseerr/0.0.1/templates/common.yaml new file mode 100644 index 00000000000..a6613c2ce21 --- /dev/null +++ b/incubator/jellyseerr/0.0.1/templates/common.yaml @@ -0,0 +1 @@ +{{ include "common.all" . }} diff --git a/incubator/jellyseerr/0.0.1/values.yaml b/incubator/jellyseerr/0.0.1/values.yaml new file mode 100644 index 00000000000..e69de29bb2d diff --git a/incubator/jellyseerr/item.yaml b/incubator/jellyseerr/item.yaml new file mode 100644 index 00000000000..88bb10102bd --- /dev/null +++ b/incubator/jellyseerr/item.yaml @@ -0,0 +1,4 @@ +icon_url: https://truecharts.org/_static/img/appicons/jellyseerr.png +categories: +- media +