No introduction found. Create it?
calibre-web from bjw-s is more popular with 20 repositories.
Install with:
helm repo add bjw-s oci://ghcr.io/bjw-s/helm/
helm install calibre-web bjw-s/app-template -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|---|---|---|---|
calibre-web | szinn/k8s-homelab | 95 | 2.3.0 | 2 days ago |
calibre-web | bjw-s/home-ops | 412 | 2.3.0 | 2 days ago |
See the most popular values for this chart:
Key | Types |
---|---|
boolean | |
ingress.main.hosts[].host (11) books.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
string | |
ingress.main.tls[].hosts[] (10) - books.${SECRET_DOMAIN} | string |
string | |
ingress.main.annotations."external-dns.alpha.kubernetes.io/target" (5) ingress.${SECRET_DOMAIN} | string |
ingress.main.annotations."hajimari.io/icon" (5) book-plus-multiple | string |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-response-headers" (3) Set-Cookie,X-authentik-username,X-authentik-groups,X-authentik-email,X-authentik-name,X-authentik-uid | string |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-signin" (3) /outpost.goauthentik.io/start?rd=$escaped_request_uri | string |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-snippet" (3) proxy_set_header X-Forwarded-Host $http_host; | string |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-url" (3) http://ak-outpost-internal-proxy-outpost.security.svc.cluster.local:9000/outpost.goauthentik.io/auth/nginx | string |
ingress.main.annotations."nginx.ingress.kubernetes.io/configuration-snippet" (3) proxy_set_header Accept-Encoding "";
sub_filter '</head>' '<link rel="stylesheet" type="text/css" href="https://theme-park.${SECRET_DOMAIN_NAME}/css/base/calibreweb/nord.css"></head>';
sub_filter_once on;
| string |
string | |
string | |
string | |
string | |
string | |
string | |
ingress.main.annotations."gethomepage.dev/icon" (1) calibre-web.png | string |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
ingress.main.annotations."traefik.ingress.kubernetes.io/router.middlewares" (1) networking-sso@kubernetescrd | string |
string | |
ingress.kobo.annotations."external-dns.alpha.kubernetes.io/target" (1) ingress.${SECRET_DOMAIN} | string |
string | |
ingress.kobo.annotations."nginx.ingress.kubernetes.io/configuration-snippet" (1) proxy_busy_buffers_size 256k;
| string |
string | |
string | |
string | |
ingress.kobo.className (1) nginx-internal | string |
boolean | |
ingress.kobo.hosts[].host (1) books-kobo.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
ingress.kobo.tls[].hosts[] (1) - books-kobo.${SECRET_DOMAIN} | string |
number | |
persistence.cache.type (8) emptyDir | string |
string | |
boolean | |
string | |
boolean | |
persistence.config.existingClaim (5) local-volume-media | string |
string | |
persistence.config.globalMounts[].subPath (1) calibre/web | string |
persistence.config.accessMode (1) ReadWriteOnce | string |
string | |
string | |
string | |
persistence.config.storageClass (1) ceph-block | string |
string | |
persistence.media.path (5) /volume1/Media | string |
persistence.media.server (5) ${NAS_ADDR} | string |
string | |
boolean | |
persistence.media.globalMounts[].path (4) /data/media | string |
persistence.media.existingClaim (3) calibre-web-books-nfs | string |
persistence.media.advancedMounts.main.main[].path (2) /data/nas-media | string |
string | |
boolean | |
boolean | |
string | |
persistence.books.path (2) /volume1/Library/Calibre/Calibre_eBooks | string |
string | |
string | |
boolean | |
persistence.calibre-library.existingClaim (1) calibre-config | string |
string | |
boolean | |
persistence.custom-scripts.mountPath (1) /custom-cont-init.d/patch-session-protection.sh | string |
persistence.custom-scripts.name (1) calibre-web-configmap | string |
persistence.custom-scripts.subPath (1) patch-session-protection.sh | string |
persistence.custom-scripts.type (1) configMap | string |
string | |
controllers.main.containers.main.image.repository (7) ghcr.io/bjw-s/calibre-web | string |
controllers.main.containers.main.image.tag (7) 0.6.21@sha256:45c9e9287b36a3d5c7eee04690907811af51470351cd3a06878b078b5e378f13 | string |
string | |
controllers.main.containers.main.env.TZ (5) ${TIMEZONE} | string |
number | |
number | |
string | |
string | |
string | |
string | |
number, string | |
string | |
number, string | |
number, string | |
number | |
boolean | |
string | |
string | |
controllers.main.type (3) statefulset | string |
string | |
string | |
string | |
string | |
string | |
image.repository (4) ghcr.io/bjw-s/calibre-web | string |
image.tag (4) 0.6.20@sha256:5bd1c1cee482e52ece70e4e2fe0589d1910455e3e09e330c92c24bd304edccfb | string |
image.pullPolicy (1) IfNotPresent | string |
string | |
string | |
string | |
env.PGID (3) 568 | number |
env.PUID (3) 568 | number |
env.TZ (3) ${TIMEZONE} | string |
env.CACHE_DIR (2) /cache | string |
number | |
env.DOCKER_MODS (1) linuxserver/mods:universal-calibre | string |
volumeClaimTemplates[].accessMode (3) ReadWriteOnce | string |
string | |
string | |
string | |
string | |
controller.type (2) statefulset | string |
boolean | |
number | |
podSecurityContext.fsGroupChangePolicy (2) OnRootMismatch | string |
number | |
number | |
number | |
number | |
securityContext.seccompProfile.type (1) Unconfined | string |