Commit new App releases for TrueCharts

Signed-off-by: TrueCharts-Bot <bot@truecharts.org>
This commit is contained in:
TrueCharts-Bot 2022-02-24 23:56:13 +00:00
parent 7eff424ba6
commit 4a097b214a
29 changed files with 4089 additions and 212 deletions

View File

@ -1,26 +0,0 @@
# Default Helm-Values
TrueCharts is primarily build to supply TrueNAS SCALE Apps.
However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file.
Most of our Apps also consume our "common" Helm Chart.
If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart.
You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document.
## Values
| Key | Type | Default | Description |
|-----|------|---------|-------------|
| env | object | See below | environment variables. See [image docs](https://github.com/mbentley/docker-omada-controller) for more details. |
| env.TZ | string | `"UTC"` | Set the container timezone |
| image.pullPolicy | string | `"IfNotPresent"` | image pull policy |
| image.repository | string | `"tccr.io/truecharts/omada-controller"` | image repository |
| image.tag | string | `"v5.0@sha256:31b3cd5a6eee52c2b04a694f8a103447fc98a03b52f3b20c49d867058f15e314"` | image tag |
| persistence | object | See values.yaml | Configure persistence settings for the chart under this key. |
| podSecurityContext.runAsGroup | int | `0` | |
| podSecurityContext.runAsUser | int | `0` | |
| securityContext.readOnlyRootFilesystem | bool | `false` | |
| securityContext.runAsNonRoot | bool | `false` | |
| service | object | See values.yaml | Configures service settings for the chart. |
All Rights Reserved - The TrueCharts Project

View File

@ -1,6 +1,19 @@
# Changelog<br>
<a name="omada-controller-4.0.67"></a>
### [omada-controller-4.0.67](https://github.com/truecharts/apps/compare/omada-controller-4.0.66...omada-controller-4.0.67) (2022-02-24)
#### Chore
* rename `web_portal` to `open` ([#1957](https://github.com/truecharts/apps/issues/1957))
#### Fix
* Use correct ports for v5.x and fix typo ([#1962](https://github.com/truecharts/apps/issues/1962))
<a name="omada-controller-4.0.66"></a>
### [omada-controller-4.0.66](https://github.com/truecharts/apps/compare/omada-controller-4.0.65...omada-controller-4.0.66) (2022-02-21)
@ -84,16 +97,3 @@
### [omada-controller-4.0.57](https://github.com/truecharts/apps/compare/omada-controller-4.0.56...omada-controller-4.0.57) (2022-02-02)
#### Chore
* update helm general non-major helm releases ([#1828](https://github.com/truecharts/apps/issues/1828))
<a name="omada-controller-4.0.56"></a>
### [omada-controller-4.0.56](https://github.com/truecharts/apps/compare/omada-controller-4.0.55...omada-controller-4.0.56) (2022-01-31)
#### Chore
* update docker general non-major docker tags ([#1823](https://github.com/truecharts/apps/issues/1823))

View File

@ -3,4 +3,4 @@ dependencies:
repository: https://truecharts.org
version: 8.16.0
digest: sha256:fa603eaefc7f57029052919d45fd45424e58a69f707af7b657afd49a4b41a435
generated: "2022-02-21T23:20:18.533000381Z"
generated: "2022-02-24T23:52:06.274134939Z"

View File

@ -18,7 +18,7 @@ name: omada-controller
sources:
- https://github.com/mbentley/docker-omada-controller
- https://github.com/truecharts/apps/tree/master/charts/omada-controller
version: 4.0.66
version: 4.0.67
annotations:
truecharts.org/catagories: |
- media

View File

@ -0,0 +1,51 @@
# Default Helm-Values
TrueCharts is primarily build to supply TrueNAS SCALE Apps.
However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file.
Most of our Apps also consume our "common" Helm Chart.
If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart.
You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document.
## Values
| Key | Type | Default | Description |
|-----|------|---------|-------------|
| env.TZ | string | `"UTC"` | |
| image.pullPolicy | string | `"IfNotPresent"` | |
| image.repository | string | `"tccr.io/truecharts/omada-controller"` | |
| image.tag | string | `"v5.0@sha256:31b3cd5a6eee52c2b04a694f8a103447fc98a03b52f3b20c49d867058f15e314"` | |
| persistence.data.enabled | bool | `true` | |
| persistence.data.mountPath | string | `"/data"` | |
| podSecurityContext.runAsGroup | int | `0` | |
| podSecurityContext.runAsUser | int | `0` | |
| securityContext.readOnlyRootFilesystem | bool | `false` | |
| securityContext.runAsNonRoot | bool | `false` | |
| service.comm.enabled | bool | `true` | |
| service.comm.ports.comm.enabled | bool | `true` | |
| service.comm.ports.comm.port | int | `8843` | |
| service.comm.ports.comm.protocol | string | `"HTTPS"` | |
| service.comm.ports.comm.targetPort | int | `8843` | |
| service.main.ports.main.port | int | `8043` | |
| service.main.ports.main.protocol | string | `"HTTPS"` | |
| service.main.ports.main.targetPort | int | `8043` | |
| service.omada-tcp.enabled | bool | `true` | |
| service.omada-tcp.ports.omada-tcp1.enabled | bool | `true` | |
| service.omada-tcp.ports.omada-tcp1.port | int | `29811` | |
| service.omada-tcp.ports.omada-tcp1.targetPort | int | `29811` | |
| service.omada-tcp.ports.omada-tcp2.enabled | bool | `true` | |
| service.omada-tcp.ports.omada-tcp2.port | int | `29812` | |
| service.omada-tcp.ports.omada-tcp2.targetPort | int | `29812` | |
| service.omada-tcp.ports.omada-tcp3.enabled | bool | `true` | |
| service.omada-tcp.ports.omada-tcp3.port | int | `29813` | |
| service.omada-tcp.ports.omada-tcp3.targetPort | int | `29813` | |
| service.omada-tcp.ports.omada-tcp4.enabled | bool | `true` | |
| service.omada-tcp.ports.omada-tcp4.port | int | `29814` | |
| service.omada-tcp.ports.omada-tcp4.targetPort | int | `29814` | |
| service.omada-udp.enabled | bool | `true` | |
| service.omada-udp.ports.omada-udp1.enabled | bool | `true` | |
| service.omada-udp.ports.omada-udp1.port | int | `29810` | |
| service.omada-udp.ports.omada-udp1.protocol | string | `"UDP"` | |
| service.omada-udp.ports.omada-udp1.targetPort | int | `29810` | |
All Rights Reserved - The TrueCharts Project

View File

@ -1,9 +1,6 @@
image:
# -- image repository
repository: tccr.io/truecharts/omada-controller
# -- image tag
tag: v5.0@sha256:31b3cd5a6eee52c2b04a694f8a103447fc98a03b52f3b20c49d867058f15e314
# -- image pull policy
pullPolicy: IfNotPresent
securityContext:
@ -14,14 +11,9 @@ podSecurityContext:
runAsUser: 0
runAsGroup: 0
# -- environment variables. See [image docs](https://github.com/mbentley/docker-omada-controller) for more details.
# @default -- See below
env:
# -- Set the container timezone
TZ: UTC
# -- Configures service settings for the chart.
# @default -- See values.yaml
service:
main:
ports:
@ -33,28 +25,29 @@ service:
enabled: true
ports:
comm:
protocol: HTTPS
enabled: true
port: 8843
targetPor: 8843
targetPort: 8843
omada-tcp:
enabled: true
ports:
omada-tcp1:
enabled: true
port: 29810
targetPort: 29810
omada-tcp2:
enabled: true
port: 29811
targetPort: 29811
omada-tcp3:
omada-tcp2:
enabled: true
port: 29812
targetPort: 29812
omada-tcp4:
omada-tcp3:
enabled: true
port: 29813
targetPort: 29813
omada-tcp4:
enabled: true
port: 29814
targetPort: 29814
omada-udp:
enabled: true
ports:
@ -63,24 +56,7 @@ service:
protocol: UDP
port: 29810
targetPort: 29810
omada-udp2:
enabled: true
protocol: UDP
port: 29811
targetPort: 29811
omada-udp3:
enabled: true
protocol: UDP
port: 29812
targetPort: 29812
omada-udp4:
enabled: true
protocol: UDP
port: 29813
targetPort: 29813
# -- Configure persistence settings for the chart under this key.
# @default -- See values.yaml
persistence:
data:
enabled: true

File diff suppressed because it is too large Load Diff

View File

@ -162,8 +162,8 @@ hide:
| libcups2 | CVE-2019-8842 | LOW | 2.2.7-1ubuntu2.8 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8842">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8842</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://support.apple.com/en-us/HT210788">https://support.apple.com/en-us/HT210788</a><br></details> |
| libcups2 | CVE-2020-10001 | LOW | 2.2.7-1ubuntu2.8 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10001">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10001</a><br><a href="https://linux.oracle.com/cve/CVE-2020-10001.html">https://linux.oracle.com/cve/CVE-2020-10001.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4393.html">https://linux.oracle.com/errata/ELSA-2021-4393.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00027.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00027.html</a><br><a href="https://support.apple.com/en-us/HT212011">https://support.apple.com/en-us/HT212011</a><br></details> |
| libdbus-1-3 | CVE-2020-35512 | LOW | 1.12.2-1ubuntu1.2 | | <details><summary>Expand...</summary><a href="https://bugs.gentoo.org/755392">https://bugs.gentoo.org/755392</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1909101">https://bugzilla.redhat.com/show_bug.cgi?id=1909101</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512</a><br><a href="https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18)">https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18)</a><br><a href="https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32)">https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32)</a><br><a href="https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20)">https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20)</a><br><a href="https://gitlab.freedesktop.org/dbus/dbus/-/issues/305">https://gitlab.freedesktop.org/dbus/dbus/-/issues/305</a><br><a href="https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128">https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2020-35512">https://security-tracker.debian.org/tracker/CVE-2020-35512</a><br><a href="https://ubuntu.com/security/notices/USN-5244-1">https://ubuntu.com/security/notices/USN-5244-1</a><br></details> |
| libexpat1 | CVE-2022-25235 | HIGH | 2.2.5-3ubuntu0.2 | 2.2.5-3ubuntu0.4 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/02/19/1">http://www.openwall.com/lists/oss-security/2022/02/19/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235</a><br><a href="https://github.com/libexpat/libexpat/pull/562">https://github.com/libexpat/libexpat/pull/562</a><br><a href="https://github.com/libexpat/libexpat/pull/562/commits/367ae600b48d74261bbc339b17e9318424049791 (fix)">https://github.com/libexpat/libexpat/pull/562/commits/367ae600b48d74261bbc339b17e9318424049791 (fix)</a><br><a href="https://github.com/libexpat/libexpat/pull/562/commits/97cfdc3fa7dca759880d81e371901f4620279106 (tests)">https://github.com/libexpat/libexpat/pull/562/commits/97cfdc3fa7dca759880d81e371901f4620279106 (tests)</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br></details> |
| libexpat1 | CVE-2022-25236 | HIGH | 2.2.5-3ubuntu0.2 | 2.2.5-3ubuntu0.4 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/02/19/1">http://www.openwall.com/lists/oss-security/2022/02/19/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236</a><br><a href="https://github.com/libexpat/libexpat/pull/561">https://github.com/libexpat/libexpat/pull/561</a><br><a href="https://github.com/libexpat/libexpat/pull/561/commits/2de077423fb22750ebea599677d523b53cb93b1d (test)">https://github.com/libexpat/libexpat/pull/561/commits/2de077423fb22750ebea599677d523b53cb93b1d (test)</a><br><a href="https://github.com/libexpat/libexpat/pull/561/commits/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 (fix)">https://github.com/libexpat/libexpat/pull/561/commits/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 (fix)</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br></details> |
| libexpat1 | CVE-2022-25235 | HIGH | 2.2.5-3ubuntu0.2 | 2.2.5-3ubuntu0.4 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/02/19/1">http://www.openwall.com/lists/oss-security/2022/02/19/1</a><br><a href="https://blog.hartwork.org/posts/expat-2-4-5-released/">https://blog.hartwork.org/posts/expat-2-4-5-released/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235</a><br><a href="https://github.com/libexpat/libexpat/pull/562">https://github.com/libexpat/libexpat/pull/562</a><br><a href="https://github.com/libexpat/libexpat/pull/562/commits/367ae600b48d74261bbc339b17e9318424049791 (fix)">https://github.com/libexpat/libexpat/pull/562/commits/367ae600b48d74261bbc339b17e9318424049791 (fix)</a><br><a href="https://github.com/libexpat/libexpat/pull/562/commits/97cfdc3fa7dca759880d81e371901f4620279106 (tests)">https://github.com/libexpat/libexpat/pull/562/commits/97cfdc3fa7dca759880d81e371901f4620279106 (tests)</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5085">https://www.debian.org/security/2022/dsa-5085</a><br></details> |
| libexpat1 | CVE-2022-25236 | HIGH | 2.2.5-3ubuntu0.2 | 2.2.5-3ubuntu0.4 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/02/19/1">http://www.openwall.com/lists/oss-security/2022/02/19/1</a><br><a href="https://blog.hartwork.org/posts/expat-2-4-5-released/">https://blog.hartwork.org/posts/expat-2-4-5-released/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236</a><br><a href="https://github.com/libexpat/libexpat/pull/561">https://github.com/libexpat/libexpat/pull/561</a><br><a href="https://github.com/libexpat/libexpat/pull/561/commits/2de077423fb22750ebea599677d523b53cb93b1d (test)">https://github.com/libexpat/libexpat/pull/561/commits/2de077423fb22750ebea599677d523b53cb93b1d (test)</a><br><a href="https://github.com/libexpat/libexpat/pull/561/commits/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 (fix)">https://github.com/libexpat/libexpat/pull/561/commits/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 (fix)</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5085">https://www.debian.org/security/2022/dsa-5085</a><br></details> |
| libexpat1 | CVE-2021-46143 | MEDIUM | 2.2.5-3ubuntu0.2 | 2.2.5-3ubuntu0.4 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/17/3">http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143</a><br><a href="https://github.com/libexpat/libexpat/issues/532">https://github.com/libexpat/libexpat/issues/532</a><br><a href="https://github.com/libexpat/libexpat/pull/538">https://github.com/libexpat/libexpat/pull/538</a><br><a href="https://security.netapp.com/advisory/ntap-20220121-0006/">https://security.netapp.com/advisory/ntap-20220121-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
| libexpat1 | CVE-2022-22822 | MEDIUM | 2.2.5-3ubuntu0.2 | 2.2.5-3ubuntu0.4 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/17/3">http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822</a><br><a href="https://github.com/libexpat/libexpat/pull/539">https://github.com/libexpat/libexpat/pull/539</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
| libexpat1 | CVE-2022-22823 | MEDIUM | 2.2.5-3ubuntu0.2 | 2.2.5-3ubuntu0.4 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/17/3">http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823</a><br><a href="https://github.com/libexpat/libexpat/pull/539">https://github.com/libexpat/libexpat/pull/539</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
@ -173,6 +173,7 @@ hide:
| libexpat1 | CVE-2022-22827 | MEDIUM | 2.2.5-3ubuntu0.2 | 2.2.5-3ubuntu0.4 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/17/3">http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827</a><br><a href="https://github.com/libexpat/libexpat/pull/539">https://github.com/libexpat/libexpat/pull/539</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
| libexpat1 | CVE-2022-23852 | MEDIUM | 2.2.5-3ubuntu0.2 | 2.2.5-3ubuntu0.4 | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852</a><br><a href="https://github.com/libexpat/libexpat/pull/550">https://github.com/libexpat/libexpat/pull/550</a><br><a href="https://security.netapp.com/advisory/ntap-20220217-0001/">https://security.netapp.com/advisory/ntap-20220217-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
| libexpat1 | CVE-2022-23990 | MEDIUM | 2.2.5-3ubuntu0.2 | 2.2.5-3ubuntu0.4 | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990</a><br><a href="https://github.com/libexpat/libexpat/pull/551">https://github.com/libexpat/libexpat/pull/551</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/34NXVL2RZC2YZRV74ZQ3RNFB7WCEUP7D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/34NXVL2RZC2YZRV74ZQ3RNFB7WCEUP7D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7FF2UH7MPXKTADYSJUAHI2Y5UHBSHUH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7FF2UH7MPXKTADYSJUAHI2Y5UHBSHUH/</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
| libexpat1 | CVE-2022-25314 | MEDIUM | 2.2.5-3ubuntu0.2 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/02/19/1">http://www.openwall.com/lists/oss-security/2022/02/19/1</a><br><a href="https://blog.hartwork.org/posts/expat-2-4-5-released/">https://blog.hartwork.org/posts/expat-2-4-5-released/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314</a><br><a href="https://github.com/libexpat/libexpat/pull/560">https://github.com/libexpat/libexpat/pull/560</a><br><a href="https://www.debian.org/security/2022/dsa-5085">https://www.debian.org/security/2022/dsa-5085</a><br></details> |
| libexpat1 | CVE-2021-45960 | LOW | 2.2.5-3ubuntu0.2 | 2.2.5-3ubuntu0.4 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/17/3">http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1217609">https://bugzilla.mozilla.org/show_bug.cgi?id=1217609</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960</a><br><a href="https://github.com/libexpat/libexpat/issues/531">https://github.com/libexpat/libexpat/issues/531</a><br><a href="https://github.com/libexpat/libexpat/pull/534">https://github.com/libexpat/libexpat/pull/534</a><br><a href="https://github.com/libexpat/libexpat/pull/534/commits/0adcb34c49bee5b19bd29b16a578c510c23597ea">https://github.com/libexpat/libexpat/pull/534/commits/0adcb34c49bee5b19bd29b16a578c510c23597ea</a><br><a href="https://security.netapp.com/advisory/ntap-20220121-0004/">https://security.netapp.com/advisory/ntap-20220121-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
| libgcc1 | CVE-2020-13844 | MEDIUM | 8.4.0-1ubuntu1~18.04 | | <details><summary>Expand...</summary><a href="http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html">http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html">http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844</a><br><a href="https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability">https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability</a><br><a href="https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation">https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation</a><br><a href="https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions">https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions</a><br><a href="https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html">https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8</a><br></details> |
| libgnutls30 | CVE-2018-16868 | LOW | 3.5.18-1ubuntu1.5 | | <details><summary>Expand...</summary><a href="http://cat.eyalro.net/">http://cat.eyalro.net/</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00068.html">http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00068.html</a><br><a href="http://www.securityfocus.com/bid/106080">http://www.securityfocus.com/bid/106080</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16868">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16868</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16868">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16868</a><br></details> |

View File

@ -0,0 +1,99 @@
# Changelog<br>
<a name="focalboard-5.0.0"></a>
### [focalboard-5.0.0](https://github.com/truecharts/apps/compare/focalboard-4.0.42...focalboard-5.0.0) (2022-02-24)
#### Chore
* rename `web_portal` to `open` ([#1957](https://github.com/truecharts/apps/issues/1957))
#### Feat
* Use official image ([#1952](https://github.com/truecharts/apps/issues/1952))
<a name="focalboard-4.0.42"></a>
### [focalboard-4.0.42](https://github.com/truecharts/apps/compare/focalboard-4.0.41...focalboard-4.0.42) (2022-02-21)
#### Chore
* update helm general non-major helm releases ([#1927](https://github.com/truecharts/apps/issues/1927))
<a name="focalboard-4.0.41"></a>
### [focalboard-4.0.41](https://github.com/truecharts/apps/compare/focalboard-4.0.40...focalboard-4.0.41) (2022-02-15)
#### Chore
* update helm general non-major helm releases ([#1901](https://github.com/truecharts/apps/issues/1901))
<a name="focalboard-4.0.40"></a>
### [focalboard-4.0.40](https://github.com/truecharts/apps/compare/focalboard-4.0.39...focalboard-4.0.40) (2022-02-08)
#### Chore
* fix links on `Chart.yaml` ([#1862](https://github.com/truecharts/apps/issues/1862))
* update helm general non-major helm releases ([#1871](https://github.com/truecharts/apps/issues/1871))
<a name="focalboard-4.0.39"></a>
### [focalboard-4.0.39](https://github.com/truecharts/apps/compare/focalboard-4.0.38...focalboard-4.0.39) (2022-02-06)
#### Chore
* update helm chart common to v8.15.0 ([#1859](https://github.com/truecharts/apps/issues/1859))
<a name="focalboard-4.0.38"></a>
### [focalboard-4.0.38](https://github.com/truecharts/apps/compare/focalboard-4.0.37...focalboard-4.0.38) (2022-02-05)
#### Chore
* update helm general non-major helm releases ([#1852](https://github.com/truecharts/apps/issues/1852))
<a name="focalboard-4.0.37"></a>
### [focalboard-4.0.37](https://github.com/truecharts/apps/compare/focalboard-4.0.36...focalboard-4.0.37) (2022-02-02)
#### Chore
* update helm general non-major helm releases ([#1828](https://github.com/truecharts/apps/issues/1828))
<a name="focalboard-4.0.36"></a>
### [focalboard-4.0.36](https://github.com/truecharts/apps/compare/focalboard-4.0.35...focalboard-4.0.36) (2022-01-25)
#### Chore
* update helm general non-major helm releases ([#1791](https://github.com/truecharts/apps/issues/1791))
<a name="focalboard-4.0.35"></a>
### [focalboard-4.0.35](https://github.com/truecharts/apps/compare/focalboard-4.0.34...focalboard-4.0.35) (2022-01-22)
#### Chore
* update helm general non-major helm releases ([#1766](https://github.com/truecharts/apps/issues/1766))
<a name="focalboard-4.0.34"></a>
### [focalboard-4.0.34](https://github.com/truecharts/apps/compare/focalboard-4.0.33...focalboard-4.0.34) (2022-01-21)
#### Chore
* update helm general non-major helm releases ([#1759](https://github.com/truecharts/apps/issues/1759))
#### Fix
* set additional_attrs: true on all dicts ([#1750](https://github.com/truecharts/apps/issues/1750))

View File

@ -0,0 +1,8 @@
# Configuration Options
##### Connecting to other apps
If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our "Linking Apps Internally" quick-start guide:
https://truecharts.org/manual/Quick-Start%20Guides/14-linking-apps/
##### Available config options
In the future this page is going to contain an automated list of options available in the installation/edit UI.

View File

@ -0,0 +1,9 @@
dependencies:
- name: common
repository: https://truecharts.org
version: 8.16.0
- name: postgresql
repository: https://truecharts.org/
version: 6.0.69
digest: sha256:c61dcd2a0f6045f01a5d3f9fc9ebdc3d0f935af8331ed54696fbf49100cf96d5
generated: "2022-02-24T23:52:06.536075162Z"

View File

@ -0,0 +1,34 @@
apiVersion: v2
appVersion: "0.14.0"
dependencies:
- name: common
repository: https://truecharts.org
version: 8.16.0
- condition: postgresql.enabled
name: postgresql
repository: https://truecharts.org/
version: 6.0.69
description: Focalboard is an open source, self-hosted alternative to Trello, Notion,
and Asana.
home: https://github.com/truecharts/apps/tree/master/charts/stable/focalboard
icon: https://truecharts.org/_static/img/appicons/focalboard-icon.png
keywords:
- focalboard
- kanban
- project management
kubeVersion: '>=1.16.0-0'
maintainers:
- email: info@truecharts.org
name: TrueCharts
url: https://truecharts.org
name: focalboard
sources:
- https://www.focalboard.com/
- https://github.com/mattermost/focalboard
- https://github.com/FlipEnergy/container-images/blob/main/focalboard
version: 5.0.0
annotations:
truecharts.org/catagories: |
- media
truecharts.org/SCALE-support: "true"
truecharts.org/grade: U

View File

@ -0,0 +1,40 @@
# Introduction
Focalboard is an open source, self-hosted alternative to Trello, Notion, and Asana.
TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation.
**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)**
## Source Code
* <https://www.focalboard.com/>
* <https://github.com/mattermost/focalboard>
* <https://github.com/FlipEnergy/container-images/blob/main/focalboard>
## Requirements
Kubernetes: `>=1.16.0-0`
## Dependencies
| Repository | Name | Version |
|------------|------|---------|
| https://truecharts.org/ | postgresql | 6.0.69 |
| https://truecharts.org | common | 8.16.0 |
## Installing the Chart
To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/03-Installing-an-App/).
## Uninstalling the Chart
To remove this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/07-Deleting-an-App/).
## Support
- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Open-Apps/) first.
- See the [Wiki](https://truecharts.org)
- Check our [Discord](https://discord.gg/tVsPTHWTtr)
- Open a [issue](https://github.com/truecharts/apps/issues/new/choose)
---
All Rights Reserved - The TrueCharts Project

View File

@ -0,0 +1,3 @@
Focalboard is an open source, self-hosted alternative to Trello, Notion, and Asana.
This App is supplied by TrueCharts, for more information please visit https://truecharts.org

Binary file not shown.

Binary file not shown.

View File

@ -0,0 +1,31 @@
# Default Helm-Values
TrueCharts is primarily build to supply TrueNAS SCALE Apps.
However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file.
Most of our Apps also consume our "common" Helm Chart.
If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart.
You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document.
## Values
| Key | Type | Default | Description |
|-----|------|---------|-------------|
| env | object | `{}` | |
| focalboard.enableLocalMode | bool | `true` | |
| focalboard.localOnly | bool | `false` | |
| focalboard.serverRoot | string | `"http://localhost:10072"` | |
| focalboard.telemetry | bool | `false` | |
| image.pullPolicy | string | `"IfNotPresent"` | |
| image.repository | string | `"tccr.io/truecharts/focalboard"` | |
| image.tag | string | `"v0.14.0@sha256:489150257a4638e83a81e3e07afbb76fd891ae47c8b258b0a271ebcaa95638c3"` | |
| persistence.uploads.enabled | bool | `true` | |
| persistence.uploads.mountPath | string | `"/uploads"` | |
| postgresql.enabled | bool | `true` | |
| postgresql.existingSecret | string | `"dbcreds"` | |
| postgresql.postgresqlDatabase | string | `"focalboard"` | |
| postgresql.postgresqlUsername | string | `"focalboard"` | |
| securityContext.readOnlyRootFilesystem | bool | `false` | |
| service.main.ports.main.port | int | `10072` | |
All Rights Reserved - The TrueCharts Project

View File

@ -0,0 +1,32 @@
image:
repository: tccr.io/truecharts/focalboard
pullPolicy: IfNotPresent
tag: v0.14.0@sha256:489150257a4638e83a81e3e07afbb76fd891ae47c8b258b0a271ebcaa95638c3
securityContext:
readOnlyRootFilesystem: false
env: {}
focalboard:
serverRoot: "http://localhost:10072"
telemetry: false
localOnly: false
enableLocalMode: true
service:
main:
ports:
main:
port: 10072
persistence:
uploads:
enabled: true
mountPath: "/uploads"
postgresql:
enabled: true
existingSecret: "dbcreds"
postgresqlUsername: focalboard
postgresqlDatabase: focalboard

View File

@ -26,7 +26,7 @@ groups:
- name: "Advanced"
description: "Advanced Configuration"
portals:
web_portal:
open:
protocols:
- "$kubernetes-resource_configmap_portal_protocol"
host:
@ -189,6 +189,37 @@ questions:
type: string
default: "002"
- variable: focalboard
group: "Container Configuration"
label: "Focalboard Configuration"
schema:
additional_attrs: true
type: dict
attrs:
- variable: serverRoot
label: "serverRoot"
description: "Root URL of the server. eg. https://focal.mydomain.com"
schema:
type: string
default: "http://localhost:10072"
- variable: telemetry
label: "telemetry"
description: "Enable health diagnostics telemetry "
schema:
type: boolean
default: false
- variable: localOnly
label: "localOnly"
description: "Only allow connections from localhost"
schema:
type: boolean
default: false
- variable: enableLocalMode
label: "enableLocalMode"
description: "Enable admin APIs on local Unix port"
schema:
type: boolean
default: true
- variable: envList
label: "Image environment"
group: "Container Configuration"
@ -386,7 +417,7 @@ questions:
description: "This port exposes the container port on the service"
schema:
type: int
default: 8043
default: 10072
required: true
- variable: advanced
label: "Show Advanced settings"
@ -399,7 +430,7 @@ questions:
label: "Port Type"
schema:
type: string
default: "HTTPS"
default: "HTTP"
enum:
- value: HTTP
description: "HTTP"
@ -421,134 +452,7 @@ questions:
description: "The internal(!) port on the container the Application runs on"
schema:
type: int
default: 8043
- variable: comm
label: "Omada Controller User HTTPS portal"
description: "Omada Controller User HTTPS portal"
schema:
additional_attrs: true
type: dict
attrs:
- variable: enabled
label: "Enable the service"
schema:
type: boolean
default: true
hidden: true
- variable: type
label: "Service Type"
description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer"
schema:
type: string
default: "Simple"
enum:
- value: "Simple"
description: "Simple"
- value: "ClusterIP"
description: "ClusterIP"
- value: "NodePort"
description: "NodePort (Advanced)"
- value: "LoadBalancer"
description: "LoadBalancer (Advanced)"
- variable: loadBalancerIP
label: "LoadBalancer IP"
description: "LoadBalancerIP"
schema:
show_if: [["type", "=", "LoadBalancer"]]
type: string
default: ""
- variable: externalIPs
label: "External IP's"
description: "External IP's"
schema:
show_if: [["type", "=", "LoadBalancer"]]
type: list
default: []
items:
- variable: externalIP
label: "External IP"
schema:
type: string
- variable: ipFamilyPolicy
label: "IP Family Policy"
description: "(Advanced) Specify the ip policy"
schema:
show_if: [["type", "!=", "Simple"]]
type: string
default: "SingleStack"
enum:
- value: "SingleStack"
description: "SingleStack"
- value: "PreferDualStack"
description: "PreferDualStack"
- value: "RequireDualStack"
description: "RequireDualStack"
- variable: ipFamilies
label: "(advanced) IP families"
description: "(advanced) The ip families that should be used"
schema:
show_if: [["type", "!=", "Simple"]]
type: list
default: []
items:
- variable: ipFamily
label: "IP family"
schema:
type: string
- variable: ports
label: "Service's Port(s) Configuration"
schema:
additional_attrs: true
type: dict
attrs:
- variable: comm
label: "TCP Service Port Configuration"
schema:
additional_attrs: true
type: dict
attrs:
- variable: port
label: "Port"
description: "This port exposes the container port on the service"
schema:
type: int
default: 8843
required: true
- variable: advanced
label: "Show Advanced settings"
schema:
type: boolean
default: false
show_subquestions_if: true
subquestions:
- variable: protocol
label: "Port Type"
schema:
type: string
default: "HTTPS"
enum:
- value: HTTP
description: "HTTP"
- value: "HTTPS"
description: "HTTPS"
- value: TCP
description: "TCP"
- value: "UDP"
description: "UDP"
- variable: nodePort
label: "Node Port (Optional)"
description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer"
schema:
type: int
min: 9000
max: 65535
- variable: targetPort
label: "Target Port"
description: "The internal(!) port on the container the Application runs on"
schema:
type: int
default: 8843
default: 10072
- variable: serviceexpert
group: "Networking and Services"
@ -829,9 +733,9 @@ questions:
additional_attrs: true
type: dict
attrs:
- variable: data
label: "App data Storage"
description: "Stores the Application data."
- variable: uploads
label: "App Uploads Storage"
description: "Stores the Application Uploads."
schema:
additional_attrs: true
type: dict
@ -1565,7 +1469,7 @@ questions:
label: "runAsNonRoot"
schema:
type: boolean
default: false
default: true
- variable: capabilities
label: "Capabilities"
schema:
@ -1605,13 +1509,13 @@ questions:
description: "The UserID of the user running the application"
schema:
type: int
default: 0
default: 568
- variable: runAsGroup
label: "runAsGroup"
description: The groupID this App of the user running the application"
schema:
type: int
default: 0
default: 568
- variable: fsGroup
label: "fsGroup"
description: "The group that should own ALL storage."

File diff suppressed because one or more lines are too long

View File

@ -0,0 +1,31 @@
{{- define "focalboard.configmap" -}}
{{- $pgPass := .Values.postgresql.postgresqlPassword | trimAll "\"" }}
{{- $pgUser := .Values.postgresql.postgresqlUsername }}
{{- $pgDB := .Values.postgresql.postgresqlDatabase }}
---
apiVersion: v1
kind: ConfigMap
metadata:
name: {{ include "common.names.fullname" . }}-install
labels:
{{- include "common.labels" . | nindent 4 }}
data:
focalboard-config: |-
{
"serverRoot": "{{ .Values.focalboard.serverRoot }}",
"port": {{ .Values.service.main.ports.main.port }},
"dbtype": "postgres",
"dbconfig": "{{ printf "postgresql://%v:%v@%v-postgresql:5432/%v?sslmode=disable" $pgUser $pgPass .Release.Name $pgDB }}",
"postgres_dbconfig": "dbname=$pgDB sslmode=disable",
"useSSL": false,
"webpath": "./pack",
"filespath": "/uploads",
"telemetry": {{ .Values.focalboard.telemetry }},
"session_expire_time": 2592000,
"session_refresh_time": 18000,
"localOnly": {{ .Values.focalboard.localOnly }},
"enableLocalMode": {{ .Values.focalboard.enableLocalMode }},
"localModeSocketLocation": "/var/tmp/focalboard_local.socket"
}
{{- end -}}

View File

@ -0,0 +1,20 @@
{{- include "common.setup" . }}
{{/* Append the hardcoded settings */}}
{{- define "focalboard.harcodedValues" -}}
persistence:
focalboard-config:
enabled: "true"
mountPath: "/opt/focalboard/config.json"
subPath: "focalboard-config"
type: "custom"
volumeSpec:
configMap:
name: {{ printf "%v-install" (include "common.names.fullname" .) }}
{{- end -}}
{{- $_ := mergeOverwrite .Values (include "focalboard.harcodedValues" . | fromYaml) -}}
{{- include "focalboard.configmap" . }}
{{/* Render the templates */}}
{{ include "common.postSetup" . }}

View File