From 24ae6042749355cb4dcf6aa6c04258910017c709 Mon Sep 17 00:00:00 2001 From: TrueCharts-Bot Date: Sat, 22 Jan 2022 20:56:58 +0000 Subject: [PATCH] Commit new App releases for TrueCharts Signed-off-by: TrueCharts-Bot --- .../airdcpp-webclient/0.0.1/CHANGELOG.md | 10 + incubator/airdcpp-webclient/0.0.1/CONFIG.md | 8 + incubator/airdcpp-webclient/0.0.1/Chart.lock | 6 + incubator/airdcpp-webclient/0.0.1/Chart.yaml | 31 + incubator/airdcpp-webclient/0.0.1/README.md | 39 + .../airdcpp-webclient/0.0.1/app-readme.md | 3 + .../0.0.1/charts/common-8.13.1.tgz | Bin 0 -> 40150 bytes .../airdcpp-webclient/0.0.1/helm-values.md | 35 + .../airdcpp-webclient/0.0.1/ix_values.yaml | 38 + .../airdcpp-webclient/0.0.1/questions.yaml | 2788 +++++++++++++++++ incubator/airdcpp-webclient/0.0.1/security.md | 71 + .../0.0.1/templates/common.yaml | 1 + incubator/airdcpp-webclient/0.0.1/values.yaml | 0 incubator/airdcpp-webclient/item.yaml | 4 + 14 files changed, 3034 insertions(+) create mode 100644 incubator/airdcpp-webclient/0.0.1/CHANGELOG.md create mode 100644 incubator/airdcpp-webclient/0.0.1/CONFIG.md create mode 100644 incubator/airdcpp-webclient/0.0.1/Chart.lock create mode 100644 incubator/airdcpp-webclient/0.0.1/Chart.yaml create mode 100644 incubator/airdcpp-webclient/0.0.1/README.md create mode 100644 incubator/airdcpp-webclient/0.0.1/app-readme.md create mode 100644 incubator/airdcpp-webclient/0.0.1/charts/common-8.13.1.tgz create mode 100644 incubator/airdcpp-webclient/0.0.1/helm-values.md create mode 100644 incubator/airdcpp-webclient/0.0.1/ix_values.yaml create mode 100644 incubator/airdcpp-webclient/0.0.1/questions.yaml create mode 100644 incubator/airdcpp-webclient/0.0.1/security.md create mode 100644 incubator/airdcpp-webclient/0.0.1/templates/common.yaml create mode 100644 incubator/airdcpp-webclient/0.0.1/values.yaml create mode 100644 incubator/airdcpp-webclient/item.yaml diff --git a/incubator/airdcpp-webclient/0.0.1/CHANGELOG.md b/incubator/airdcpp-webclient/0.0.1/CHANGELOG.md new file mode 100644 index 00000000000..5684ecd5662 --- /dev/null +++ b/incubator/airdcpp-webclient/0.0.1/CHANGELOG.md @@ -0,0 +1,10 @@ +# Changelog
+ + + +### airdcpp-webclient-0.0.1 (2022-01-22) + +#### Feat + +* Add airdcpp-webclient ([#1752](https://github.com/truecharts/apps/issues/1752)) + diff --git a/incubator/airdcpp-webclient/0.0.1/CONFIG.md b/incubator/airdcpp-webclient/0.0.1/CONFIG.md new file mode 100644 index 00000000000..fc9b2fa2d5f --- /dev/null +++ b/incubator/airdcpp-webclient/0.0.1/CONFIG.md @@ -0,0 +1,8 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our "Linking Apps Internally" quick-start guide: +https://truecharts.org/manual/Quick-Start%20Guides/14-linking-apps/ + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/incubator/airdcpp-webclient/0.0.1/Chart.lock b/incubator/airdcpp-webclient/0.0.1/Chart.lock new file mode 100644 index 00000000000..5a67b7cfa64 --- /dev/null +++ b/incubator/airdcpp-webclient/0.0.1/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.13.1 +digest: sha256:5d8b49b1fb2103e55ad00efd7d0bc401dd47a5946249994d7ba63e2ce3aeb0b8 +generated: "2022-01-22T20:53:30.701467674Z" diff --git a/incubator/airdcpp-webclient/0.0.1/Chart.yaml b/incubator/airdcpp-webclient/0.0.1/Chart.yaml new file mode 100644 index 00000000000..d700c789074 --- /dev/null +++ b/incubator/airdcpp-webclient/0.0.1/Chart.yaml @@ -0,0 +1,31 @@ +apiVersion: v2 +appVersion: "2.11.2" +dependencies: +- name: common + repository: https://truecharts.org + version: 8.13.1 +deprecated: false +description: AirDC++ Web Client is a locally installed application, which is designed for flexible sharing of files or directories within groups of people in a local network or over internet. +home: https://github.com/truecharts/apps/tree/master/charts/stable/airdcpp-webclient +icon: https://truecharts.org/_static/img/appicons/airdcpp-webclient-icon.png +keywords: +- DC++ +- dcpp +- airdcpp +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: airdcpp-webclient +sources: +- https://airdcpp-web.github.io/ +- https://github.com/airdcpp-web/airdcpp-webclient +- https://hub.docker.com/r/gangefors/airdcpp-webclient +type: application +version: 0.0.1 +annotations: + truecharts.org/catagories: | + - media + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/incubator/airdcpp-webclient/0.0.1/README.md b/incubator/airdcpp-webclient/0.0.1/README.md new file mode 100644 index 00000000000..6b70b6254a7 --- /dev/null +++ b/incubator/airdcpp-webclient/0.0.1/README.md @@ -0,0 +1,39 @@ +# Introduction + +AirDC++ Web Client is a locally installed application, which is designed for flexible sharing of files or directories within groups of people in a local network or over internet. + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://truecharts.org | common | 8.13.1 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/03-Installing-an-App/). + +## Uninstalling the Chart + +To remove this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/07-Deleting-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Open-Apps/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/incubator/airdcpp-webclient/0.0.1/app-readme.md b/incubator/airdcpp-webclient/0.0.1/app-readme.md new file mode 100644 index 00000000000..3a4fcebe738 --- /dev/null +++ b/incubator/airdcpp-webclient/0.0.1/app-readme.md @@ -0,0 +1,3 @@ +AirDC++ Web Client is a locally installed application, which is designed for flexible sharing of files or directories within groups of people in a local network or over internet. + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/incubator/airdcpp-webclient/0.0.1/charts/common-8.13.1.tgz b/incubator/airdcpp-webclient/0.0.1/charts/common-8.13.1.tgz new file mode 100644 index 0000000000000000000000000000000000000000..4ef8fa8338cacde4482dd452cd0ecfa212769f58 GIT binary patch literal 40150 zcmV)eK&HPRiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYcciT9UI68mpQ{cy>Z`-}m)3TgsH*?qRq`Pw_aeQJYefKvz zCxJ*v!k8l21SCh3&Ue2D?*~Cj@~auU{UCwDWr(dR)R=e;)3#bKP@YdcZTVFIqAgtqD#vqig}qXEDF-4B|_Z=Bovih`CgD>3&*S>1p=-h zg(c|-P)mZ!IL|1`D2KZ29*u^*-qGP<>k_T6@-iXgRvVbcT5W}Co4;tafo$e-IYGLs z-~RP^ztbOedhOn~tp&sxg*Zbc2Zk09r(=M#Y5v~^a3?QkEdVme`fCjU0LwBp=zA4J zaftz47ig@|YpoP6PdojCPQP_e^Do!`3Z_d$?uY?2uK#}Tus7=Y>;I_#u>SAmc?8;R z@U}qNhqF^a3KZihjzOGfQ#@OikgfIBBkbbpzyziFRVy!0wkon$3phjL z762U9Ift50OAy*i~`IGwg4zmkrPbway&M-|-g3w_%q^hV1HI~ZdYwUU(CGav~S$uF5qv3RTbU2zk zL#Wq37)+lgPluy}{z0>Gsh?04p(_Keb)vF&}4SCDaRpmFs zs%I95y~E^Sc+f-1QQS|42UC>vpC*%}-#l@ZMx{FnkKp!7v`7qv5l|VH`h$ zPY;6}qT2jUR1DJsXK2@v7Paa}`B*^Ra)1T2O>mrHJ?Qi;)-dcnJ3M$cgp&zG&w5Ab z*>KXIGPa8b2^z)2>7dt#hm&VVz2V`}!C-h0!>4G{A0?BgaWXlIH#WT++sz4`m5BVZ zJLAFQkWcxq=`u~3G9p!&x3aVYg_T1Y#U{E&>f?&f1*iUOuIb@=xWFvSVTxnfEHEE$4D zny(iqqfbBr(IU?Xq988;p^&2KG9`%Z4MOiSg`JU065d0Y0+?kvg#vn>aXd_&t_8BI z+iC&3)@w}Y82tSo0=`rgNxndG;2!}1xZWk+@;_}{ZjQkieEC|_yA)1Px(irQ;ii4M zX0vujPM3=bDj6Xsh~N?>pvV&A}ULQ6=|Y|V@QkeA?vMut3L zeZYz6iJ+}_C@vAC2<%CYwGUvHfOmPC;%xT5NFbGT$zYw!-khT#u(#O@lp>0%APjf` z>;)eR1_t0+mX~blV8XsB{MphfZ4m5*)qOL@UP}x387wonf;eSMkJqw(?*fJ_%b5Vc z|MIF@Q|r|&U`Z820p^$H7VpH2G9V>dVS@7v%rRjc9;A4IDW7%m;V1F_HG4e<2dx%% zwhqBm%?{yi7j7xT`Q7)mELm=Ne6s@QC`B>NO90a}zapFgBS_Yu!0{!{W&nZ&Pp7Cf zierLf`UK!bk(U%^RP$`kPQj1wUy05r$YT)k-%(38teCK*^~C~a$sXC)aMUKtmH{_x zwPYc_lmjqeIU^0V*=MWjagvA{IMXZ!&|E=U@-+q6^iS3bTBr30oRxS1OPsC)9Y&vN z36I@&)M_qxy*1#&m1+~@>G8P$&=Mc~O=pHOBm@t&3rYY&C|SV5-iO2B&amGXm!u!YT$ropNNylI`8d(F{ zyyF#l(kk-gIIyb)_SW12ITaXRAQA~*< zC;3XR7Jr2T4bx(>C(=B?ZDv<_c_{=eEgx`A9*f~h;!1I!piUV;)W*m%hL zz}rI3pxnZr03`pFFWTZa6G(Z*3$ER=wHt(vlw^?N7;~{jyb)s7mQ`famT2~#2+af} zxI{5c*8oxqx@oNWth;YNhLZDUEb%HZR}H2?2Btxy((Ft-rF}24!)%F4)30 zLj4o5|L}d1i=tDeu`>OPDVUEq8D#58o~#7|Fpe2z$)#hRL4zqyQKu!4)yn_b@%j1B zZ{NKbgT=bdNaQLn6WQH2kV{7^T;>_qQnh5>0T*&-Gt$!|aK6qc{H)AJFJ8VmdwqQI^5ci&*Y97BK@{kwsL8~DI@~$ldzMbK&oO$D zUu9RYOu+HkD^{6tXXO%cxtyRfLllt?&bvt-lP-nil5}y#wu5#8DQv@n%a3ewy4I|= z)vUJB=OQPlUF1m{XVbh~h_bAg9~f$UB2-^b-@bVH@$~r3OSQ(P7^TTOG&O6Ezd7Uj z8(RmREKd*{g;q<=s!}e5w)h4XyuPTd{5sf|_5v1dsdu#HdaD!_uXV9DI1%b!QR2MB zbPeJZ5}|?{V*zD5DJSlUFdCD1j*=yl?Nz-KR_&BG0UiOeCKN5&tS{}j#9U8Q%7QRX z$Tjb%pc*R2wWWV*u<+`VO>R4Z*$kEWlC%vXb^i*unU;!@?AWSsiyb4i}WJK+iIrt{N{OHTM&njv!6mN=xuBsWnIaNNNS* zfKBbZ1i><%BU=yTVHE}1VW!HHJketiFm&5UcR5^L_ns>Ws`Df2>(F-&YLoe_|^ zxlFbWWb;~1J`+Zaa~C^qDqd#C!pa}eJ_Abxq8%!3E#`E2ShT3IRPaD@P7+~O(&mxv2>7jxvpV4sArkSKeU zaBnITRCd5mD7B;#5F7gMv|J=>dScn`;;lOrs?^l4CM*rCAg*U+K0%d3>2`Y?{v(7I zRab~28ei*uidQIOiW(zS%>N=3mULOP3)Vd8?l*ZLO_XNPZiCkn6et3Cvoc{Q04N-+ zlbM(1BsO)xwuC6_9>+T8X+o*^#6Epun;zScuP~W&rYL8Boi9s1NecLxhAmj0S$`5X zL6j(GqzU5M7Pw-v0Mj-+E4e|`?Q?W-au&6WvUYKDW*T@k1rYpnad9SFz(lZerNi^( z%D#8mf6n!Ov@g0`Ksr}-LQQugd5XnkNcBtG^4PctAyW}GvGp(iti>6%js*2;DrKJ( z#Z2+~q(+j@#1nz0Xk(tI2~iN`slD2Vg0Sl-2XM^CQXb%tVEO{3aD9&AJWI$J^n3Da zflACb9q&EG3zRRZ{%|PYPa#g1CAyfGh%kiN7jyKNKzuD)*UKzS?E3SaP`ifyK<>Mc zyE|;ROz&afzc+$E7kk3a>&XVEZ}FnSS}b=huWhQxxKr!>QOl_gBG zMPQy^ZQl`dim8mkNu4|0C#Fq(;x>;@KfpAd!1(eaf1S_B+w5go=H;i~Xc&~!jcojd zWRn1AhSJ124ag7@bf?AwfmsP-G+n0Y`kt`oxbs%eD*J`6KU%tvVpBUEei3E7klqj> z{d5E1;{Xa$r-Df$?EMT)>B*#3IHpPxyuc|el|}zsMv~tuFdMNRbKe1+Rra##v7M|D z*wRehH}Fy&fmlvM>L7iO?-4i?n+AEpwj*wNr*Ws#*|(T8KgnP_#6tMr!3^{jm?xH9 zlAo32S-Li#c`aC8qJ-(Y5(NQT{-|K>`1c4y>2f;7p9Ofew~494#2E=OO5#HC<`L7$9(|LZl; zx|SDgeU~JthTf!(PeEmyv|vfgCwChI)~SkQ4Vy#?R?Q5M)nm)e9T)PLx?@vOHcQbt zh4JMRaK>5fizQ6ui+7?k`VEJRiyzdIM?K{V#I41Yz>ojsDp#ZxI?+Alb3Ytm1SIu^@HYdo_4Hn=gWe_unxyRF)icM z6Y=jk`{Ux|Oo~zOUz~lis|$sMeUhq40k1LunSNtDzOn?&5H) zbIM}%ULZW?(7i5cGp*t9-0_Zg)zkgN5u~#n@Lr2k>p23}F$@3FacB3F0sV>1n7j^z z5~T}>XnE1}BX1^Fzg-Ot%ki9J#`J@nG&TMRNk^<^D2D@|cKu84)w zp@%W=%~Bz^)z@<{@!4Wr61XS*{rw*;tJPXzRhHRCS~W#)Cay|2_2Q~>f7)JLRYTyg zQ|)2a$V-(k_YLJ$?LHRfrK*)Xmsj=RHVLfy^f*_yUSOu3jKBgXNqPlKWRK?$_%ll0 zurG*zs^H0KJD-Z$qKx7(w1jAiFYPavPl-71E?|t56E9rSTzlI~$ig?40GL@~qj9gY zVKOEFivltIl)-1eWz(iD?G0sWijT5Ab7w-2t8<{NaW(5=kD!9P{q8&HFdXwG1>BQH zx)>}}>nKawOCop0sXw-oqqNyt#94a+368Cyw$|jIV$>HlS*Ziy->0ggwi0*iP>YT` z6^%hQ!`bJWqBJFK7<2b;wt%8Pxbkz$YLilm<$!W;t8EzFBc;X=+b4$y9eO6T4GW<5 zvx@jc$tigB$lDp`IiY4(w09W(#Vk^R`cFCGcWF3M?wPsTFS*yPCI5&^NPNF-OZUD` zn#V9TGK-H?0qNWz#Q+#-lzlS#hr#R&(s>7LhZ4}1_^$I#SVZ|=kud3%33yh7C-B$j zpx@~a+r0`T;V*s0Z$~>HEu&PWCADce#wfA-X;Yyg1=frQML4`|4Veqb+d;O}7f+nJ zczy1ZO9yrhRbro_TXT_=&g z$Xttn+&xO4fw+5Gj7o~9+}f>~4B)q#PEbjmvn-eVwLf);h<$OhV6;Lg8{q~)_`UT0 zlDBMNX0sL62PB-O*fuAyXK)tzGNWvheSiKvNRaSozmZgJVOy1~MGLip^>#hIE9AV^ zgBWTj+b!gNtL$|Je*xlKknx!82`rl^?Z#BLvSDm+^UetuZOzCa`xdwlKh|0?yWnW>V@U?w@$>X zPLg%_Q8_0aGfFH{boSxoiTv}YvnQZf#ZLfQ6my8erRl{!{nA7&;&G=|?(8A4T=QetIH{O0RZS^4s>ea`z;5OOqva zSBZH4hG8Tc51cmqCucCU_X%ks={Myn$G!Mj+7t)a)wtZ14Q&nbgEi^nQ_xCO2D3l#y%%a0Xkcz z=@XFU4kRv)a`zg3%*ocyJlB?rP;W$=HVmOgwQW+D-ZocIT%s<~lHcn9=rbmqLgN(T z#S=5>(!EB1XA95KPOOt2Rp^Al;Ek{IW!dH+EgarUQ(l~B|5O2Wx$)wY1K?A~x|j|D zSx(x*St%omEVWLMm<6kBCUIiI!MgWnRFU^pAJg;xWH6 z@g}z;N+||OJ<@$+OpLh{>A9RNZu>3r1nDJYjPMibS|+DY%xi+m|099!WE>YTx(36x zz>uiBA8m#O5vFmdyEX>z5KMk9F-32g=xVxuF-HIj=9o`4j;a@I<3Yq6CDe`$!T&;I z@a);MAF&25j0!ndVgyApCM&LSd^iEiBG14l9&BWpvB`yL`bjb_R?xo(f1>pgwfQK@ zV3RS2C6ia^6+#(+sqL2EvPOBALDnP7+e>h{-|Vl*P)NqE$fFfFvH2;?eXidXl>-Ku z1xoOeTQ4IKIU+K<83c4uObOU~cl@S3f$=4qCw)<5U#%DkRD08jDOP~lOtZQ~pZUl= ziGSy-N;K@U8h$8sj{k+k$M1RTAH;}#0#gJjTP8CZuR)H-6V9Pxn5n(f9M$1}iS@VO z;DGFnoB~5*G71uS1p0!~{t%?Gf@PY|$TewW1PSE?Vm zcF@e#S$>sdg$wF$NV&q|vjqVw)6h)`SoHYz$ymXCAm-nUnB^@fL&LR}W?rzpP(kb( z$j-7X{(((>R)6o#;P--?sf0;R%)|!?vOqDn^4!1{p?Hh1If!4Z1I{^$whoW=E1)c0 z!ay+`^sG<93cpylRnU+cx>Cnh+mMzjt4>Qd(U)_|RP~OuOlSrTVT5NCVy21L7avY# zw@g5tKQR5?HTec-Tpq1&o^Bb4XuG)KU840EED0+0;SY67y7Tp4VKEFg)WAI-%qiBZ8 zzjE?W75~Q8>VFYh;%p|qT+LDTJ|mD~GUcJSyzl%-+)Uel2~Pc2FSHNkgFy3C-Z&w* zFlQVlpC1F4kAZH)3pdK-^Wzjlg0$m{l-f{6ODx`Y5skaTpN)-HQ82du>P$I8ib5&^ z-K|6(gGths2()R=X%Nx4&2eZmj>rFOLxFjBzh(79&nqshsGj{!ztK^E zHDmm3hlgxpGa~lgxLA(Cu-EG?q;YYtHQn-WXsB|pFELKD2b7D=y;-YOy(u9^E2uMMzWxN z7pFOorzlr{TU0h^bWd?`kf4lWC_JcSTt#KqVU3+T7wY+{Yr}mFg9)NEpjR^loWj`x2KyZR$Xr+m;tXfYR{c9=8qU~Rjmk7yT>dkuu9QWJX>6F0p0YQ! zxm83&I8SgX(jr){Vree#(9;|grD(*N3Um|t1Ka=SD05M!GA}+bnQFM(sBp1_MWF)Fie;fL zVluWWEJ7;1#c{;3ybCdcJe*TnjwB%J-0<(Xfp&HiC&?yCY(w zPjViAU#&AHG;;S?uG`5rFA>wyFA-sM6f+S{g$uD-7p?g?yi|^^(k>_$BzqI?jfgBP zWP0?u;Avv8GW!-HPpRg?2zAsEYg-6d+U%Qb56W|nsc z7sxC#V(L0gH);d-WLfRdomb9KcfImjd+Al(=G;vt(~0AaKxSmJG@l8x51HdahZjim zOT2@i)+{fn_M4<7jpMeW64+i+(y)VK(lw5mT%iWP-rn zzkAJk{W`zI`~xEn*V*Di-zw*{Gt<|{gajaKxv*s~(p=pR(wD}iki#l;zw599L493z z+)9?v+ihLwl>gScDDx#F0scDEIYM~Cjw?*(T;@2-lUrLG3Wuh(q4B&6H9`Zw&BdXC zUTbma+IMSXc=V_xqvH~D^d^D>^Sd`pC=*RG45r+Kn^6_iB|!zsn8=0^VW4EL0+S(L z7g+C{P(PU9Q{6h!(pNHxOO%jE(R}P?KH)KhU?$QU3ue#hD$6O7S2EwfdwnjGR9ZU% zn}QeLGvZyAsdeD?4keiE-mQ{V+pb5v=>2wT!RR`f?A|R|al4Mm!uQp+zdSsDsz>Z( zU7bFq`_Uv2KFbr6KDa}R^qOt-dcEFgIOPBKdOiQ&!NKV8Fa2Tvs6XrtdcDKH^aj1b zLH{qHcguYZK1)Jj`Ip{}+wwd22YJ4H>3-MZJCzRgz!fKXIy*_1s3@__Nk2EarHfod z<`TpqJ-TEpBv_gp$tKaTD>HRk-*vx!ZGHKoy_zCXpffLE1lnJjkifp;Dd>C(!))eaX_LaYWZMEC&7A&w-x5mK2uDcpc z5QY8LCC-vDs99011)@;6B`HtNFJDY2IC@gA)QI|+iSG=fUqOc1E zcQW5001nngLAtBHJYi$le)&?Z* zsJ;YX=NqpBV9Hnk4kQ3XOB~z7945Nv6y|C;+S0W2P9EqhWkUWms=dq_SuFJ%(ZKNv zm2ifvMmCJ@CX85@P?p#~8++K0eEpi8T$p=MH|XaUcsX5FKiZPhsK0+}ru#d3s{21o z(;Mvdp=ZPX-#Z-i-2J~l>>obt|M&9n{a+?erscZG)m~rSvW1DCn=RWNUTA0JFqasbu8s@4B|k;O$>L z`KjEn0&q*TkOv$}jA?|%l<9LD;vbo{RM)@0rEzOqV8ieZ77>QAG`lxwQD+munZ}|iZa1q!`a7@`O>gn^F-1mmiXN>$@%$}17 zJZ_ZBEV1kl$U6TNPnG}c_!X}ih%r`f%t*8pz*V)>L)HOC4aMIzGH2)vCNb6x~ z-e@}`)Cizfk&e1l6hyNLNjns%g-1P}7M9AmR3Z_2?8a~FaJyPBV*$TRLuF;^}V5p?XlfWcC2nl!g1onR&miM*(IY-9`e?g&#zKKY<8PhK_HXn)2vIqw$!~5>hl< zGksPm<Tr z1S@{IPgm!e&)Fif7SP@|WIr-Z>{rGa==y?6#i`4eFBV!`kYi~h4t%o&9|QDDQ&0Eu z5_HJ2oFULzW^e^@3MVPjL*O(p4u}+1CDZ-_etvJ>i^*@0BV33A8ynU+d$R?Uz;T!v z?FV7>K^Xlv5=N`?pYn3Qy)(d#^4~$l{?j`gJ;;Ce@o?j|ZU28I?@}~c|3RG)CyA%o z^luV%ZfW^f_d6`Rzk20a{T1=n*!<;Z%i^!#gzWu^iYQgJ%WWnM%#b;dd7b}eQtZ(8vadn;I=HMld;jyPrzfET2tT;A+54_ zJOv${?#uot`{f*=jGu!&paijRR_$+A5r}9iI+dW$z#Zob?QA-h3AI^ilDFCfaU({a z+*6rBGln5zXu^E+5fCcrPkEZ4GP2qU4x3L1sH7cnZ_qmX33jPT2n(MNwIr{i%QCBk zob%J=%Gh%o_>@_GhV?v_yyKPTQcS~O19J`b)ZUFhnW?EDA=bF-wy4&4WyNz~B_d2I z8b1e7v<>dnHa+Y))0;!`H?%etBQ=Ekrgv&GyxvKKo_qXiV^7q{sjTlfZfcm9XiWlL z_*LE}o>-R?ep(p>128Txv^51~a4-Z3QTjkI%o68$vmDe<1$Qb-Rk~={354*eDLPiaMUn;oQ0W48&H#MLze*#Qf z+ij9HOUY7{kiJE4B!SJf+JNSUE@Um5+qCyM6EXz9rsjOW#ia7VV2q3J(>%Vc{m_YV zQUXtjD<eGIE>)i(jf z6LfUudd&#-!Jd$k*zoLEI+~ZkY8`9oa}ae!UVbhZL2zrKuMYCb_h+O6M~|c$`etNo zT_a$I)l9D$N`NEw2Nvw=&~HM|9*7E#*2irTwc+iK?KMcp-aWP=8mmH;Tq+-3Lh&JT zQqeEHO;V$8v5IzWAxA$}lU9f8w$xNt{|0o_I6^y7P$Q(+w8{ea8e{w2hOX&P9itLrop+aTs7b21677z7aDv$SV4Kh^=CYHWv^A82g{)Kt~&QByTGp!WR|r-``{xPV17S)1!}oq8fR zK+O&7=4;BU*uC;xy%o&^a~{WWzRajsb{cXc3=NcH`Sfx*fyi^}wWJ3R8M|O*6hx(v zskPdmbB(B>JyY%`%~`psBGBBTQ?#*72TZ+VsgI2CC9Oeq-#=*Qgj1p43fAQW#&vXA zDa=FnY*|)P-`3@|wZE3rTQn;}7aJBBXkIueRG|e{b^Vg%(jrW2v8o;#xd&mD&fm8@ z7?A%~@%_gC=nr~FmG~b=5BLA?<*D5NKQrOzW%g5^PVc(W0QfExb_Og~@kR$gsK5G&=kzU^Oa$#?S-u49{2-p$@#R!dQ!-EDpU#K=1A%vZJj!{IM~Do^S^=2PYW zY{$Rd4Pev#|HHw+=l=)&2mXIA&rb0lVVYX|!v~XW^;Rze3XwD5BE%`v^9-`RfcST~ zq&!R|zu97W0|^%*neO3To}%B;#X*j^du8y;4K57UwXpMjzY4dm!sMAy*=PQTI)bZr zMUnuSe0;O%`yOWr&Snp@xLY%2o+23t6c+f$GG7)ABi~X%LG5+3vrF7kFo!Weaux8- z9oqv(asyD;T5)PmBQOVY;#l+@N)aTebE;lfM31_`Rk)fmfpHzwN-}>u&*AF+FEr!Z zlmIsD|GmTB$lw1*M}vp`|2`hM|08f7$k{J9@%pV=Sy2L;vF6zV@NdJX#ck=g1^i`+ zsvDTJ5-}FVQ((W4=rt|-Kb!gzTK}BU-rxPt!LaAc|A)Qd!}`CMr(*w6>3pwg@6l%6 zrVF4dP1v^gKUHor%L1fcxz-<5vhIGB{A}576rAhCdsKC6qCJ{BqE55h-w{=v+4hd8 z+q*l852+{EZEjmLk*OY(fy3;zC8<>3{8Q)B#39yAMA>xP?_81OrptZ}wCG><+dzz! z%YGV%JG$#8hWqXJ7U6hV-|)>Zg0~aMSNPPwoB>g`#yEV!$T(|EO~QGa3#a z;(y)CW6A%ve!a6E;JOl2ZFg>oj)1s9Z*WWmLH$AP&XujRqDbu5VUpcE*Gj;c;5AaQ z*#vDpTLs>_Wd$U#{*9l)E$ILo*8lKe(D&v4qv6B--+Otk5&!R863A^w0CpT?WRb@! zEvn09Tkher z4}Jx|EOR>ys7c%AfaY0=oh%IfA_mdUf0O8cgka2McAh6O^#ieHodZH8AU+noEYa%(2w1yp|@N7?$i z-+|+zVEjO+AEqZJ%e^$=!zAG%2ux4ZCmrtbi_8)wYXtJb`uKKqX|a1v%Y4DNNaq@g z1=F!_YJ0HN(<*WiZ?tU>QUzeeu-g3&ypp(!LyaQM*MCE6dFU&xu4qxvwbOffLb^@Y zJ(woLuCa!DKKTZI)oC=;18YuYJ+Y;$xfH+L>60aP>VWWTJJ<1)Yi3b`Zk|HhQCVJw zxkPJym?9}R0ue2jC<4(UUuN_S(s=};Hhax8?MCsE(0mbrXl3ChG1zY!vZT5Olr`TP zrpDD(cZv}{P}>NnX26;cuOgo(1OQz3ylTtSs%optEZFXDv!Mb~Y&#ou0VKZ!!`p6z zQ#Y86;btqdAt7|X11}Io<%02aep5~4es<1D{~vy*+8mb(GFrvTj$?&UwVT<-!rS&h zp0S3up-FM)+y20DwBbqJ;^PzWc%Bn##}1az*=tgJ#m3Me^8YzH8u{{n z@907Pzn4d!|2ZN8PEZUzahV7GB&cjW2yBvw*)o?Y@AdZ{kI`1&;xFwd50DuOS^Egk(;Ns-017*VsE6ES9M69iFm)am|x4C4%{=5;Yk!-0JfDEhq0++UpuNyfxLMp`%h)*7CLO1m;nMZK_9hhN)5Gwk`KPBxp3;w)DC788#%T^*V7Vpj5aq z=$3g-yB$L2U7UO@2^4nlZ|o0sF9ASL@Zd4k4Za5!R{07VPAx3$3~ zT5EY#m^X`%2>W2w`=dQ|{9lE-yRq?a3;sVER^p+S(HU83TELw``=j z!)G)9*PXidWsnX0zjt&Pu>U;V|G1Z@&i~7ft9zf$UnazEz3W#caBtZ0OLyT;yuL!) z+#UOTnXzf~_}WPruUr2r3Nx4gWUSM>lK+OoentNuKIH$tmq*KgI>xt{?;UNvI?T5f z%({L7hk}CFnru%v#5b_G{ynX>YS6LS?qso5?P}E5aFLF|ui`|9EAC1HoKsqSOu5(J z$AX_GKI=X0$&a(Lh~1Ck3zv26`yf-CBGJh%T@+pYoi`l5J?4*YnqOii55*})na=pL zEYq=*&Bwp05tpz)a_LuYSk$*SBj&EdKl8~)Jxd+$Y6FE7$1Z%HXOKILc^4egJcj8! zCse=nue|`)Sg0NLeEe8II{)}l>Kg0^R~Txp5d52&Ft+0VcdP#o237rkIC|j!_wrQv z|4sFOdn>5w|C$pA^ndkjgZ}Rp+eZI)Yur%(-$ALj_PIZzQm;wkwv>8%Jnmkp-{5tl zk=fekMr>CdwlhEPA{rYe=|}}p#j!ZcOHD*`%zhbX0>S z@&aWdv+1=HqZ$w(ETHJdu5gKFOIY40533C%&|qsTiDOk{O4bNqB0l|qQyJ;{-__jx z@OV!X|Ch_4`%#eTo$3GmqoFVV4Gtdif8EPd$N$xJATjkoZ30k-u<%ss6cY;aX;8Ip z!7Sl5Vc>QV)Lzij&+6@J~@o%MZk!@xeOujICa`8@13 zzprO2{(rae9}bR2KL79chY$Myy*!ospEo`J4RA?w`YS(%4u9pR4QIbjscnvaoeDP# z_OOHFw|aB_Kj$CcynXTh^~)VjjoIk^F%OIx{oK}Bu^ffFKPIj@WMJ)I;xs+K!Ze<{ zt^M%o-OHbkU%$3ni{73_R*`pa-(S4^*mp|wj|QFosMG88y8S^EPIN5>vxX=>3unAj zkwcz*e08=Ox|oS(zkK21mW*OM2#rh4lH^!wKt{dy|RORyJ0PqE!4K_y@A`_1JF zNXS)QCSqhzw)&yW7s6LT$Z;}BDA=5t)3eDc9&aIE^@p&$9&A4yW6iypb|DXGL>g<0%tGT}w3!r2f&3wZ; z1_@jD3{E$+?`e}=#XZu)#Ig15-+_hC>hsojx^8v;w_N`>vH)$e|BMd&{l7mvc<}$f zmq+jaW^vur0u)?5#s;K6hpa&Q;|4pBS8f|ikXL0FThQU?sb>umZ*FW4GD^w$%d_Km z#}{wkITnNej2=uzRg=*l(q{CxSFc~6|NQFWhhc@Bs_?zB|MT0Swj8^WH+EZ(%4TA| zYxB&l*k%xoErH}}*86v|(%jusk^f}4|J%6tubxf*A4dm=p8wxbum7O`-OJOM{}p=K zUty}8@ZZ4VR&&3qBokiv0LgNv%QRK_K{nf<+y0$~H?UB(4JfNrCC6;Xy~JSTDVY(! z6V7vCU&*(>cdB%m60h+6%l+N}&*ER# z4dUQ6#=+iBW?hB1pH8=qBX7v3tH9l25?wJEl@{1*Qv1kf~5zX>b}&SoNC_{s6>m*B_u zuQs#)D$N;>aPO=Z^X4s{jX%Gv)D~=KS@MMmLL4f(d`dcThC6W%ZR{`td*dqr?6~{Lg!Nc9#EM$;5GYA^qtTW49suNnkrles*5G8_RuulD*%7 z)Mt-MRpzt5ZXxkm2tF=KynyBUT;}>4KL<1G3`C^>tQ@%L1T~_%cg*rw#-%qX z%NzdO{)Y9b4$6K-_SQ@We@4k0oFpl_f~DXHQ5ZLIgZl@+f?Btpl;QyvS>gqtN}CRo zU@baH=sEN%qR$=6;}gIM^1nGvR?7N=SHUj2TuxA#A&N*`CK1?oaWdBZEz!}a+_Yh% zhq*eLH;s$B8T6-R5uB05j+3$2ZXOm*Q?R(f=-0PjJMcR+R~>VY(*~x0pS@i;FElIN zG+tqft-{h{!Dgjt5j8YOLXGWL`s*tT0iUEG8#Hw!BNPgS6rE~JAokw-yEA}P%o`Cc zA)4Y#-Dg8hOp7Y>CFN=TXt^$OoKX^4uCK)UV5gP4LKA)vt4{y6ZN{2s*^E8&l~c-Q zOU@3a8>P%O=Y~IZLx6bI)?|%;Wvvwt_rk19aaGjd#(bP%}U9Ad08}KB?Ca|Uj zL|2xHjtwCJ9ypB_Y_uM`qa9!;HcvG$NeokTf>ioM04n)SJoaY)zbCjxG!-e18N-h7 z=NR!E%Av-Ly8aHWFk7%eu8XIjW6-HZkq?1YP7g+yu?A*T|0tKKIXIFtunG*nm@(5j z&rKbeggK>!nO2^E+76#;9f^wE)Yk0j+kINF4@tZ2YK=k)uK}6X&9ChcMI}#s5R2!U zY3Ns4;?1h~*ce$=`EN&34&dZat{C$|os9A^=MiOtgm2Tj<_q3;R{MgdgZuKu0JT6$ zzi`5{5>4^vNC0P_LtrbI0Wg8_CCZYq^Kvs1K;>xnE7}{B8t6)0z*D+cs{)WM7ZX&9 z>LxjAr5}!D<6(5VxqV^?YhzRXkku{0-K^+;+^63DSFGaO2>!B7{_ma_|F3^II(W$c za4*l!_P;ab1VTmJr;`-o#hq9KiFO5z5gJ6224IFvt2nSxP;bI0FQ@(`W z6eKzSoH?vispjl)%1hmLi73R`j;Fd-7iE2=tjtlm=#Y6=x&E{Z?qC{?!6iaPDA4}R z)sZGC@|w90HfoPMD@ZVo5g~8#1nG=|T%^~%*57S)@EwB5&n2elZ5E@5U!Ac;EXThJ z@JLk1QeFtnOYUB5=~V>(%W2@*vu8iz$X5_610_KT#uR})AZ(}>&xp*jou&B%rV)5- z+bb-R5zcmoD9vvNRjXL&p6IO|5!UbjN-VzX^S|EF@Tgxs|9kNNx|e6?{a+oZ+{KPB zNv?6%x7EX&?D)Q#xzldnvX#-_YRh-pukPaZ*IG!v1VdIa*ETJyI1gfHF->cBMYs^dm>zw`nWImQIRuW7pzW4tUihI`lqw6dWF7xvBNT;gJ^0T7eBxSPS-a5y6@ccocG!+>j1~FaTtjWgytMYV$Myw8r!~D1x*vI99L6BsLVSCS z_`!6|$Mf2+7bj=dvAB9a1{Wu1t&r{7lrWtSAnP9h1tBh)4Uvq zc$@fCvr630lAF|f(${endxq*IM%~)$W&yJ9v|)oJP%Hkv%o1_Je%k_YWoXE9LXf&5 z2sO*px0`Vh+{=~FVDXwAxlI$l5lx49j$tNGd-kDE{Td1%&HkxRg*MuMJ_;4>CRU(L z_x}zm{@+JO2mJ^8&wV`H{__seWtqujJ6z@D3rg60WDI}T?z6Qm$Jg*J^Mzc-XMCNH zp9`z1`5xvD9fv!#o7jWrb*r1zpi&!EfHaiO*lDj8Z)=U-k7;g)2v3MCTm{{F@h$% z0hKsBmqWPA05VZT)prbV8s;Th6A$rU!4#K-*85Id0B^-M{_pTq`MoiqkVIn%Xw-%37aLE&C|jF&%V%GO6*M5d3jbHm|*)o-a(vMStmYn6v| z&fj;K=CkJBr&hz||K}_@fa#?_A)sH}=FY!lqyOF68nSNOg-mGJ;XSYXZ zx}+@|>X*-h<@|xHG9cM&&K)es_F{P6R7W+Ut{POw$6hmgk_A+YiJSa(j~qGCL+BcC z8puo96!=>3SAzB3W17@89XZ%aG@YX<*FqFB1JyPXIK*gZs0cR_YUV6t1$5?0KtlPwINhR2n0-0nUKV&!z2W9+mRxR5nY0ZY`qlxNZQ*;|eRNSxkiv z@#L_?5Mb#JT>;!~w_Cdh2N6I$U#4BoY%4BYWuB(e093*(IZlf?JY6opq3vj+knl{p zjx|?%-ivW|+;m)fl=n?}kBeb+zAekNa@%3t?S8Wwf3p(4c?t#5r~oej?QahCRaJ{B z@_&ja-58a$`;qmL(JJ|$gYf_H@?r%+uZp4Y6pJycuV+$Gu%o&s-&o{QV{ zT6O%C+%3zPzI+!csp%NdI@0;R>uI#x=tdkt(FxO=%Jr-LpkI}Af2rtfj4a^_;#Ax) zXIqTSqHR)ID$M>j`-c2)7J;bUZu6aX=iu{?oeN*>FJD0Qu9$tCveULCd;?tH9GVin z?a-8TV!4Ba2ZEnX$A3d>F%Z83nxE4WXEPID-q~0f#7nepf>`1eq-a}^U+yD1^}}=5 z&xZZ~Hp2gGjQ`y~998l^KjiJ;pj0OF~~DRGj3++OnFNT}}DV3M?3`w*{B@oel19Xf1pW)Cu!O zj7($NIoj^&$D%|8Wz=~8w{4YC{Sf2n^GWAmq~%V7VD8`&twHWgL-W8}d&2K-C_!Xl z$H+|Y{h`gsjOeD35}VfULuGAtzq_%z=Fsf0l=Tt?I0N|eiTO$z$IVcD$U|Shbp6^* zfIhn&u%}&e{o(6a!)A#g`y1Dd-OFj2FLX3{F4i^nY(tM8OO!ZqTpw|xFaX-60cE?VDSzC~iCxKR zx1-uuE7bzz-COhoUtsw#!lEeiqQp#iF?K)hZs$j@-Kkf0SU1xtaXmJYEC*+^4r53n zlC*2zCTOujKNp>Ua9jqJTAScgH4*L)Bf9~b6 zr@)X{U=am(^ zvs$Gtv_=)q0%mZAlJ-O<6;x+I=O!pwmCc^3`$snz*~&1qgZOPonr!m32kPRCP?*KY z?V0Un_P|~LtWOjF7o>CN@n42VN51?&Iv73pf85K%`P9qL1(Z3K`Bjd5D#EugGN@%w zHe<0|1w{O#Q`?KezolZidVKJrCOJMG0Z`Aup1vU*_^i|h@yYS!*sr}eVzd&zJ#fCK zTTu`lw~#>7{JgweW-%BY@IUe5d^w%s&md|?VJW({v4fS;7=gG21AL zf=@`N^)nLCd3nm(V3R|@1jTSk5Fq&iaRp9rbuo=ojM7A0IZE*YQ#f7H2b_pmo2~dNl>5*Z~9(nZuVzYT)m%%mqF{U`ZIB1VE0w#I~7ajFXT>Hd&)z zQ6RmCn1UZOXyDxjlbD3dR2pzAnYirSYu$yh?d>wHB8oLAs%^Itfn13ei8FpEWk*KdoXq8# z5v90vwt+cHIoGolSRJ)Ej{Mt5rX?y;?qB~O5r{rUyYm;-E1#`Pk@Yx^^JPXEOJE$N zxhKS_bLy>L%WUfw?1-RX&g>~#tr!U^E`N=5H0eIpc=UR>p9vPETNF1=`!VjLy*s9fe`F=!?jupAXvc^C%|uW?;Elo)nOFk z%C#Fbo7YItct|0)3F-P(T# zgQLEG{y#b#J;eXGmxoI?H(K7|eQ#BX!D%`PvED7Z!!L*~R5>w=3WjE)5(msJ55SgnL3LB@TkmS+gaJt_CUJw*{ za%`LlUSmQ`&M9-&N-Wh7y=6=n%3M0BRq~cX&G{x(!2GWu(Qv<(lEG@uW4`T`^ z)lsZ8>w|9?L#r}~)Dez5j47N1N72*_5^3W_rKIl%iYj^5dN<7uX?2Bq&BB$QIqI|w^6kKIW>3H~Ij-uTIgTlR1ga zY~x(@`b=%V1U z*8C=Gy5R07ymk`~L7e%R*6tKuV_NvF;;w^E)Dl5OZ1O+d+thEdH3={qC9xpPYs|Hi z1;9tw*{&+HykTpS6C4uHoEEm2T4!RV1D=^q6`9K3tZ+8F)@Ee`|9x*%s)t*!VTMqJ z4XaVpfSOpaEbPppz8d7OJXtu%daK`dS$hiS?bcnjt=nR^HIQ$Q)yf7!Y__KDYp__W zk=@y=S|}cCbza~3)ZQ99t-`w%Rw}^;*l4xE-B_rBygmDT$;XjjI>jlPp#<=tW|*#- zrhq*DGKX00gXe{b(rMqqLtm?AD_&H!K9vqIITDWq8n7Jj)*95J8 ztot@Amep?x>tadSP?v3#QB<<2v3ekz!&$HgHM3LX$+8+CRV+0961m|J^m|9OxW)Nm zf-~XDAQe)3!EKWJbV@sG>mlW8 zKQNaZplzBiDcQjQ;wH4KpQl|&Vj$ZYuwoLJL9^P@;JPF+*n%bon}}j?Q>qx$QGz3- zcxiA1sEU@?L>*Ep;blCtI}amY*_-QsXc~e`nlB*5F-+4nZ{_6p?BnUni;v&GI(_l+ z{N=k3uTEZ8_v#Z^94AR&w~d#C=8M|TocGm!P1YG);JEg?YWhW)7fo%~d{>Rvd^W9z z3p9ve&P_F#BsD#LehmPAP}Hp;B&-899p4fO7epNvddTa#@6f~Zt?TX3p4V5G2pU@q zc2Td-60cN@a1jv2<8?j<^;w}zr(neesb<0wfm(IWOq0@TAMAlkoF%Wg5x|6Ram(1C z_9_=epM!pHFl5|P^T;3+JNB#Y^>ZQb*KiT3UAX8Mjfl&y*T=cIHntnNq1iDs#5$%V znL^~V$ZBBTW`WXPYjvWe;e(DGDPKFB#lzBpp}3h3gui!rgUsJKB9t;MRy%_K6L+iLu&%SRfMmRv3P{+4an@|DQhh?tWx)Wnl=avxbXZ z-2pfF{~jFp`QHcqqr->zANTS!=6|PipbxUIxgQVi=2!`jU=Ru%Dh*XqtH+rGRf zifffu{&X2|<8`e)@y1boC6vmgCrf+ux+E1?fqVV6hOb{+Z5iI!8{!rKcmZef{lOedB0PPw&Tq>ND++o2)ix1qnKhS@EzA

tgBl1PY}-+dBVQW z{^QF127dh&h(3ujQ;1bEyH%0ND6voYt(By<;>W zq#Dtav2D}3^C^}DD3<)H$OK%uNHpeScXsPcXD*+tohYYGKgFukYG~A3PC6$3nJg#n zNBP14sFVm`e><|$pYho!|H(VRsJ#9?kY@R>-y2rszuv)M@F4%)$MZ$pNxEQi9mE;X z)2*%?B>-ps%~tDTQoS6)LW;8(!{+=UeEAx=#IL}=nCLiejk9H%T6y-hiv$-` z3jNV+?2cd{H}}9!FFBJkixDog>82UyW34%y$4O1sn3jK&!l#nlD>Tt(TEgRUM)>xi zcLni+*J6JMMIT}tP+p?7I$E*y zZj`O8ETXnRDWi@1gGGx}fq5JlmL1#XfBjJAi|sIAC5`s^#g4fy6KVYot>2-ksm52o zesAhp35ZOO92mkf;P+8JD#K4*U50wFs(ltDE5<4-pNF{peiPz$*TX8ddnc#$ zSHj}y zL=Y!Zpcqfryuq#j!IWN%@l(Hi3Kp;+ss?~o#4L5v8E`kT)Jkg# z#e_Vr7PpXJ@T|F_n{5w$KP!aHJRP}9#2KmQ3db-+wUk3(8ME?0TcUwpH)^?zHmx@C z*2Wx-Gp?RPf!?Z z?djJ2t_4K=2XWkUQ7+Nx@i{m@Iez^Ts4yi7;2yi#G#8y@C97t1#sgZwaeOcz)xk@| zLlJVD7%!c#dQLhsJ z>8L+=i2r&okFfu>F6KNuhA`)0rfWCY|2nO$41h(R*zsQ+xlvo`L<&~E6#aLNW{aw; zZZ$+$mDXV|H+PXrwGd2`!aZ|eMt-DXOhbATx%L+-rWY2RlXOWaDu2Kwp+93f z|4EeegqE5L)&0SZ>Y8LSu}~)$3D*K&I7Omzh04%Zf?yfX#b%}7293Jaw)kksA2&Aw zhB4-4truhP_kY}CQ+D?OP``F>#QIYls-CN>EtyOcWrT14^A>i?SqWowhDywNMV=+R zl2zizN`V^sXY5xWn`p_UNzAJ_%+#=+9b)8RS_{Qa(dD3OOH+@%PmTw^V=7R$SuSO6 z#Y?m%bq)LqmKpv9{0c~3Ql3R?-!mha(<_xKu?CcD#IsaP1HyH|0aZ5~)0hknS_N8B zWc`784xqR}=YO!Ehjd9v`9%u$l;Z9J*ykEp{RR|QNUVXvyraAt%5YDZl7x#9Fs-4G zV1ar%k&Xw>1b1$K1{+O2O_-aB41V5yIzwPKP3lf+sIP&_w`QL(?QFfrAEy`+!K|&H zH+_;SFgeLHLQ9CHn@sJ;+h{jM zr3r{&{oE1upHSOHGz{lBC)i~+kr|L-3SEBPM}dk^~my*%6kc*d`@X@y_qIdByI zE!2H(BDGR<=!>zbds{eso5IUIp?x3Slo75tP{?b2@B7s`p%(0K(1qzb!zp+97@{v z1otW)HRhvba&;r^zg?EXp`U;x=W-TV7JOJ(dx`7|zapT4b-8ao1wS!CkMq=d%iSZ;FV@%Sr;CfTi2FcP-=Bv*T%7Ro z;s`;$9fOOLv&vD2`N|NlB2>MNSr63NmTxKJ`ey#m4-xJ%|M$V@Xi&-jeejU~@m?Om z|M?sP;Y*4045axC$J=pzdB&vg+Y}{Uz;dnfB1%2nXZ98KM1JVV>N>}*4O3m>j!bj% zrmx+iy#ZPEq&>hbEccD7vXnwX47#G2!EH~RWXZ3>dc0MSA{7?h!()FxxQHL~(Y;s~ zBCi$aIyxZ=Syo`ZafljCca%c_BSZ;dlT(|n}xW)X_tzQ-(S3qDun|h zXSZ%Rey9~MB~}eYzWFz!>li6OC3ujPXk47<@nv%_8i&-Gb4xr4w5G>^ zi!-tV!O9zZvpe)+Gu#jk8_ z`foQttz)kK#{Ok<@%*H!YFNco`$s!dqhyR#Oe+!YoLZp*RZ8Lu zix)NPszNmEdoAIpHho!~*Q%wP>eo%v)G$#GrxUmHY`Op6$N;oq{~sP69r^cvd&A+w z{(m12xBqP3|F^OQ>2qbzeytdyz0=nV09vCmuWL-*HkUMP+uzx3IAVjhfI{Leh=JTc| zH{{&zeh1#tIV!I(K|r9vlfol#_TfaB>b++D9%i9z08jH$SQVQP+E^nbl$v`Fsxtjx#1dh&i`k#r zMO3%w9#Sa#n76h-gcb!|zrdxtzSLVM{E{o_*`O9E!OM!J&>ZGzaFHk(1*GTZ76|?q zdW{#@Kh+C1q6>%G;XhT`vDe*zMRQmk$-Jzt7crXpUQM)LS47;1iJXYZkMqetQA{;U z)A!;u6)b z`TstiK>SB_>5l-&B={s>={rW)*?XJH&6gcQ`YTB!~#8b5hG;U4ggNiFUgM3;cm~B+tfR z)o)$mEExlF38}R}6ej;ad*A-uwv9EoKkKi+D&L&O{Va+U^{~9t?&ms54@e^8xS5{lhr|-Wi+eAC`@+QqWRS~Ad5e&-wOKL& z^({j+ClRF5QvC-h3aO+joFysRV6v8ZQiR;C6VTmwUC@;Xl<1=g400j`psp4v{}IkE zA*E`ET>qF7!iqmja3&)#t7V;$|4lBG_ufWKyXH9LRT52_5!5I_> z#dFqn!t&ng-Ylr#bs8yNWZSL3MyLJ$UpA+I+5FdEHa*qLsqedE5ppjtF!ldCic)zR zTp?XttCqK(K?Y}#BA~~=LghM*VnS&%EdMv9(TarV8&xLp(Xmb_7>Oz(Y zOzi?~CtMrM=HUJr&Vmvo@e}d_}e zLYl~L6Zq>Ib$+X@ny(;b<9V40q^E|6kPtHwwI9rt5)v6GLuwof%vq-q=!#j%K{T3> zE&AXy|1tXEE4QYf0~T$|&MbsIc!vR5B@tq%*w-H@@|&U07iAIkPbIDlyz1P!f6JYy z1N=XIGV~(GtkpKqzVjc0aV7s_F!^%+<54~}{-5^m5)x8<6`ejC46>=Q1xvU=0D=%j zaEn5~`FNn4S2=6k*vrcybd5cuykbKJzh>tsf7;`{=T&CAg`$hPQMm+uu>yX%ovec2 zwUzh$9BbFtm#tsN3`ZbY{DNtUV7LXncc7MTxs9MIo?|6d>^fJO)< zU;y}+715O$d&iemPsk+Prfr;+?`835cD|MQ3C`riX@_~rb^qkKNE_+LRW zv)9a_o!!hiDc$(qj7?ib)s?`BYOiP}BEg`mhaFJL1$l#tUueQ z*8W>F9MS$Ssum{x$nsBn>;I1jmHL0fFZG`u=OfPlZ}93=o&muT;?n$^6=zGZM5ppF zn5bmexk7B6#sC6J<_yFnL}$8kYJP7(r>5q%7+XdYhZ{K$F`bbYj zjlAx6XIEYR?|*kyg(RC5Y3ZRSO6a3GN>da*TcI9^;VVv_y*{5=ZR;uv`c zfSx*_hvER~o!J#+!Seb0Bt^2!wz*@gZ!dES1)%wdB;1rH=_$B~jh`i%rySFV;%GJ@UW#ZKr~pbxHzKFtGRhe-{`0B9T((#M>{d}#tz zzEOZ$Q%A8*0wyHX{O|L>V}_fLM?%7qJPgPxAu)~1df^EdyjT-F6Wg*& zc{sCja98^7&Z@v(#l<7TpZ8o)IkB9bc3vfHYcTDo+%z+}VUjp^>lsR8#1M5b>1QvU z%F~uPgDc(D*5<0e%(OZvWsKBq1*$Yh-QALwj$<8(&_YAk5AKV~)NYVYw@V{--Dt6y~wx8^E$wH~zKK7P5?EVhax1X z8ZNOz7TAs@^aX|gQu~*9f z_Qs>J|Hc1*jL%{IzbPBo5`iS;&X7#r1xl1u7J!;Q;=e9VOU#|#Z#!fb5ONSAM zEs<;ux{HX+U?kM$4gpZ?A=7|)uC}g#;bgrUiQM@M3@%Eo_%9y-BiEute%3NC0&^;q zN2w?qH;DqHZeO!<4*rMy7c349l`~MpbS#DEaP@d>4gg zl_t@|yo2Yr!p+qhRQ_(Y*J7uYmWIb$GlV&u9Ybg|`jjK6rvEb%+@TbR#D8#w7MQYh ztF{k;P|V{cqkfHDttSJJ;L6Vn3nD=1fm@)*zqaE`g$(xs!Ri;C&E6Y2!KN}q7 z>rOY4-w#=Y1*{&BgNR!Pknu58p%j?!Rnr}8s_^!~nPnRH`x#V&&mXP)_vn9RrGIMu z?~eTP{SV{O=u7^`qkJ0Z|G#BU1fUGYA$Pjv6tPZyHG_0>y`Cuu(ay-VHDd(dEtn*r{hrePtJ= z{D*oVkd(KDnUw&|hnYD^)+||@m(65ZQI+;tz~L$S6?A*uVv}OAP!0DR(EUgEAKh+E zgh4>LK0kZ)y!YQPu1nBBso0)|mZx;!_dWGOPw+t$s|3o9E9Q6{m3yxRZ6ml4ywI0z z%Wi9!!Z-b=E*W zp`l#c)*r z_GgqpxoiF3!!*Y6;-ez~d)B|_`or@2_lEA5_5T>32J8PvIUN9;ku_7H>y$*12w}s; zu7#h?B-Q=~E_Q_fuLxng)_5&6(?}Ov#N`O^2auu#djA5)A?WtffBYl-&;R&9mvAr| zpUU#tKb~E^xp?#aDY(k10wH2DO8xY=-+&o0A0a7yA8ikZ{-PaMw)STdH-(|$iB0d;1W z#c+k4fUNr2UAeTsB=ZQkf=@~7};QQwxl)ii(?W5$svqaGfi$sry z?_+=bw;cZ&jKA#vKF;R}xP*+MG#1fSIRn7`62)M)#!<+nQUZfJv4hch0>nu{b@Mj` zbcvz}aNkbm{NQ+T3{n(9hBrtQl{bEeaoBkRVx;cydYYtYj^CqD7Pk7IM-C7-g^^gi z$x#9cN zCrQaaQNTJ54iW6j<|+AS$Jx+;gsA`TAVAgnKYw}l=KJTb-hS__!UykT_xc|X#;#Xh z|NfWzpC0G)1e`Bnyg(6I{B@Ro+v#-v3Po7MLy9Ghv6YbdAKZU)qOBLPgRYOi|x_({&uD0O<%k9k_!*&-HrVuvC-_>Xm(rDJa7gj znq8A-U(@^oLB>gjVF7A^SCyDhA!y_ZsbB~TXUjy_$AruuV5ptW8 zcO<~N(`I1Zsg;KVXHd_>fiq~$L$AQYfiu|2L%C5AZMl21PJl?&?7?)AX)#4~!-?bC zC(gjOSO%>Z%b>Ja2F1lP$cV=8In5yn*4$l?J2fO_FjAN3tY9K`Mn&mP%s>KDibUjs z&oS9XFl6iF?)gG`;lq(rmQ zAY6U)2GcslsTCwQ5g_;PW3u6V5YQQ(Md(=NH0zuw$%#Qj!8Wi8HjZ{JC-{TboG9p0 z4$0(1I|pR!HB?}pRe^B?Z8W!3+EZsRD$zVPX>Pg7-G<}rPJ|zF2<*|c89ztUUHq&! z2>656{2Z3}IWqa#&L9{yG=fHUBZwntqq(I)Fm(ogiRPg}vo~!=^SId@8jW|!ih2Wp zKWI(!phUB8(tJ`f0JzZ9CoaR8ENsPvr!0ab={*dUoL+wiz4g`rf6$s25WW)Y4&t3}8Ww9xDw7Qw2c`J_m*H?5^vO=N8tQL;iH#B)(GhKZubV4X%^ zQL*av6 zu{=G8tq5&q9u6lv%tOyKl?uNbh>a?Ut;hxe7)2nW?U z*Q&;BJ$#rVP~1G;biM{bgkZc*WW`x57Op&3D{o-}33pH-m|@oW8qC(KMA6&%8l;G& zc(FjK`U#{mP1!mG<7Phoa6C3Wo)WNO!-+eb?gG}#t{e{i9l#no@Wa7m7qEty4GNg4 zu`0-KF$+VKP_cv0r`=*1q;j{6+&k7eZ!-_QR_0;0xJxdAXPSsLYv=)I)`M`xWd~>8cC9VDl3_P3qfs23=Hlnmi^K<%9u}tC4A55gCx5YIdYYD} zdw}KHUZPnDv{{_34bGB6&&^G*=Ubyc41{RqcSpnkkYM%{HBf1M8;q)Up#cZMzXRbxL8cp~;G} zYmq<}EVVVE9l!|3cgX7g*@9N>V^&3ceG^}6#G*Ji{gcDEr3b`68SV&C*di3I{f1I} zqLx54AWEQ@&y9fvpM~GQ~gJUCte90Q8d4GxUzLKX_@2k)fq z;7y8ycTyZYud>OQVIQn1BddHLQPx`EYC=&$9W{In1=GYTm?oCto3tIiNpbilyN6GS z964=Qm@;@L^YLUd)@zu6C5*#J4X9Enf(PSfrk_8yntl_@1emm)0OMkI(8MwUGVx^k z9e`OOfXx1h0!9^E8m?@6qQ%%^PmSB!Q{$pNH7?py<*9*VWi=%!nIU=4 zw%`E6D@4|EL;fDYJCp*tr3|g8jgER_Xx!Eq8W)YBalsg}Zx5BU�mH8CkW@*kV16 z+geZKqV+T`SWn*gKmv!&%vpbEHD|{b>uKE9dKwoc^tfO>c?U)-e7{+=!uPGYE@O)n z9=Dak1bU{MOoG-17WE4ObpBwDXf5J9}k4#|pDm~4Wtl*sWLY9rsOjm8#9 zJZ>wAM@1)mT#&>D9}ID;{T02v6~V2|Z5dfy>QP&ldQ^0&M+KMKt0t(3s4rM2K$Nm@ zws0lW?fizWq%T}a+dOaRqWjWC&oE^b6<5#8`u(F(+Z^3dQ3;QnvB}HY9BH{Nf0iVY z?uJJJeEU&=kwuk`+N#n~QI(Dgs??sAS{hil;Vf}?%#y*hnKT?sE3sRd86iugh~SBA zE6?NMm@+6%@Y+~hujNN=wfv~4WiYW?DkF;`AGKBFqoN`o6%@H!wN$R9XS~f07RgF_ z+;u)K*wo6@7Mo|fM37*{Ni(4^IN2c->XrVetF^N2I!)eekHFIE3&GchAu ze0TmO&=m*-FT6>!_2x}>P02>TZJfYt;$goOEM;GDYj84Sl|tc;JQ+3?wPp;1B^-CQT9_ELS81bBN`38eB7ypmc@h1(=c(qh=nBH?n#(z9oUn zZ=1m7J0$~lYO8V5m~Y!C$-GXmYfb57}{)|M(T)%KJMu?JoxI_55D@ANT}a766!l8 zi_tU~?ZJ$AqEeNjL2*!qRy67drFG$;Qr)0IaZv1N)DKGgay?~kxQC$O*(yG? zF8ENY_fX`9Ef?Kd#-}YeT*oVxR4KB)h6Uom=wjT*I$(r!v9Uf=c~*aa%hz zZpo=}4X0)gD)qzTwl=xlqRH(VCiiYk>P=p^oyn`>5?;}AadW$u<8orfrQUFL+ZwKJ z(QtKh!DOAD1M3%R+b*^P!xlzq$*EU!FE z-2J#rILdXiRX%8g&7`FFBqRfsJh?|7WP^7Ih^+l`u!15+#o6} zMPWvrh~H-`4#jX5Ay8;BCn@KLjlw!(Y0}nMniLI`Ny$#Ckf&%OktMg>IJv3FQ0@9O zNO4jhAD>w4ok?4JXHv9xCMA2PX3*qD#U_c%nL9Ro>kOkwTf=BlG>j%C!^l#eRJ>(D zqg4cqzc?(SG1|p8C3|2T6DE!ey~32q87_{W$ggr4b7_>MBtVo;b&)=WDWChHc?MxR zX;j%~I2NbI^<9O#`X}J?Gnb|BKV=B`z zL~j?XBqbY>;UxY-AdKa}@+G3Ki4rNpbQ?4H9;?x7lFhJ1$4iIF}_~DY1^MQ*L@1zpD4I&>YIcc3-QlZB-sK zf?KZr8PN(eD>fvT8Rdon#UTnf5pp~lrH4#Mmh6y;#mAYn^>HReA7@hXajMJ|700X_c3dEwef;Qoqh|g!C2o;;?w8odq+RNrI7ITN@)?$7l2niN!5bj2JSgobJl> z!Ag<2TpE~W4#sGQgJHAvTA6xd#~YSM#x(WvYQ^R>y+V|w>ww9k7h{BSAK2 zRX&wNthHXV^ITKgaV|+g4Nv5QmP{#TO-N9+Y{^s<{yGM1iD}lyJ*473GNEx& zB+e?VAdVS|A@43Alz|yy_Xx$(oRHu}5QbYEN|&*83t+IsXv0xl5EyYBXNa%uXIFoB zxJUq3=+`w)g$$sb&fnHEl*Wi5dJ1m8{l;^=vE%mKTha8HArw2E58x`l9`XYaIcOii z4=CkEF8I*-&@(hGe*YkADG)9Har zd4*-LM8Tb~Z-4rAjf1-$Um^@F);L5omvFgQb4a@AuVB1}QUCvnH?H{`e;K&ni+B32 z*L$0wxW|XTe+1?@rOfH{z%@dG%%6V5ci0B`sM7=IIZDqk4M-a1twZ^Pvsm=m5A^cp z<&QTkbY7Bsv_a`HxJT+xsB8?#v5*YvI!7fGg~$|Zn^Pb{)3a@^m-q_;8Ah^% zSqfv6AO05sK(fGr)C!t2AHd%bm+m*)giCkLJ^lg68#m;a3=W&JzAEH<1s%}&V7OQ3 zd3fQ23MYaO;P$uQZ@~v}ouB~Ew*bc5T91r^B}&B^HSUn{hv^nzhE~)8&tb5vcjM@i ztfTBYFe>61cWCQKHIvsn2w)6mGQjTug*A7K3_Q6gpCPWyKM2XFV%zzPp zzei%~@TTH2Issq0`|A{iK-^m_XM;c}@6-uMD1~rZ?%xdQ6|m5DM1}|FhA8~Zf%OzL ziIi~rg8)$~uLO0#1v>!27bKOTHXP5%ai&8V_=!)okOWF|>T8<~cT%V#vQB$K3M+l2 zJQsy|Pcf|j#6b9{o-2-wE`{I&m=VG`aXW_*MSL1PSAnN>99QYj=LL?{-EpC{i%s1m z6{o+q=9Sf815?cVr0R;fygM;rt>9l_${|PczuTXF<{fZFoCBm{O<)vCQ1>{B_#jDt zj1d)A$|j2n;230T^Fs?4c{8oDT8%el_)gq^6X~n;wD74XV1b!!alB3BGL#aL8^3b0 zLGV3hz_?(1wiT!4RplqhrLYJVUSGfDQ_kMABhPe8IYssD=eON1XWI)6!SO3GH3_V zMT#grU@gKJsK!Pxv@Dct-Kg`)HQjL2*6by#1=qZjdy?Mac<~IUMJD&Vre@+WRZ9@! zRBeE(HAxZ_qfi}1F*+8W1qB!K&VF$$N6reEB=Tjg>(zQ*k#)=xxYVmuxDtjWklW9% zc`K8e7%{peq_QYmXp9V0t}a+g)_h`%pVdvRS?vzYmSXu{lJG!PQiFFRnVw;|PoNvn z+llk6r?Mv%q}% zI&p`ii9Zi@JgulgGXxC8tT=}XHK-P@V z07jCMY+(PYr|`F2)P*5{;3Y}%zxcZm_jNcJiE&>1z2xvm6~<7&23&IM1F_1+1|5KMqfz~Un!iNBCg7Oa`JrPx^VrO z@szuKp%IYOb=_;hhLFJ;c==nRfk>u|St(Ah(h5Th#(RB33i5ixubQhwI$q9qo|_+T-nKa$;-a3;6oAXhY+nuOc5*hXb-NbJWfTOZeM=i z%BK2;hftMYjL?Rl6p8FyjuN*NK7d<~_wi;eO16?Y2oc5H_e)4ft1oXb#Uy@-DVKk* z@JhtG6(C>4m?ivcag;)~220r-M6!JeCJ`wQ??l>}lfaZ=Dd7#N7vo4X!XOe{nXdxl z)m=T%b-F+{=s7n_z*q1+P;c%6zK-Dr;z-PlHeD3nFLuOjJBAip8{FbV1nXpx!VrP% zHSW7V%lf9r+#<%Ib`iKedZn*wda7jhk%&5E>I^fG3MSp=l#3u@3JgNL+gs2X1l_bj}1L* z7LgUi#Z;0}Vlnq7r6ocotJO$$Pk)jRyQf`I*Rp%u6_c-f+V#4>|9sq~2&Taj(QI7w zz8iS<=9-TRCx;$qCZ*1}l2tNgH(&*~AVri!8w6q+5puUqbYP#v@^F9=)S!s16E%Co znAX^#YOOxgNd}C7?s>GP45cq{N?8}+xrnm7$#xNd(9&WV6`KBt+47}qS@#xKQ4$lW zq?CL83deWUZUXd``j^LRWq~IZWUz;K^SgN(Ih*ROp4u?M@uIK70zH_><0E{id#Yjo zi42@`@02Z({`pAJSQjLE4RKtLw*zh}M$@%81f*rfDL6X-n>Z3N__*sar9V--z(}}KfFmIo1K8-jmSY! z@7K3^&rlk}=ptq)ox=cCy}ox8sU#b$PH#fSM1qJ2`*V{`t$VD2I65(qukCx7qEjHU zYi8R-mW94Mq1hzRc%<;G&gm2mB7cB$!J`dCm@Y(IODrTVKa`$uz-5+zq(z!Uk;^OI z-y$M27&-HG6mg-Dxg$H&B#IeMk;p~o{opt^8x%B5mGG@D7PHwQ9l{t8-9%F$?-0%Q zF%{|pGGEG~wzOsZ%;(C+RySv%n59_$+D9zt^Oh9!zzQY_N9*E}w@wjNukz+KA?big%JvGnr*Td%OQcn z8`@hJ->&stY6bI2JQ9|ZjKO5BpyU9bqzKY2NN{kco#weXqNz7hxf6X1@G2oGgE6zL zOr6@W*Td(ps>W!qlb<(i>*KE=j=$1y91~TCKT-EB>x}wZ4l+{&>dCGOT$O(M)V~gC)dqZw4t2xA5eW>CmN#(C$OUn%mj&7e z(`)13SQ1o7-e-svg49x#ujkwZ+r#!sM=~9LTcZqKbHhZuEiF9RPD^dMvx#GQp(8!! z>xch`Sl~F$kpnJ-Etn#X%t{7BU<^DB;Mg#H1kNOmw)tc67EJF@2%yf{-`1edqUw~$ z_3+KB>rDG*EclMFrOKjwqc8QArX?3Jsv?Fyouq|Nq3fM-3$x8W&EGK4P}G>19h_ue zYP=`AzR=p9R)4cZWeCDLQJIbmr7IlE2};rsrTY`{BRogJHYlgT{C-<8uJV?e#e6oD zwq*3(e-?91KQ`_$sBX!rM$S5|^JRl#cudS_7)xVQI{3nz;!6YEixii4SFf&l(=|m# z`Wz?V*>{o&I>m42eqx?KXx~jN0J82So{5X@E8AwJM8mShUxeLY15v-Yufu95m5oC& ziJ0Cv9J!;=ANno|CxI6Z{W%J~lW-P#-efYHj8QNf&jWul_B?+U4871FhH&7!!O$JR z;mK&U4}k)0F&fLtCEOuH>~oxKu7ICl}tOQ6tAgB76O>q+2;^uMJy$4z7%AH6xPRK(|?aW_LoH+CZzLAmV$w;fg7E_;6Y!+Fu$GGtW^LUWP^sNx*RTsiSf zr&5SId;+@Y_D60h#Palkuv2sxG1bo0{frFNXC34OL^#ql(bZ&+FPz;?du(%M^!U?_4B zYi6Zh?s#qzRms2w97c~D>(*W<{#R)xOsCWDah3oM<-m}6cAbePCPlxl5oH-g#+qRJ zXe(S>Rp+FtzGQ=9siq9}#au*S`9$d59)oZj!xawXp<0SbtghVASz?73vYUKvj|+K1 z*~=)c3Gt{QG$B#4Lh^PW6j3CBiPJ>ItGUcK*RcruqYykbx;_#sNdk@6QN*3J>diu2 zm2zO>5SyqJptlceD6q4CJ+m#ycgj-?Nc>M-a6>rJw*^Ud>!>-%Z3YPFde##m2^>?s z0J5k>m@nz9z7}^*L~$z%hSh!dWE1EO_o@UI%_}?Zr}?#_$Li0Qm&YL41jhia61IJY z(_`gb9_Lv?$9a)3u1DnlMm?S@nCP&ZO+P(XkI7sddew<%tL&iIPN;t#>1h%r8C6w6 ztF3I?TfwAi;~UB^=cD4eJnW#w-hK=|wQv=arl$t^kclB@nPpZO(Ebz?!ldUBN5YW+ zI8t+YP*uk_~6NZonMLmIBOus zFPo?ehflH~YP$Qp*M))b=de5sbUyhiG5RVlmTZDN_>z$pY9m8a6`rWKCyMYK0ktb$X+n%U_ z*I;htr&TbEnVvO6Ps^z2~!c6tB+J> zsl?iy)17e7oWGjYW-Jtaryr#|L|-9JtGYvC>#R_S*R{buz4@+MFao--(Tb$oZa&{2 zV5?+K!PBd=*S#4G?ocShms`rv>d5q>#n`D(i3YiZ4Dh$qCIJa+qA&_iivNZ5DT=zd zBnNPNjsJxtj^7Dfq)|+7!5l$Rwt2yaKpc!!=SjC@Edr8MZ)yS&WD?oj0uWGCDUMe0 zV`ybRn$>#Dg|tGegvg>9if?s&*NvbasLyB^1*)IzAj(^i?Fo3F+1gd;e*TMBBltbl8r6BqFGE%du!R+_49le%Jo;Vei|C=+_h?>$};Q{L&$Y!2fR{v8P& zC1CAxI*hLB^Et}BG)U>lU)|qrU02nb2;R`~99O4voXo=j&W9(1U_Km8(AXV$GZ&rA zyyy4zb5Q)WdLh^T{8 zPPp&(yHdYH@bc#7QoX733iRP-Ar1NSKL6)BJ0EvsWRB~1>UyQ6?U8bQW$}EDk-Wo@ zk2TGsb=6WX1$H?)-Gz$uG8BSaIX0)_*yydgeL+HBk|?AamOdt@1at{%9UbK@o#)PSWT(%!q8JlbZ+c}qfL3Ow?(CqsNecwjKzY=8 zsXKk(S!r_W!RBNUXblk$J|9Ji(cOk+RycKsS!n`lX;c>LtX53QLJv(0O7-Ht4y&D1 zP04{{RA}=i9&%5@APl{59Jtfjd_Emc1Ah{r;e0q5jb~GYT+biOPr{So*!QL<<2i(b zfj=4#U`=9h2_bDqrZZ@rw>nw_)XC;663Ih2#`o`V9O`q)9F`O0&vv`uRj1hOrVgI! z>m$JK!d5-o>BOH^{r>}@e+1YZUW-)aCPOD`H(F4<63=!aN7w2u;+nc-VF08*fIEF!x?P{hd#Jfx}On09c67N5vtDPcB)@e{F=p$-V(eCMQ z-5^XrU6pfdwDgMYM(%6e{k;$?(S7QKT?+cL78bRf z$C9Y3lAI{Dd6w0Z1(^cK-UV4@3B5&JVRKd%gb|RCWF1L)quOWZHpb05n7<B*@sX{TcRKDS`u#9_O>ezk z5yD<%ab{gV+PrO6{?;TgS93y7A4xu_ph8xZWlxkhYxi;G6!hV06H!~OgQ7iI6_**E zWl%VI0arM}H3yryd504)*U!a-%s0Aa>i1h+-{<0TGd$-1j;)<+>&%;L94{ht&0ug> z(d{@<#*ERA(f$}*ihS&6YZ$2?)S>R|mntp~eBQyzSXmhUpm}v|o{PuvoTMu$%_}oY z0&P33mW(C4rj>x+c819k06Rd&Bt(~%Ist_o4&6>>O6j%sioozY7{NF|sgQMVbUQr+ z+ZZzZ^bDYUGZM|$L9Rf;z{Ln<+{#rnoB#jw}}8O20suR*i;#;KHHy z)5w_;%Hk$j+cK2up(5phTwE45`AsQlYSUE`p{HE9&XjOHIxfiCW01i+&SkEF#+i0q zb~@WNeopcI)+L~`Rc{Bas&iVi`M7m+zeIe@jfJcM<|dDJ+G@J6T-0z=NlGljmX4L9 zuk4~o-mI(;R)r^zfxP9Ne^){ag(^P9%xZU8p&|pphHG%AjVr*i5XW__e5MO-Vg_9sr3$v%s<|demMoj=8rYn&=FI7@<%) zI0_^J0wCwrHs1-{WhG>1{fvh_nBYFQ6e0q{Ugr7s6B70|UjIo}7UbyX3PCIGT`!O= zL$_!XinuIf$_W>vtnRhWf%cxagL-Razl%8Jx(|UR zxj&q|d~s?&JFF{He9L`FWk|e$Q8a_W-3@s~7W8fWJWWY@`?!oDkup81ZdYati+e}R zmLGfhh=3?A8p)xmO=?CG5|PFBI^hoZd3Ntf6+L}PitUXyH>GIa36@E|Y4ANN;P>*Y zSoFR+W3~C&jm6N-&EJbcNG5`b6TvrGsi2y|p_U`Xr9#`MW+m)fqgFJIL%hM^8b;ia zy3J9bogYSiK>Uo3F1Wv{x{_N8SIgL#Gda`TySg|6O-DaZC6A4<>^z_y0f2 zr`PLsmN-PG9RPZOk)XqW={(6}(%iG#V07Q<{58Vy9ayGl{!Lda$y^#bBwh4>;i>}% zeU{?Q)(I%>3is`sE<^8GUwltd^i7wtZG`9&A=U-`Z^Z@sFHyAW2|>fZK6&y4Tn8}b z(r6tq+UayUAHW*|USnEN6I=_e<4_k`=aTlcx9{^o^q80T(>-!kEcW%yN441e(c|{z a^X2p9^X2ogpZ^~K0RR8&vX@!_yaNFJzv0vX literal 0 HcmV?d00001 diff --git a/incubator/airdcpp-webclient/0.0.1/helm-values.md b/incubator/airdcpp-webclient/0.0.1/helm-values.md new file mode 100644 index 00000000000..26288a77037 --- /dev/null +++ b/incubator/airdcpp-webclient/0.0.1/helm-values.md @@ -0,0 +1,35 @@ +# Default Helm-Values + +TrueCharts is primarily build to supply TrueNAS SCALE Apps. +However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file. + +Most of our Apps also consume our "common" Helm Chart. +If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart. +You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document. + +## Values + +| Key | Type | Default | Description | +|-----|------|---------|-------------| +| image.pullPolicy | string | `"IfNotPresent"` | | +| image.repository | string | `"tccr.io/truecharts/airdcpp-webclient"` | | +| image.tag | string | `"v2.11.2@sha256:9dfc8d1ca4ff738c9586c902eaf3dc92d914412e5a8f3ec9a5002633a58d7a35"` | | +| persistence.config.enabled | bool | `true` | | +| persistence.config.mountPath | string | `"/.airdcpp"` | | +| service.encrypted-tcp.enabled | bool | `true` | | +| service.encrypted-tcp.ports.encrypted-tcp.enabled | bool | `true` | | +| service.encrypted-tcp.ports.encrypted-tcp.port | int | `21249` | | +| service.encrypted-tcp.ports.encrypted-tcp.targetPort | int | `21249` | | +| service.main.ports.main.port | int | `10155` | | +| service.main.ports.main.targetPort | int | `5600` | | +| service.search-udp.enabled | bool | `true` | | +| service.search-udp.ports.search-udp.enabled | bool | `true` | | +| service.search-udp.ports.search-udp.port | int | `21248` | | +| service.search-udp.ports.search-udp.protocol | string | `"UDP"` | | +| service.search-udp.ports.search-udp.targetPort | int | `21248` | | +| service.unencrypted-tcp.enabled | bool | `true` | | +| service.unencrypted-tcp.ports.unencrypted-tcp.enabled | bool | `true` | | +| service.unencrypted-tcp.ports.unencrypted-tcp.port | int | `21248` | | +| service.unencrypted-tcp.ports.unencrypted-tcp.targetPort | int | `21248` | | + +All Rights Reserved - The TrueCharts Project diff --git a/incubator/airdcpp-webclient/0.0.1/ix_values.yaml b/incubator/airdcpp-webclient/0.0.1/ix_values.yaml new file mode 100644 index 00000000000..9896630bbfb --- /dev/null +++ b/incubator/airdcpp-webclient/0.0.1/ix_values.yaml @@ -0,0 +1,38 @@ +image: + repository: tccr.io/truecharts/airdcpp-webclient + pullPolicy: IfNotPresent + tag: v2.11.2@sha256:9dfc8d1ca4ff738c9586c902eaf3dc92d914412e5a8f3ec9a5002633a58d7a35 + +service: + main: + ports: + main: + port: 10155 + targetPort: 5600 + unencrypted-tcp: + enabled: true + ports: + unencrypted-tcp: + enabled: true + port: 21248 + targetPort: 21248 + encrypted-tcp: + enabled: true + ports: + encrypted-tcp: + enabled: true + port: 21249 + targetPort: 21249 + search-udp: + enabled: true + ports: + search-udp: + enabled: true + protocol: UDP + port: 21248 + targetPort: 21248 + +persistence: + config: + enabled: true + mountPath: "/.airdcpp" diff --git a/incubator/airdcpp-webclient/0.0.1/questions.yaml b/incubator/airdcpp-webclient/0.0.1/questions.yaml new file mode 100644 index 00000000000..2042a078f4f --- /dev/null +++ b/incubator/airdcpp-webclient/0.0.1/questions.yaml @@ -0,0 +1,2788 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + web_portal: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + additional_attrs: true + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + + - variable: controller + group: "Controller" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "Recreate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: arg + label: "arg" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: env + group: "Container Configuration" + label: "Image Environment" + schema: + additional_attrs: true + type: dict + attrs: + - variable: TZ + label: "Timezone" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + - variable: UMASK + label: "UMASK" + description: "Sets the UMASK env var for LinuxServer.io (compatible) containers" + schema: + type: string + default: "002" + - variable: PUID + label: "PUID" + description: "Sets the PUID env var" + schema: + type: int + required: true + default: 568 + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: tty + label: "Enable TTY" + description: "Determines whether containers in a pod runs with TTY enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: stdin + label: "Enable STDIN" + description: "Determines whether containers in a pod runs with stdin enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ipFamilyPolicy + label: "IP Family Policy" + description: "(Advanced) Specify the ip policy" + schema: + show_if: [["type", "!=", "Simple"]] + type: string + default: "SingleStack" + enum: + - value: "SingleStack" + description: "SingleStack" + - value: "PreferDualStack" + description: "PreferDualStack" + - value: "RequireDualStack" + description: "RequireDualStack" + - variable: ipFamilies + label: "(advanced) IP families" + description: "(advanced) The ip families that should be used" + schema: + show_if: [["type", "!=", "Simple"]] + type: list + default: [] + items: + - variable: ipFamily + label: "IP family" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 10155 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 10155 + + - variable: unencrypted-tcp + label: "Unencrypted Transfers" + description: "Used for unencrypted transfers." + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ipFamilyPolicy + label: "IP Family Policy" + description: "(Advanced) Specify the ip policy" + schema: + show_if: [["type", "!=", "Simple"]] + type: string + default: "SingleStack" + enum: + - value: "SingleStack" + description: "SingleStack" + - value: "PreferDualStack" + description: "PreferDualStack" + - value: "RequireDualStack" + description: "RequireDualStack" + - variable: ipFamilies + label: "(advanced) IP families" + description: "(advanced) The ip families that should be used" + schema: + show_if: [["type", "!=", "Simple"]] + type: list + default: [] + items: + - variable: ipFamily + label: "IP family" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: unencrypted-tcp + label: "Unencrypted Transfers Port Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 21248 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 21248 + + - variable: encrypted-tcp + label: "Encrypted Transfers" + description: "Used for unencrypted transfers." + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ipFamilyPolicy + label: "IP Family Policy" + description: "(Advanced) Specify the ip policy" + schema: + show_if: [["type", "!=", "Simple"]] + type: string + default: "SingleStack" + enum: + - value: "SingleStack" + description: "SingleStack" + - value: "PreferDualStack" + description: "PreferDualStack" + - value: "RequireDualStack" + description: "RequireDualStack" + - variable: ipFamilies + label: "(advanced) IP families" + description: "(advanced) The ip families that should be used" + schema: + show_if: [["type", "!=", "Simple"]] + type: list + default: [] + items: + - variable: ipFamily + label: "IP family" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: encrypted-tcp + label: "Encrypted Transfers Port Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 21249 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 21249 + + - variable: search-udp + label: "Unencrypted Transfers" + description: "Used for searching." + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ipFamilyPolicy + label: "IP Family Policy" + description: "(Advanced) Specify the ip policy" + schema: + show_if: [["type", "!=", "Simple"]] + type: string + default: "SingleStack" + enum: + - value: "SingleStack" + description: "SingleStack" + - value: "PreferDualStack" + description: "PreferDualStack" + - value: "RequireDualStack" + description: "RequireDualStack" + - variable: ipFamilies + label: "(advanced) IP families" + description: "(advanced) The ip families that should be used" + schema: + show_if: [["type", "!=", "Simple"]] + type: list + default: [] + items: + - variable: ipFamily + label: "IP family" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: search-udp + label: "Search Port Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 21248 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "UDP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 21248 + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: externalInterfaces + description: "Add External Interfaces" + label: "Add external Interfaces" + group: "Networking" + schema: + type: list + items: + - variable: interfaceConfiguration + description: "Interface Configuration" + label: "Interface Configuration" + schema: + type: dict + $ref: + - "normalize/interfaceConfiguration" + attrs: + - variable: hostInterface + description: "Please specify host interface" + label: "Host Interface" + schema: + type: string + required: true + $ref: + - "definitions/interface" + - variable: ipam + description: "Define how IP Address will be managed" + label: "IP Address Management" + schema: + type: dict + required: true + attrs: + - variable: type + description: "Specify type for IPAM" + label: "IPAM Type" + schema: + type: string + required: true + enum: + - value: "dhcp" + description: "Use DHCP" + - value: "static" + description: "Use static IP" + show_subquestions_if: "static" + subquestions: + - variable: staticIPConfigurations + label: "Static IP Addresses" + schema: + type: list + items: + - variable: staticIP + label: "Static IP" + schema: + type: ipaddr + cidr: true + - variable: staticRoutes + label: "Static Routes" + schema: + type: list + items: + - variable: staticRouteConfiguration + label: "Static Route Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: destination + label: "Destination" + schema: + type: ipaddr + cidr: true + required: true + - variable: gateway + label: "Gateway" + schema: + type: ipaddr + cidr: false + required: true + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistence + label: "Integrated Persistent Storage" + description: "Integrated Persistent Storage" + group: "Storage and Persistence" + schema: + additional_attrs: true + type: dict + attrs: + - variable: config + label: "App Config Storage" + description: "Stores the Application Configuration." + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: true + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: true + - variable: capabilities + label: "Capabilities" + schema: + additional_attrs: true + type: dict + attrs: + - variable: drop + label: "Drop Capability" + schema: + type: list + default: [] + items: + - variable: dropEntry + label: "" + schema: + type: string + - variable: add + label: "Add Capability" + schema: + type: list + default: [] + items: + - variable: addEntry + label: "" + schema: + type: string + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 568 + - variable: runAsGroup + label: "runAsGroup" + description: The groupID this App of the user running the application" + schema: + type: int + default: 568 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Minimum Resources Required (request)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + + - variable: autoscaling + group: "Advanced" + label: "(Advanced) Horizontal Pod Autoscaler" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: target + label: "Target" + description: "deployment name, defaults to main deployment" + schema: + type: string + default: "" + - variable: minReplicas + label: "Minimum Replicas" + schema: + type: int + default: 1 + - variable: maxReplicas + label: "Maximum Replicas" + schema: + type: int + default: 5 + - variable: targetCPUUtilizationPercentage + label: "Target CPU Utilization Percentage" + schema: + type: int + default: 80 + - variable: targetMemoryUtilizationPercentage + label: "Target Memory Utilization Percentage" + schema: + type: int + default: 80 + - variable: networkPolicy + group: "Advanced" + label: "(Advanced) Network Policy" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: policyType + label: "Policy Type" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ingress" + description: "Ingress" + - value: "egress" + description: "Egress" + - value: "ingress-egress" + description: "Ingress and Egress" + - variable: egress + label: "Egress" + schema: + type: list + default: [] + items: + - variable: egressEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: to + label: "To" + schema: + type: list + default: [] + items: + - variable: toEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: int + - variable: namespaceSelector + label: "namespaceSelector" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + - variable: ingress + label: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: from + label: "From" + schema: + type: list + default: [] + items: + - variable: fromEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: int + - variable: namespaceSelector + label: "namespaceSelector" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + + + - variable: addons + group: "Addons" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: codeserver + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/incubator/airdcpp-webclient/0.0.1/security.md b/incubator/airdcpp-webclient/0.0.1/security.md new file mode 100644 index 00000000000..f3d53edada2 --- /dev/null +++ b/incubator/airdcpp-webclient/0.0.1/security.md @@ -0,0 +1,71 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: airdcpp-webclient/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |

Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-airdcpp-webclient' of Deployment 'RELEASE-NAME-airdcpp-webclient' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-airdcpp-webclient' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-airdcpp-webclient' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-airdcpp-webclient' of Deployment 'RELEASE-NAME-airdcpp-webclient' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-airdcpp-webclient' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-airdcpp-webclient' of Deployment 'RELEASE-NAME-airdcpp-webclient' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-airdcpp-webclient' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-airdcpp-webclient' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/airdcpp-webclient:v2.11.2@sha256:9dfc8d1ca4ff738c9586c902eaf3dc92d914412e5a8f3ec9a5002633a58d7a35 + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| + + + diff --git a/incubator/airdcpp-webclient/0.0.1/templates/common.yaml b/incubator/airdcpp-webclient/0.0.1/templates/common.yaml new file mode 100644 index 00000000000..a6613c2ce21 --- /dev/null +++ b/incubator/airdcpp-webclient/0.0.1/templates/common.yaml @@ -0,0 +1 @@ +{{ include "common.all" . }} diff --git a/incubator/airdcpp-webclient/0.0.1/values.yaml b/incubator/airdcpp-webclient/0.0.1/values.yaml new file mode 100644 index 00000000000..e69de29bb2d diff --git a/incubator/airdcpp-webclient/item.yaml b/incubator/airdcpp-webclient/item.yaml new file mode 100644 index 00000000000..7b584595f1c --- /dev/null +++ b/incubator/airdcpp-webclient/item.yaml @@ -0,0 +1,4 @@ +icon_url: https://truecharts.org/_static/img/appicons/airdcpp-webclient-icon.png +categories: +- media +