Commit new App releases for TrueCharts
Signed-off-by: TrueCharts-Bot <bot@truecharts.org>
This commit is contained in:
parent
0984411898
commit
5354d1fc0e
|
@ -1,6 +0,0 @@
|
|||
dependencies:
|
||||
- name: common
|
||||
repository: https://truecharts.org
|
||||
version: 8.15.4
|
||||
digest: sha256:d6aca168828f3fef09de9fbc634c303d040d74299b508a7cedf473f66f5a4503
|
||||
generated: "2022-02-21T18:44:38.443924501Z"
|
Binary file not shown.
|
@ -1,6 +1,19 @@
|
|||
# Changelog<br>
|
||||
|
||||
|
||||
<a name="valheim-2.0.25"></a>
|
||||
### [valheim-2.0.25](https://github.com/truecharts/apps/compare/valheim-2.0.24...valheim-2.0.25) (2022-02-22)
|
||||
|
||||
#### Chore
|
||||
|
||||
* update helm chart common to v8.16.0 ([#1925](https://github.com/truecharts/apps/issues/1925))
|
||||
|
||||
#### Fix
|
||||
|
||||
* map ingress to correct service ([#1929](https://github.com/truecharts/apps/issues/1929))
|
||||
|
||||
|
||||
|
||||
<a name="valheim-2.0.24"></a>
|
||||
### [valheim-2.0.24](https://github.com/truecharts/apps/compare/valheim-2.0.23...valheim-2.0.24) (2022-02-21)
|
||||
|
||||
|
@ -84,16 +97,3 @@
|
|||
|
||||
<a name="valheim-2.0.15"></a>
|
||||
### [valheim-2.0.15](https://github.com/truecharts/apps/compare/valheim-2.0.14...valheim-2.0.15) (2022-01-22)
|
||||
|
||||
#### Chore
|
||||
|
||||
* update helm general non-major helm releases ([#1766](https://github.com/truecharts/apps/issues/1766))
|
||||
|
||||
|
||||
|
||||
<a name="valheim-2.0.14"></a>
|
||||
### [valheim-2.0.14](https://github.com/truecharts/apps/compare/valheim-2.0.13...valheim-2.0.14) (2022-01-21)
|
||||
|
||||
#### Chore
|
||||
|
||||
* update helm general non-major helm releases ([#1759](https://github.com/truecharts/apps/issues/1759))
|
|
@ -0,0 +1,6 @@
|
|||
dependencies:
|
||||
- name: common
|
||||
repository: https://truecharts.org
|
||||
version: 8.16.0
|
||||
digest: sha256:fa603eaefc7f57029052919d45fd45424e58a69f707af7b657afd49a4b41a435
|
||||
generated: "2022-02-22T10:28:21.925380558Z"
|
|
@ -3,7 +3,7 @@ appVersion: "latest"
|
|||
dependencies:
|
||||
- name: common
|
||||
repository: https://truecharts.org
|
||||
version: 8.15.4
|
||||
version: 8.16.0
|
||||
description: Valheim dedicated gameserver with automatic update and world backup support
|
||||
home: https://github.com/truecharts/apps/tree/master/charts/stable/valheim
|
||||
icon: https://truecharts.org/_static/img/appicons/valheim-icon.png
|
||||
|
@ -18,7 +18,7 @@ name: valheim
|
|||
sources:
|
||||
- https://github.com/lloesche/valheim-server-docker
|
||||
- https://hub.docker.com/r/lloesche/valheim-server
|
||||
version: 2.0.24
|
||||
version: 2.0.25
|
||||
annotations:
|
||||
truecharts.org/catagories: |
|
||||
- media
|
|
@ -18,7 +18,7 @@ Kubernetes: `>=1.16.0-0`
|
|||
|
||||
| Repository | Name | Version |
|
||||
|------------|------|---------|
|
||||
| https://truecharts.org | common | 8.15.4 |
|
||||
| https://truecharts.org | common | 8.16.0 |
|
||||
|
||||
## Installing the Chart
|
||||
|
|
@ -28,6 +28,7 @@ You will, however, be able to use all values referenced in the common chart here
|
|||
| image.pullPolicy | string | `"IfNotPresent"` | |
|
||||
| image.repository | string | `"tccr.io/truecharts/valheim-server"` | |
|
||||
| image.tag | string | `"latest@sha256:8f87fda54429923cac3601d581d6dc0ff273ef6438374e9f4b1e5ac1141b461d"` | |
|
||||
| ingress.supervisor.autoLink | bool | `true` | |
|
||||
| persistence.backups.enabled | bool | `true` | |
|
||||
| persistence.backups.mountPath | string | `"/backups"` | |
|
||||
| persistence.config.enabled | bool | `true` | |
|
|
@ -60,6 +60,10 @@ service:
|
|||
port: 2458
|
||||
protocol: UDP
|
||||
|
||||
ingress:
|
||||
supervisor:
|
||||
autoLink: true
|
||||
|
||||
persistence:
|
||||
config:
|
||||
enabled: true
|
|
@ -294,11 +294,11 @@ hide:
|
|||
| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://curl.se/docs/CVE-2021-22923.html">https://curl.se/docs/CVE-2021-22923.html</a><br><a href="https://hackerone.com/reports/1213181">https://hackerone.com/reports/1213181</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22923.html">https://linux.oracle.com/cve/CVE-2021-22923.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
|
||||
| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://curl.se/docs/CVE-2021-22924.html">https://curl.se/docs/CVE-2021-22924.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924</a><br><a href="https://hackerone.com/reports/1223565">https://hackerone.com/reports/1223565</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22924.html">https://linux.oracle.com/cve/CVE-2021-22924.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html">https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5021-1">https://ubuntu.com/security/notices/USN-5021-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
|
||||
| libexpat1 | CVE-2022-25315 | HIGH | 2.2.6-2+deb10u2 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/02/19/1">http://www.openwall.com/lists/oss-security/2022/02/19/1</a><br><a href="https://github.com/libexpat/libexpat/pull/559">https://github.com/libexpat/libexpat/pull/559</a><br></details> |
|
||||
| libexpat1 | CVE-2022-25235 | MEDIUM | 2.2.6-2+deb10u2 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/02/19/1">http://www.openwall.com/lists/oss-security/2022/02/19/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235</a><br><a href="https://github.com/libexpat/libexpat/pull/562">https://github.com/libexpat/libexpat/pull/562</a><br><a href="https://github.com/libexpat/libexpat/pull/562/commits/367ae600b48d74261bbc339b17e9318424049791 (fix)">https://github.com/libexpat/libexpat/pull/562/commits/367ae600b48d74261bbc339b17e9318424049791 (fix)</a><br><a href="https://github.com/libexpat/libexpat/pull/562/commits/97cfdc3fa7dca759880d81e371901f4620279106 (tests)">https://github.com/libexpat/libexpat/pull/562/commits/97cfdc3fa7dca759880d81e371901f4620279106 (tests)</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br></details> |
|
||||
| libexpat1 | CVE-2022-25236 | MEDIUM | 2.2.6-2+deb10u2 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/02/19/1">http://www.openwall.com/lists/oss-security/2022/02/19/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236</a><br><a href="https://github.com/libexpat/libexpat/pull/561">https://github.com/libexpat/libexpat/pull/561</a><br><a href="https://github.com/libexpat/libexpat/pull/561/commits/2de077423fb22750ebea599677d523b53cb93b1d (test)">https://github.com/libexpat/libexpat/pull/561/commits/2de077423fb22750ebea599677d523b53cb93b1d (test)</a><br><a href="https://github.com/libexpat/libexpat/pull/561/commits/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 (fix)">https://github.com/libexpat/libexpat/pull/561/commits/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 (fix)</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br></details> |
|
||||
| libexpat1 | CVE-2022-25313 | MEDIUM | 2.2.6-2+deb10u2 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/02/19/1">http://www.openwall.com/lists/oss-security/2022/02/19/1</a><br><a href="https://github.com/libexpat/libexpat/pull/558">https://github.com/libexpat/libexpat/pull/558</a><br></details> |
|
||||
| libexpat1 | CVE-2022-25314 | MEDIUM | 2.2.6-2+deb10u2 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/02/19/1">http://www.openwall.com/lists/oss-security/2022/02/19/1</a><br><a href="https://github.com/libexpat/libexpat/pull/560">https://github.com/libexpat/libexpat/pull/560</a><br></details> |
|
||||
| libexpat1 | CVE-2013-0340 | LOW | 2.2.6-2+deb10u2 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2013/02/22/3">http://openwall.com/lists/oss-security/2013/02/22/3</a><br><a href="http://seclists.org/fulldisclosure/2021/Oct/61">http://seclists.org/fulldisclosure/2021/Oct/61</a><br><a href="http://seclists.org/fulldisclosure/2021/Oct/62">http://seclists.org/fulldisclosure/2021/Oct/62</a><br><a href="http://seclists.org/fulldisclosure/2021/Oct/63">http://seclists.org/fulldisclosure/2021/Oct/63</a><br><a href="http://seclists.org/fulldisclosure/2021/Sep/33">http://seclists.org/fulldisclosure/2021/Sep/33</a><br><a href="http://seclists.org/fulldisclosure/2021/Sep/34">http://seclists.org/fulldisclosure/2021/Sep/34</a><br><a href="http://seclists.org/fulldisclosure/2021/Sep/35">http://seclists.org/fulldisclosure/2021/Sep/35</a><br><a href="http://seclists.org/fulldisclosure/2021/Sep/38">http://seclists.org/fulldisclosure/2021/Sep/38</a><br><a href="http://seclists.org/fulldisclosure/2021/Sep/39">http://seclists.org/fulldisclosure/2021/Sep/39</a><br><a href="http://seclists.org/fulldisclosure/2021/Sep/40">http://seclists.org/fulldisclosure/2021/Sep/40</a><br><a href="http://securitytracker.com/id?1028213">http://securitytracker.com/id?1028213</a><br><a href="http://www.openwall.com/lists/oss-security/2013/04/12/6">http://www.openwall.com/lists/oss-security/2013/04/12/6</a><br><a href="http://www.openwall.com/lists/oss-security/2021/10/07/4">http://www.openwall.com/lists/oss-security/2021/10/07/4</a><br><a href="http://www.osvdb.org/90634">http://www.osvdb.org/90634</a><br><a href="http://www.securityfocus.com/bid/58233">http://www.securityfocus.com/bid/58233</a><br><a href="https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E">https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E">https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E</a><br><a href="https://security.gentoo.org/glsa/201701-21">https://security.gentoo.org/glsa/201701-21</a><br><a href="https://support.apple.com/kb/HT212804">https://support.apple.com/kb/HT212804</a><br><a href="https://support.apple.com/kb/HT212805">https://support.apple.com/kb/HT212805</a><br><a href="https://support.apple.com/kb/HT212807">https://support.apple.com/kb/HT212807</a><br><a href="https://support.apple.com/kb/HT212814">https://support.apple.com/kb/HT212814</a><br><a href="https://support.apple.com/kb/HT212815">https://support.apple.com/kb/HT212815</a><br><a href="https://support.apple.com/kb/HT212819">https://support.apple.com/kb/HT212819</a><br></details> |
|
||||
| libexpat1 | CVE-2022-25235 | UNKNOWN | 2.2.6-2+deb10u2 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/02/19/1">http://www.openwall.com/lists/oss-security/2022/02/19/1</a><br><a href="https://github.com/libexpat/libexpat/pull/562">https://github.com/libexpat/libexpat/pull/562</a><br></details> |
|
||||
| libexpat1 | CVE-2022-25236 | UNKNOWN | 2.2.6-2+deb10u2 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/02/19/1">http://www.openwall.com/lists/oss-security/2022/02/19/1</a><br><a href="https://github.com/libexpat/libexpat/pull/561">https://github.com/libexpat/libexpat/pull/561</a><br></details> |
|
||||
| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
|
||||
| libfdisk1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br></details> |
|
||||
| libflac8 | CVE-2020-0499 | MEDIUM | 1.3.2-3 | | <details><summary>Expand...</summary><a href="https://android.googlesource.com/platform/external/flac/+/029048f823ced50f63a92e25073427ec3a9bd909%5E%21/#F0">https://android.googlesource.com/platform/external/flac/+/029048f823ced50f63a92e25073427ec3a9bd909%5E%21/#F0</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0499">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0499</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/01/msg00001.html">https://lists.debian.org/debian-lts-announce/2021/01/msg00001.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33W6XZAAEJYRGU3XYHRO7XSYEA7YACUB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33W6XZAAEJYRGU3XYHRO7XSYEA7YACUB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KNZYTAU5UWBVXVJ4VHDWPR66ZVDLQZRE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KNZYTAU5UWBVXVJ4VHDWPR66ZVDLQZRE/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPA5GAEKPXKAHGHHBI4X7AFNI4BMOVG3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPA5GAEKPXKAHGHHBI4X7AFNI4BMOVG3/</a><br><a href="https://source.android.com/security/bulletin/pixel/2020-12-01">https://source.android.com/security/bulletin/pixel/2020-12-01</a><br></details> |
|
||||
|
@ -560,7 +560,7 @@ hide:
|
|||
| linux-libc-dev | CVE-2021-4202 | LOW | 4.19.208-1 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=3e3b5dfcd16a3e254aab61bd1e8c417dd4503102">https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=3e3b5dfcd16a3e254aab61bd1e8c417dd4503102</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=48b71a9e66c2eab60564b1b1c85f4928ed04e406">https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=48b71a9e66c2eab60564b1b1c85f4928ed04e406</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=86cdf8e38792545161dbe3350a7eced558ba4d15">https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=86cdf8e38792545161dbe3350a7eced558ba4d15</a><br><a href="https://ubuntu.com/security/notices/USN-5265-1">https://ubuntu.com/security/notices/USN-5265-1</a><br><a href="https://ubuntu.com/security/notices/USN-5294-1">https://ubuntu.com/security/notices/USN-5294-1</a><br></details> |
|
||||
| linux-libc-dev | CVE-2022-0487 | LOW | 4.19.208-1 | | <details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2044561">https://bugzilla.redhat.com/show_bug.cgi?id=2044561</a><br><a href="https://bugzilla.suse.com/show_bug.cgi?id=1194516">https://bugzilla.suse.com/show_bug.cgi?id=1194516</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=42933c8aa14be1caa9eda41f65cde8a3a95d3e39">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=42933c8aa14be1caa9eda41f65cde8a3a95d3e39</a><br><a href="https://lore.kernel.org/all/20220114075934.302464-1-gregkh@linuxfoundation.org/">https://lore.kernel.org/all/20220114075934.302464-1-gregkh@linuxfoundation.org/</a><br><a href="https://lore.kernel.org/all/20220127071638.4057899-1-gregkh@linuxfoundation.org/">https://lore.kernel.org/all/20220127071638.4057899-1-gregkh@linuxfoundation.org/</a><br></details> |
|
||||
| linux-libc-dev | CVE-2022-24448 | LOW | 4.19.208-1 | | <details><summary>Expand...</summary><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448</a><br><a href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac795161c93699d600db16c1a8cc23a65a1eceaf">https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac795161c93699d600db16c1a8cc23a65a1eceaf</a><br><a href="https://github.com/torvalds/linux/commit/ac795161c93699d600db16c1a8cc23a65a1eceaf">https://github.com/torvalds/linux/commit/ac795161c93699d600db16c1a8cc23a65a1eceaf</a><br><a href="https://www.spinics.net/lists/stable/msg531976.html">https://www.spinics.net/lists/stable/msg531976.html</a><br></details> |
|
||||
| linux-libc-dev | CVE-2022-25375 | UNKNOWN | 4.19.208-1 | | <details><summary>Expand...</summary><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10</a><br><a href="https://github.com/szymonh/rndis-co">https://github.com/szymonh/rndis-co</a><br><a href="https://github.com/torvalds/linux/commit/38ea1eac7d88072bbffb630e2b3db83ca649b826">https://github.com/torvalds/linux/commit/38ea1eac7d88072bbffb630e2b3db83ca649b826</a><br></details> |
|
||||
| linux-libc-dev | CVE-2022-25375 | UNKNOWN | 4.19.208-1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/02/21/1">http://www.openwall.com/lists/oss-security/2022/02/21/1</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10</a><br><a href="https://github.com/szymonh/rndis-co">https://github.com/szymonh/rndis-co</a><br><a href="https://github.com/torvalds/linux/commit/38ea1eac7d88072bbffb630e2b3db83ca649b826">https://github.com/torvalds/linux/commit/38ea1eac7d88072bbffb630e2b3db83ca649b826</a><br></details> |
|
||||
| locales | CVE-2021-33574 | CRITICAL | 2.28-10 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574</a><br><a href="https://linux.oracle.com/cve/CVE-2021-33574.html">https://linux.oracle.com/cve/CVE-2021-33574.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210629-0005/">https://security.netapp.com/advisory/ntap-20210629-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896">https://sourceware.org/bugzilla/show_bug.cgi?id=27896</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1">https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1</a><br></details> |
|
||||
| locales | CVE-2021-35942 | CRITICAL | 2.28-10 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942</a><br><a href="https://linux.oracle.com/cve/CVE-2021-35942.html">https://linux.oracle.com/cve/CVE-2021-35942.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://security.netapp.com/advisory/ntap-20210827-0005/">https://security.netapp.com/advisory/ntap-20210827-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28011">https://sourceware.org/bugzilla/show_bug.cgi?id=28011</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c">https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c</a><br><a href="https://sourceware.org/glibc/wiki/Security%20Exceptions">https://sourceware.org/glibc/wiki/Security%20Exceptions</a><br></details> |
|
||||
| locales | CVE-2022-23218 | CRITICAL | 2.28-10 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28768">https://sourceware.org/bugzilla/show_bug.cgi?id=28768</a><br></details> |
|
|
@ -0,0 +1,99 @@
|
|||
# Changelog<br>
|
||||
|
||||
|
||||
<a name="lychee-10.0.0"></a>
|
||||
### [lychee-10.0.0](https://github.com/truecharts/apps/compare/lychee-9.0.43...lychee-10.0.0) (2022-02-22)
|
||||
|
||||
#### Feat
|
||||
|
||||
* Add db/redis, fix storage path, add app_key secret, add gui config options ([#1928](https://github.com/truecharts/apps/issues/1928))
|
||||
|
||||
|
||||
|
||||
<a name="lychee-9.0.43"></a>
|
||||
### [lychee-9.0.43](https://github.com/truecharts/apps/compare/lychee-9.0.42...lychee-9.0.43) (2022-02-21)
|
||||
|
||||
#### Chore
|
||||
|
||||
* update helm general non-major helm releases ([#1927](https://github.com/truecharts/apps/issues/1927))
|
||||
|
||||
|
||||
|
||||
<a name="lychee-9.0.42"></a>
|
||||
### [lychee-9.0.42](https://github.com/truecharts/apps/compare/lychee-9.0.41...lychee-9.0.42) (2022-02-15)
|
||||
|
||||
#### Chore
|
||||
|
||||
* update helm general non-major helm releases ([#1901](https://github.com/truecharts/apps/issues/1901))
|
||||
|
||||
|
||||
|
||||
<a name="lychee-9.0.41"></a>
|
||||
### [lychee-9.0.41](https://github.com/truecharts/apps/compare/lychee-9.0.40...lychee-9.0.41) (2022-02-08)
|
||||
|
||||
#### Chore
|
||||
|
||||
* update helm general non-major helm releases ([#1871](https://github.com/truecharts/apps/issues/1871))
|
||||
|
||||
|
||||
|
||||
<a name="lychee-9.0.40"></a>
|
||||
### [lychee-9.0.40](https://github.com/truecharts/apps/compare/lychee-9.0.39...lychee-9.0.40) (2022-02-06)
|
||||
|
||||
#### Chore
|
||||
|
||||
* update helm chart common to v8.15.0 ([#1859](https://github.com/truecharts/apps/issues/1859))
|
||||
|
||||
|
||||
|
||||
<a name="lychee-9.0.39"></a>
|
||||
### [lychee-9.0.39](https://github.com/truecharts/apps/compare/lychee-9.0.38...lychee-9.0.39) (2022-02-05)
|
||||
|
||||
#### Chore
|
||||
|
||||
* update helm general non-major helm releases ([#1852](https://github.com/truecharts/apps/issues/1852))
|
||||
|
||||
|
||||
|
||||
<a name="lychee-9.0.38"></a>
|
||||
### [lychee-9.0.38](https://github.com/truecharts/apps/compare/lychee-9.0.37...lychee-9.0.38) (2022-02-02)
|
||||
|
||||
#### Chore
|
||||
|
||||
* update helm general non-major helm releases ([#1828](https://github.com/truecharts/apps/issues/1828))
|
||||
|
||||
|
||||
|
||||
<a name="lychee-9.0.37"></a>
|
||||
### [lychee-9.0.37](https://github.com/truecharts/apps/compare/lychee-9.0.36...lychee-9.0.37) (2022-01-31)
|
||||
|
||||
#### Chore
|
||||
|
||||
* update docker general non-major docker tags ([#1823](https://github.com/truecharts/apps/issues/1823))
|
||||
|
||||
|
||||
|
||||
<a name="lychee-9.0.36"></a>
|
||||
### [lychee-9.0.36](https://github.com/truecharts/apps/compare/lychee-9.0.35...lychee-9.0.36) (2022-01-25)
|
||||
|
||||
#### Chore
|
||||
|
||||
* update helm general non-major helm releases ([#1791](https://github.com/truecharts/apps/issues/1791))
|
||||
|
||||
|
||||
|
||||
<a name="lychee-9.0.35"></a>
|
||||
### [lychee-9.0.35](https://github.com/truecharts/apps/compare/lychee-9.0.34...lychee-9.0.35) (2022-01-22)
|
||||
|
||||
#### Chore
|
||||
|
||||
* update helm general non-major helm releases ([#1766](https://github.com/truecharts/apps/issues/1766))
|
||||
|
||||
|
||||
|
||||
<a name="lychee-9.0.34"></a>
|
||||
### [lychee-9.0.34](https://github.com/truecharts/apps/compare/lychee-9.0.33...lychee-9.0.34) (2022-01-21)
|
||||
|
||||
#### Chore
|
||||
|
||||
* update helm general non-major helm releases ([#1759](https://github.com/truecharts/apps/issues/1759))
|
|
@ -0,0 +1,12 @@
|
|||
dependencies:
|
||||
- name: common
|
||||
repository: https://truecharts.org
|
||||
version: 8.16.0
|
||||
- name: postgresql
|
||||
repository: https://truecharts.org/
|
||||
version: 6.0.68
|
||||
- name: redis
|
||||
repository: https://truecharts.org
|
||||
version: 1.0.74
|
||||
digest: sha256:1a12c38d9869856b31d69c852eb9c787779ed8e7a5625d70e53e7119e9383d4a
|
||||
generated: "2022-02-22T10:28:23.12832561Z"
|
|
@ -0,0 +1,39 @@
|
|||
apiVersion: v2
|
||||
appVersion: "4.4.0"
|
||||
dependencies:
|
||||
- name: common
|
||||
repository: https://truecharts.org
|
||||
version: 8.16.0
|
||||
- condition: postgresql.enabled
|
||||
name: postgresql
|
||||
repository: https://truecharts.org/
|
||||
version: 6.0.68
|
||||
- condition: redis.enabled
|
||||
name: redis
|
||||
repository: https://truecharts.org
|
||||
version: 1.0.74
|
||||
deprecated: false
|
||||
description: Lychee is a free photo-management tool, which runs on your server or
|
||||
web-space
|
||||
home: https://github.com/truecharts/apps/tree/master/charts/stable/lychee
|
||||
icon: https://truecharts.org/_static/img/appicons/lychee-icon.png
|
||||
keywords:
|
||||
- lychee
|
||||
- photo
|
||||
- pictures
|
||||
kubeVersion: '>=1.16.0-0'
|
||||
maintainers:
|
||||
- email: info@truecharts.org
|
||||
name: TrueCharts
|
||||
url: https://truecharts.org
|
||||
name: lychee
|
||||
sources:
|
||||
- https://github.com/LycheeOrg/Lychee
|
||||
- https://hub.docker.com/r/lycheeorg/lychee
|
||||
type: application
|
||||
version: 10.0.0
|
||||
annotations:
|
||||
truecharts.org/catagories: |
|
||||
- media
|
||||
truecharts.org/SCALE-support: "true"
|
||||
truecharts.org/grade: U
|
|
@ -0,0 +1,40 @@
|
|||
# Introduction
|
||||
|
||||
Lychee is a free photo-management tool, which runs on your server or web-space
|
||||
|
||||
TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation.
|
||||
**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)**
|
||||
|
||||
## Source Code
|
||||
|
||||
* <https://github.com/LycheeOrg/Lychee>
|
||||
* <https://hub.docker.com/r/lycheeorg/lychee>
|
||||
|
||||
## Requirements
|
||||
|
||||
Kubernetes: `>=1.16.0-0`
|
||||
|
||||
## Dependencies
|
||||
|
||||
| Repository | Name | Version |
|
||||
|------------|------|---------|
|
||||
| https://truecharts.org/ | postgresql | 6.0.68 |
|
||||
| https://truecharts.org | common | 8.16.0 |
|
||||
| https://truecharts.org | redis | 1.0.74 |
|
||||
|
||||
## Installing the Chart
|
||||
|
||||
To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/03-Installing-an-App/).
|
||||
|
||||
## Uninstalling the Chart
|
||||
|
||||
To remove this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/07-Deleting-an-App/).
|
||||
|
||||
## Support
|
||||
|
||||
- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Open-Apps/) first.
|
||||
- See the [Wiki](https://truecharts.org)
|
||||
- Check our [Discord](https://discord.gg/tVsPTHWTtr)
|
||||
- Open a [issue](https://github.com/truecharts/apps/issues/new/choose)
|
||||
---
|
||||
All Rights Reserved - The TrueCharts Project
|
|
@ -0,0 +1,3 @@
|
|||
Lychee is a free photo-management tool, which runs on your server or web-space
|
||||
|
||||
This App is supplied by TrueCharts, for more information please visit https://truecharts.org
|
Binary file not shown.
Binary file not shown.
Binary file not shown.
|
@ -0,0 +1,66 @@
|
|||
# Default Helm-Values
|
||||
|
||||
TrueCharts is primarily build to supply TrueNAS SCALE Apps.
|
||||
However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file.
|
||||
|
||||
Most of our Apps also consume our "common" Helm Chart.
|
||||
If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart.
|
||||
You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document.
|
||||
|
||||
## Values
|
||||
|
||||
| Key | Type | Default | Description |
|
||||
|-----|------|---------|-------------|
|
||||
| env.APP_DEBUG | bool | `false` | |
|
||||
| env.APP_ENV | string | `"production"` | |
|
||||
| env.APP_NAME | string | `"Lychee"` | |
|
||||
| env.APP_URL | string | `"http://localhost"` | |
|
||||
| env.CACHE_DRIVER | string | `"redis"` | |
|
||||
| env.DB_CONNECTION | string | `"pgsql"` | |
|
||||
| env.DB_DATABASE | string | `"{{ .Values.postgresql.postgresqlDatabase }}"` | |
|
||||
| env.DB_PORT | string | `"5432"` | |
|
||||
| env.DB_USERNAME | string | `"{{ .Values.postgresql.postgresqlUsername }}"` | |
|
||||
| env.MIX_PUSHER_APP_CLUSTER | string | `"{{ .Values.env.PUSHER_APP_CLUSTER }}"` | |
|
||||
| env.MIX_PUSHER_APP_KEY | string | `"{{ .Values.env.PUSHER_APP_KEY }}"` | |
|
||||
| env.PHP_TZ | string | `"{{ .Values.env.TZ }}"` | |
|
||||
| env.PUID | int | `568` | |
|
||||
| env.PUSHER_APP_CLUSTER | string | `""` | |
|
||||
| env.PUSHER_APP_KEY | string | `""` | |
|
||||
| env.REDIS_PORT | string | `"6379"` | |
|
||||
| env.SECURITY_HEADER_HSTS_ENABLE | bool | `false` | |
|
||||
| env.SESSION_DRIVER | string | `"redis"` | |
|
||||
| env.TIMEZONE | string | `"{{ .Values.env.TZ }}"` | |
|
||||
| env.TZ | string | `"UTC"` | |
|
||||
| envValueFrom.APP_KEY.secretKeyRef.key | string | `"APP_KEY"` | |
|
||||
| envValueFrom.APP_KEY.secretKeyRef.name | string | `"lychee-secrets"` | |
|
||||
| envValueFrom.DB_HOST.secretKeyRef.key | string | `"plainhost"` | |
|
||||
| envValueFrom.DB_HOST.secretKeyRef.name | string | `"dbcreds"` | |
|
||||
| envValueFrom.DB_PASSWORD.secretKeyRef.key | string | `"postgresql-password"` | |
|
||||
| envValueFrom.DB_PASSWORD.secretKeyRef.name | string | `"dbcreds"` | |
|
||||
| envValueFrom.REDIS_HOST.secretKeyRef.key | string | `"plainhost"` | |
|
||||
| envValueFrom.REDIS_HOST.secretKeyRef.name | string | `"rediscreds"` | |
|
||||
| envValueFrom.REDIS_PASSWORD.secretKeyRef.key | string | `"redis-password"` | |
|
||||
| envValueFrom.REDIS_PASSWORD.secretKeyRef.name | string | `"rediscreds"` | |
|
||||
| image.pullPolicy | string | `"IfNotPresent"` | |
|
||||
| image.repository | string | `"tccr.io/truecharts/lychee-laravel"` | |
|
||||
| image.tag | string | `"v4.4.0@sha256:f241d62fa4b2f97577d494c319eaab9e5b127e4a67af58ea90861ce56ff0fb88"` | |
|
||||
| persistence.conf.enabled | bool | `true` | |
|
||||
| persistence.conf.mountPath | string | `"/conf"` | |
|
||||
| persistence.sym.enabled | bool | `true` | |
|
||||
| persistence.sym.mountPath | string | `"/sym"` | |
|
||||
| persistence.uploads.enabled | bool | `true` | |
|
||||
| persistence.uploads.mountPath | string | `"/uploads"` | |
|
||||
| podSecurityContext.runAsGroup | int | `0` | |
|
||||
| podSecurityContext.runAsUser | int | `0` | |
|
||||
| postgresql.enabled | bool | `true` | |
|
||||
| postgresql.existingSecret | string | `"dbcreds"` | |
|
||||
| postgresql.postgresqlDatabase | string | `"lychee"` | |
|
||||
| postgresql.postgresqlUsername | string | `"lychee"` | |
|
||||
| redis.enabled | bool | `true` | |
|
||||
| redis.existingSecret | string | `"rediscreds"` | |
|
||||
| securityContext.readOnlyRootFilesystem | bool | `false` | |
|
||||
| securityContext.runAsNonRoot | bool | `false` | |
|
||||
| service.main.ports.main.port | int | `10017` | |
|
||||
| service.main.ports.main.targetPort | int | `80` | |
|
||||
|
||||
All Rights Reserved - The TrueCharts Project
|
|
@ -0,0 +1,86 @@
|
|||
image:
|
||||
repository: tccr.io/truecharts/lychee-laravel
|
||||
pullPolicy: IfNotPresent
|
||||
tag: v4.4.0@sha256:f241d62fa4b2f97577d494c319eaab9e5b127e4a67af58ea90861ce56ff0fb88
|
||||
|
||||
securityContext:
|
||||
readOnlyRootFilesystem: false
|
||||
runAsNonRoot: false
|
||||
|
||||
podSecurityContext:
|
||||
runAsUser: 0
|
||||
runAsGroup: 0
|
||||
|
||||
service:
|
||||
main:
|
||||
ports:
|
||||
main:
|
||||
port: 10017
|
||||
targetPort: 80
|
||||
|
||||
env:
|
||||
# Internal Envs
|
||||
TIMEZONE: "{{ .Values.env.TZ }}"
|
||||
PHP_TZ: "{{ .Values.env.TZ }}"
|
||||
DB_CONNECTION: "pgsql"
|
||||
DB_PORT: "5432"
|
||||
DB_DATABASE: "{{ .Values.postgresql.postgresqlDatabase }}"
|
||||
DB_USERNAME: "{{ .Values.postgresql.postgresqlUsername }}"
|
||||
REDIS_PORT: "6379"
|
||||
CACHE_DRIVER: "redis"
|
||||
SESSION_DRIVER: "redis"
|
||||
APP_ENV: "production"
|
||||
APP_NAME: "Lychee"
|
||||
MIX_PUSHER_APP_KEY: "{{ .Values.env.PUSHER_APP_KEY }}"
|
||||
MIX_PUSHER_APP_CLUSTER: "{{ .Values.env.PUSHER_APP_CLUSTER }}"
|
||||
# User Envs
|
||||
PUID: 568
|
||||
TZ: UTC
|
||||
SECURITY_HEADER_HSTS_ENABLE: false
|
||||
APP_DEBUG: false
|
||||
PUSHER_APP_KEY: ""
|
||||
PUSHER_APP_CLUSTER: ""
|
||||
APP_URL: http://localhost
|
||||
|
||||
envValueFrom:
|
||||
DB_PASSWORD:
|
||||
secretKeyRef:
|
||||
name: dbcreds
|
||||
key: postgresql-password
|
||||
DB_HOST:
|
||||
secretKeyRef:
|
||||
name: dbcreds
|
||||
key: plainhost
|
||||
REDIS_HOST:
|
||||
secretKeyRef:
|
||||
name: rediscreds
|
||||
key: plainhost
|
||||
REDIS_PASSWORD:
|
||||
secretKeyRef:
|
||||
name: rediscreds
|
||||
key: redis-password
|
||||
APP_KEY:
|
||||
secretKeyRef:
|
||||
name: lychee-secrets
|
||||
key: APP_KEY
|
||||
|
||||
persistence:
|
||||
conf:
|
||||
enabled: true
|
||||
mountPath: "/conf"
|
||||
sym:
|
||||
enabled: true
|
||||
mountPath: "/sym"
|
||||
uploads:
|
||||
enabled: true
|
||||
mountPath: "/uploads"
|
||||
|
||||
postgresql:
|
||||
enabled: true
|
||||
existingSecret: "dbcreds"
|
||||
postgresqlUsername: lychee
|
||||
postgresqlDatabase: lychee
|
||||
|
||||
redis:
|
||||
enabled: true
|
||||
existingSecret: "rediscreds"
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because one or more lines are too long
|
@ -0,0 +1,20 @@
|
|||
{{/* Define the secrets */}}
|
||||
{{- define "lychee.secrets" -}}
|
||||
---
|
||||
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
type: Opaque
|
||||
metadata:
|
||||
name: lychee-secrets
|
||||
{{- $lycheeprevious := lookup "v1" "Secret" .Release.Namespace "lychee-secrets" }}
|
||||
{{- $app_key := "" }}
|
||||
data:
|
||||
{{- if $lycheeprevious}}
|
||||
APP_KEY: {{ index $lycheeprevious.data "APP_KEY" }}
|
||||
{{- else }}
|
||||
{{- $app_key := randAlphaNum 32 }}
|
||||
APP_KEY: {{ $app_key | b64enc }}
|
||||
{{- end }}
|
||||
|
||||
{{- end -}}
|
|
@ -0,0 +1,7 @@
|
|||
{{/* Make sure all variables are set properly */}}
|
||||
{{ include "common.setup" . }}
|
||||
|
||||
{{ include "lychee.secrets" . }}
|
||||
|
||||
{{/* Render the templates */}}
|
||||
{{ include "common.postSetup" . }}
|
|
@ -1,6 +1,15 @@
|
|||
# Changelog<br>
|
||||
|
||||
|
||||
<a name="monica-0.0.44"></a>
|
||||
### [monica-0.0.44](https://github.com/truecharts/apps/compare/monica-0.0.43...monica-0.0.44) (2022-02-22)
|
||||
|
||||
#### Fix
|
||||
|
||||
* only b64enc the key once ([#1930](https://github.com/truecharts/apps/issues/1930))
|
||||
|
||||
|
||||
|
||||
<a name="monica-0.0.43"></a>
|
||||
### [monica-0.0.43](https://github.com/truecharts/apps/compare/monica-0.0.42...monica-0.0.43) (2022-02-21)
|
||||
|
||||
|
@ -88,12 +97,3 @@
|
|||
|
||||
#### Chore
|
||||
|
||||
* update helm general non-major helm releases ([#1791](https://github.com/truecharts/apps/issues/1791))
|
||||
|
||||
|
||||
|
||||
<a name="monica-0.0.33"></a>
|
||||
### [monica-0.0.33](https://github.com/truecharts/apps/compare/monica-0.0.32...monica-0.0.33) (2022-01-24)
|
||||
|
||||
#### Chore
|
||||
|
|
@ -0,0 +1,8 @@
|
|||
# Configuration Options
|
||||
|
||||
##### Connecting to other apps
|
||||
If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our "Linking Apps Internally" quick-start guide:
|
||||
https://truecharts.org/manual/Quick-Start%20Guides/14-linking-apps/
|
||||
|
||||
##### Available config options
|
||||
In the future this page is going to contain an automated list of options available in the installation/edit UI.
|
|
@ -6,4 +6,4 @@ dependencies:
|
|||
repository: https://truecharts.org/
|
||||
version: 1.0.73
|
||||
digest: sha256:bf23758781a4e58ea35281ddb9500db7987638dd59f752088b97e00b948b1e8e
|
||||
generated: "2022-02-21T23:42:24.323953686Z"
|
||||
generated: "2022-02-22T10:28:22.75274285Z"
|
|
@ -22,7 +22,7 @@ name: monica
|
|||
sources:
|
||||
- https://github.com/monicahq/monica
|
||||
- https://hub.docker.com/_/monica
|
||||
version: 0.0.43
|
||||
version: 0.0.44
|
||||
annotations:
|
||||
truecharts.org/catagories: |
|
||||
- crm
|
Binary file not shown.
|
@ -511,7 +511,8 @@ hide:
|
|||
| linux-libc-dev | CVE-2021-32078 | LOW | 5.10.92-1 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32078">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32078</a><br><a href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=298a58e165e447ccfaae35fe9f651f9d7e15166f">https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=298a58e165e447ccfaae35fe9f651f9d7e15166f</a><br><a href="https://git.kernel.org/linus/298a58e165e447ccfaae35fe9f651f9d7e15166f (5.13-rc1)">https://git.kernel.org/linus/298a58e165e447ccfaae35fe9f651f9d7e15166f (5.13-rc1)</a><br><a href="https://github.com/torvalds/linux/commit/298a58e165e447ccfaae35fe9f651f9d7e15166f">https://github.com/torvalds/linux/commit/298a58e165e447ccfaae35fe9f651f9d7e15166f</a><br><a href="https://kirtikumarar.com/CVE-2021-32078.txt">https://kirtikumarar.com/CVE-2021-32078.txt</a><br><a href="https://security.netapp.com/advisory/ntap-20210813-0002/">https://security.netapp.com/advisory/ntap-20210813-0002/</a><br></details> |
|
||||
| linux-libc-dev | CVE-2022-0487 | LOW | 5.10.92-1 | | <details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2044561">https://bugzilla.redhat.com/show_bug.cgi?id=2044561</a><br><a href="https://bugzilla.suse.com/show_bug.cgi?id=1194516">https://bugzilla.suse.com/show_bug.cgi?id=1194516</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487</a><br><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=42933c8aa14be1caa9eda41f65cde8a3a95d3e39">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=42933c8aa14be1caa9eda41f65cde8a3a95d3e39</a><br><a href="https://lore.kernel.org/all/20220114075934.302464-1-gregkh@linuxfoundation.org/">https://lore.kernel.org/all/20220114075934.302464-1-gregkh@linuxfoundation.org/</a><br><a href="https://lore.kernel.org/all/20220127071638.4057899-1-gregkh@linuxfoundation.org/">https://lore.kernel.org/all/20220127071638.4057899-1-gregkh@linuxfoundation.org/</a><br></details> |
|
||||
| linux-libc-dev | CVE-2022-24448 | LOW | 5.10.92-1 | | <details><summary>Expand...</summary><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448</a><br><a href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac795161c93699d600db16c1a8cc23a65a1eceaf">https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac795161c93699d600db16c1a8cc23a65a1eceaf</a><br><a href="https://github.com/torvalds/linux/commit/ac795161c93699d600db16c1a8cc23a65a1eceaf">https://github.com/torvalds/linux/commit/ac795161c93699d600db16c1a8cc23a65a1eceaf</a><br><a href="https://www.spinics.net/lists/stable/msg531976.html">https://www.spinics.net/lists/stable/msg531976.html</a><br></details> |
|
||||
| linux-libc-dev | CVE-2022-25375 | UNKNOWN | 5.10.92-1 | | <details><summary>Expand...</summary><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10</a><br><a href="https://github.com/szymonh/rndis-co">https://github.com/szymonh/rndis-co</a><br><a href="https://github.com/torvalds/linux/commit/38ea1eac7d88072bbffb630e2b3db83ca649b826">https://github.com/torvalds/linux/commit/38ea1eac7d88072bbffb630e2b3db83ca649b826</a><br></details> |
|
||||
| linux-libc-dev | CVE-2022-25375 | UNKNOWN | 5.10.92-1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/02/21/1">http://www.openwall.com/lists/oss-security/2022/02/21/1</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10</a><br><a href="https://github.com/szymonh/rndis-co">https://github.com/szymonh/rndis-co</a><br><a href="https://github.com/torvalds/linux/commit/38ea1eac7d88072bbffb630e2b3db83ca649b826">https://github.com/torvalds/linux/commit/38ea1eac7d88072bbffb630e2b3db83ca649b826</a><br></details> |
|
||||
| linux-libc-dev | CVE-2022-25636 | UNKNOWN | 5.10.92-1 | | <details><summary>Expand...</summary></details> |
|
||||
| login | CVE-2007-5686 | LOW | 1:4.8.1-1 | | <details><summary>Expand...</summary><a href="http://secunia.com/advisories/27215">http://secunia.com/advisories/27215</a><br><a href="http://www.securityfocus.com/archive/1/482129/100/100/threaded">http://www.securityfocus.com/archive/1/482129/100/100/threaded</a><br><a href="http://www.securityfocus.com/archive/1/482857/100/0/threaded">http://www.securityfocus.com/archive/1/482857/100/0/threaded</a><br><a href="http://www.securityfocus.com/bid/26048">http://www.securityfocus.com/bid/26048</a><br><a href="http://www.vupen.com/english/advisories/2007/3474">http://www.vupen.com/english/advisories/2007/3474</a><br><a href="https://issues.rpath.com/browse/RPL-1825">https://issues.rpath.com/browse/RPL-1825</a><br></details> |
|
||||
| login | CVE-2013-4235 | LOW | 1:4.8.1-1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/cve-2013-4235">https://access.redhat.com/security/cve/cve-2013-4235</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2013-4235">https://security-tracker.debian.org/tracker/CVE-2013-4235</a><br></details> |
|
||||
| login | CVE-2019-19882 | LOW | 1:4.8.1-1 | | <details><summary>Expand...</summary><a href="https://bugs.archlinux.org/task/64836">https://bugs.archlinux.org/task/64836</a><br><a href="https://bugs.gentoo.org/702252">https://bugs.gentoo.org/702252</a><br><a href="https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75">https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75</a><br><a href="https://github.com/shadow-maint/shadow/pull/199">https://github.com/shadow-maint/shadow/pull/199</a><br><a href="https://github.com/void-linux/void-packages/pull/17580">https://github.com/void-linux/void-packages/pull/17580</a><br><a href="https://security.gentoo.org/glsa/202008-09">https://security.gentoo.org/glsa/202008-09</a><br></details> |
|
|
@ -1,23 +1,22 @@
|
|||
{{/*
|
||||
This template generates a random password and ensures it persists across updates/edits to the chart
|
||||
This template generates a random appkey and ensures it persists across updates/edits to the chart
|
||||
*/}}
|
||||
{{- define "monica.appkey" -}}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
type: Opaque
|
||||
metadata:
|
||||
name: appkey
|
||||
labels:
|
||||
{{- include "common.labels" . | nindent 4 }}
|
||||
name: appkey
|
||||
{{- $keyprevious := lookup "v1" "Secret" .Release.Namespace "appkey" }}
|
||||
{{- $appkey := "" }}
|
||||
data:
|
||||
{{- if $keyprevious }}
|
||||
{{- $appkey = ( index $keyprevious.data "appkey" ) | b64dec }}
|
||||
{{- if $keyprevious }}
|
||||
appkey: {{ ( index $keyprevious.data "appkey" ) }}
|
||||
{{- else }}
|
||||
{{- $appkey = randAlphaNum 32 | b64enc }}
|
||||
appkey: {{ $appkey | b64enc | quote }}
|
||||
{{- end }}
|
||||
type: Opaque
|
||||
{{- else }}
|
||||
{{- $appkey = randAlphaNum 32 }}
|
||||
appkey: {{ $appkey | b64enc }}
|
||||
{{- end }}
|
||||
{{- end -}}
|
|
@ -4,6 +4,5 @@
|
|||
{{/* Render appkey for monica */}}
|
||||
{{- include "monica.appkey" . }}
|
||||
|
||||
|
||||
{{/* Render the templates */}}
|
||||
{{ include "common.postSetup" . }}
|
Loading…
Reference in New Issue