No introduction found. Create it?
Install with:
helm repo add bjw-s oci://ghcr.io/bjw-s/helm/
helm install calibre-web bjw-s/app-template -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|---|---|---|---|
calibre-web | vaskozl/home-infra | 92 | 3.7.3 | 2 months ago |
calibre-web | toboshii/home-ops | 344 | 0.2.2 | a year ago |
See the most popular values for this chart:
Key | Types |
---|---|
boolean | |
ingress.main.hosts[].host (7) books.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
string | |
string | |
ingress.main.tls[].hosts[] (7) - books.${SECRET_DOMAIN} | string |
ingress.main.tls[].secretName (2) library-production-tls | string |
string | |
ingress.main.annotations."hajimari.io/icon" (4) mdi:bookshelf | string |
ingress.main.annotations."external-dns.alpha.kubernetes.io/target" (2) external.${SECRET_DOMAIN} | string |
string | |
ingress.main.annotations."nginx.ingress.kubernetes.io/configuration-snippet" (2) proxy_set_header Accept-Encoding "";
sub_filter '</head>' '<link rel="stylesheet" type="text/css" href="https://theme-park.${SECRET_PUBLIC_DOMAIN}/css/base/calibreweb/dracula.css"></head>';
sub_filter_once on;
| string |
string | |
ingress.main.annotations."cert-manager.io/cluster-issuer" (1) letsencrypt-production | string |
string | |
string | |
string | |
ingress.main.annotations."gethomepage.dev/icon" (1) calibre-web.png | string |
string | |
string | |
ingress.main.annotations."gethomepage.dev/widget.fields" (1) ["books", "authors", "series"] | string |
ingress.main.annotations."gethomepage.dev/widget.password" (1) {{HOMEPAGE_VAR_CALIBRE_PASS}} | string |
string | |
ingress.main.annotations."gethomepage.dev/widget.url" (1) https://books.${SECRET_DOMAIN} | string |
ingress.main.annotations."gethomepage.dev/widget.username" (1) {{HOMEPAGE_VAR_CALIBRE_USER}} | string |
string | |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-response-headers" (1) Set-Cookie,X-authentik-username,X-authentik-groups,X-authentik-email,X-authentik-name,X-authentik-uid | string |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-signin" (1) /outpost.goauthentik.io/start?rd=$escaped_request_uri | string |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-snippet" (1) proxy_set_header X-Forwarded-Host $http_host; | string |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-url" (1) http://ak-outpost-external.auth.svc.cluster.local:9000/outpost.goauthentik.io/auth/nginx | string |
string | |
string | |
ingress.main.className (3) external | string |
ingress.app.hosts[].host (3) ebooks.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
ingress.app.annotations."external-dns.alpha.kubernetes.io/target" (2) external.${SECRET_DOMAIN} | string |
string | |
string | |
ingress.app.annotations."gethomepage.dev/group" (2) Entertainment | string |
string | |
string | |
ingress.app.className (2) external | string |
ingress.internal.annotations."nginx.ingress.kubernetes.io/auth-response-headers" (1) Set-Cookie,X-authentik-username,X-authentik-groups,X-authentik-email,X-authentik-name,X-authentik-uid | string |
ingress.internal.annotations."nginx.ingress.kubernetes.io/auth-signin" (1) /outpost.goauthentik.io/start?rd=$escaped_request_uri | string |
ingress.internal.annotations."nginx.ingress.kubernetes.io/auth-snippet" (1) proxy_set_header X-Forwarded-Host $http_host; | string |
ingress.internal.annotations."nginx.ingress.kubernetes.io/auth-url" (1) http://ak-outpost-internal.auth.svc.cluster.local:9000/outpost.goauthentik.io/auth/nginx | string |
string | |
ingress.internal.className (1) internal | string |
boolean | |
ingress.internal.hosts[].host (1) books.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
ingress.internal.tls[].hosts[] (1) - books.${SECRET_DOMAIN} | string |
ingress.kobo.annotations."nginx.ingress.kubernetes.io/configuration-snippet" (1) proxy_busy_buffers_size 256k;
| string |
string | |
string | |
string | |
ingress.kobo.className (1) internal | string |
boolean | |
ingress.kobo.hosts[].host (1) books-kobo.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
ingress.kobo.tls[].hosts[] (1) - books-kobo.${SECRET_DOMAIN} | string |
persistence.config.existingClaim (7) calibre-web | string |
boolean | |
persistence.config.globalMounts[].path (2) /config | string |
string | |
persistence.config.accessMode (1) ReadWriteOnce | string |
string | |
string | |
string | |
persistence.config.storageClass (1) ceph-block | string |
string | |
persistence.cache.type (6) emptyDir | string |
string | |
boolean | |
string | |
boolean | |
string | |
persistence.books.path (3) /media/storage/Media/Books | string |
persistence.books.server (3) 10.0.40.50 | string |
string | |
persistence.books.existingClaim (1) media-library | string |
string | |
persistence.books.globalMounts[].subPath (1) books/Calibre Library | string |
persistence.media.globalMounts[].path (4) /data/media | string |
boolean | |
persistence.media.path (4) /mnt/tank2/media/books | string |
persistence.media.server (4) ${SECRET_NFS_SERVER} | string |
string | |
boolean | |
persistence.media.existingClaim (1) torrents-v2 | string |
string | |
boolean | |
boolean | |
persistence.calibre-library.existingClaim (1) calibre-config | string |
string | |
boolean | |
persistence.custom-scripts.mountPath (1) /custom-cont-init.d/patch-session-protection.sh | string |
persistence.custom-scripts.name (1) calibre-web-configmap | string |
persistence.custom-scripts.subPath (1) patch-session-protection.sh | string |
persistence.custom-scripts.type (1) configMap | string |
persistence.tmp.type (1) emptyDir | string |
number | |
string | |
service.app.controller (3) calibre-web | string |
number | |
service.app.ipFamilyPolicy (1) PreferDualStack | string |
env.TZ (4) ${TIMEZONE} | string |
env.DOCKER_MODS (2) linuxserver/mods:universal-calibre | string |
env.PGID (2) 1000 | number |
env.PUID (2) 1000 | number |
env.CACHE_DIR (1) /cache | string |
image.repository (4) linuxserver/calibre-web | string |
image.tag (4) 0.6.21@sha256:9049b3a3e9afa19f189dfac69db0df944d4638247acfed1f69606e4dd8b7e841 | string |
image.pullPolicy (1) IfNotPresent | string |
string, number | |
podSecurityContext.fsGroupChangePolicy (4) OnRootMismatch | string |
string, number | |
string, number | |
number | |
string | |
string | |
string | |
string | |
string | |
number | |
controllers.calibre-web.containers.app.env.DOCKER_MODS (1) {{- $items := list
"// renovate: lsio-docker-mod"
"ghcr.io/linuxserver/mods:universal-calibre-v7.16.0"
-}} {{- $filtered := list -}} {{- range $item := $items -}}
{{- if not (hasPrefix "//" $item) -}}
{{- $filtered = append $filtered $item -}}
{{- end -}}
{{- end -}} {{- $filtered | join "|" -}} | string |
number | |
number | |
controllers.calibre-web.containers.app.env.TZ (1) America/New_York | string |
controllers.calibre-web.containers.app.image.repository (3) ghcr.io/bjw-s-labs/calibre-web | string |
controllers.calibre-web.containers.app.image.tag (3) 0.6.24@sha256:fcb62aefb20943c96eb8e2b3b53803f5c77c97be3534830eb475bf76edfc7951 | string |
string | |
string | |
string | |
string | |
boolean | |
boolean | |
boolean | |
string | |
string | |
boolean | |
string | |
string | |
number | |
string | |
number | |
number | |
number | |
string | |
string | |
string | |
string | |
string | |
controllers.calibre-web.type (1) statefulset | string |
controllers.main.containers.main.env.TZ (3) ${TIMEZONE} | string |
string | |
number | |
number | |
controllers.main.containers.main.image.repository (3) ghcr.io/bjw-s/calibre-web | string |
controllers.main.containers.main.image.tag (3) 0.6.24@sha256:0e53921cfcc9d6898cae4f63d6d4f8b1abebef308fe9c672bd12448bcc9c4334 | string |
string | |
string | |
string | |
boolean | |
boolean | |
boolean | |
number | |
number | |
string | |
number | |
string | |
number | |
number | |
number | |
controllers.main.type (1) statefulset | string |
controller.type (2) statefulset | string |
number | |
string | |
number | |
boolean | |
number | |
string | |
boolean | |
boolean | |
global.nameOverride (1) calibre-web | string |
number | |
securityContext.seccompProfile.type (1) Unconfined | string |
volumeClaimTemplates[].accessMode (1) ReadWriteOnce | string |
string | |
volumeClaimTemplates[].name (1) config-v1 | string |
string | |
string |