No introduction found. Create it?
Install with:
helm repo add bjw-s oci://ghcr.io/bjw-s/helm/
helm install homepage bjw-s/app-template -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|---|---|---|---|
homepage | ahgraber/homelab-gitops-k3s | 85 | 3.7.3 | 18 days ago |
homepage | cbirkenbeul/homelab | 33 | 3.7.3 | 19 days ago |
homepage | brettinternet/homeops | 231 | 3.5.1 | 7 months ago |
See the most popular values for this chart:
Key | Types |
---|---|
persistence.config.globalMounts[].path (28) /app/config/bookmarks.yaml | string |
persistence.config.globalMounts[].subPath (24) bookmarks.yaml | string |
persistence.config.globalMounts[].readOnly (1) true | boolean |
persistence.config.type (28) configMap | string |
persistence.config.name (25) homepage-config | string |
boolean | |
persistence.logs.globalMounts[].path (3) /app/config/logs | string |
persistence.logs.type (3) emptyDir | string |
boolean | |
boolean | |
persistence.cache.existingClaim (2) homepage-cache | string |
string | |
persistence.configmap.globalMounts[].path (2) /app/config/bookmarks.yaml | string |
persistence.configmap.globalMounts[].readOnly (2) true | boolean |
persistence.configmap.globalMounts[].subPath (2) bookmarks.yaml | string |
persistence.configmap.name (2) homepage | string |
persistence.configmap.type (2) configMap | string |
persistence.services.globalMounts[].path (2) /app/config/services.yaml | string |
boolean | |
persistence.services.globalMounts[].subPath (2) services.yaml | string |
persistence.services.name (2) homepage | string |
string | |
persistence.bookmarks.globalMounts[].path (1) /app/config/bookmarks.yaml | string |
boolean | |
persistence.bookmarks.globalMounts[].subPath (1) bookmarks.yaml | string |
persistence.bookmarks.name (1) homepage-secret | string |
string | |
boolean | |
persistence.configs.globalMounts[].path (1) /app/config/bookmarks.yaml | string |
persistence.configs.globalMounts[].readOnly (1) true | boolean |
persistence.configs.globalMounts[].subPath (1) bookmarks.yaml | string |
persistence.configs.name (1) homepage | string |
persistence.configs.type (1) configMap | string |
string | |
string | |
persistence.data.existingClaim (1) ${PVC_NAME} | string |
boolean | |
persistence.homepage.globalMounts[].path (1) /usr/share/nginx/html/index.html | string |
persistence.homepage.globalMounts[].subPath (1) homepage.html | string |
string | |
persistence.homepage.volumeSpec.configMap.name (1) homepage-contents | string |
string | |
persistence.host.hostPath (1) /mnt/tera | string |
boolean | |
persistence.host.type (1) hostPath | string |
persistence.icons.existingClaim (1) local-volume-self-hosted | string |
persistence.icons.globalMounts[].path (1) /app/public | string |
string | |
string | |
persistence.nas.hostPath (1) /mnt/nas | string |
boolean | |
persistence.nas.type (1) hostPath | string |
boolean | |
serviceAccount.name (16) homepage | string |
controllers.homepage.containers.app.image.repository (20) ghcr.io/gethomepage/homepage | string |
string | |
string | |
string | |
controllers.homepage.containers.app.env.HOMEPAGE_ALLOWED_HOSTS (10) {{ .Release.Name }}.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
boolean | |
boolean | |
boolean | |
number | |
number | |
boolean | |
string | |
boolean | |
number | |
string | |
number | |
boolean | |
number | |
controllers.homepage.containers.main.image.repository (3) ghcr.io/zednotdead/homepage-new | string |
string | |
string | |
string | |
string | |
string | |
controllers.homepage.containers.main.env.GHOST_API_KEY (2) 25fa512f29169570f45aed2c09 | string |
controllers.homepage.containers.main.env.GHOST_ENDPOINT (2) https://ghost.zed.gay | string |
string | |
string | |
string | |
controllers.homepage.containers.code.args[] (1) - --auth | string |
string | |
string | |
controllers.homepage.containers.code.image.repository (1) ghcr.io/coder/code-server | string |
controllers.homepage.containers.code.image.tag (1) 4.98.2@sha256:9ed588a05d4e81aa464e753a409bc3b2b93267323d1c3975fbddf6f9aef84c26 | string |
string | |
string | |
string | |
string | |
controllers.homepage.strategy (12) RollingUpdate | string |
number | |
string | |
string | |
string | |
string | |
controllers.main.containers.main.image.repository (5) ghcr.io/gethomepage/homepage | string |
string | |
string | |
controllers.main.containers.main.env.TZ (4) ${TIMEZONE} | string |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
boolean | |
string | |
boolean | |
controllers.main.containers.app.image.repository (4) ghcr.io/gethomepage/homepage | string |
controllers.main.containers.app.image.tag (4) v1.1.1@sha256:be49a60307fcce7909acdaf2f3b2f3d168a0468d62869bf72d380625dde91fb9 | string |
string | |
string | |
string | |
controllers.main.containers.app.env.TZ (3) ${TIMEZONE} | string |
string | |
controllers.main.containers.app.env.HOMEPAGE_ALLOWED_HOSTS (1) homepage.${SECRET_DOMAIN} | string |
controllers.main.containers.app.envFrom[].secretRef.name (3) homepage-secret | string |
controllers.main.strategy (5) RollingUpdate | string |
number | |
service.app.controller (20) homepage | string |
number | |
boolean | |
service.app.ipFamilyPolicy (1) PreferDualStack | string |
number | |
boolean | |
string | |
service.code.controller (1) homepage | string |
number | |
service.homepage.controller (1) homepage | string |
number | |
ingress.app.className (19) internal | string |
ingress.app.hosts[].host (19) {{ .Release.Name }}.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
string | |
ingress.app.tls[].hosts[] (12) - {{ .Release.Name }}.${SECRET_DOMAIN} | string |
ingress.app.tls[].secretName (1) homepage-tls | string |
boolean | |
ingress.app.annotations."external-dns.alpha.kubernetes.io/target" (4) internal.${SECRET_DOMAIN} | string |
string | |
ingress.app.annotations."nginx.ingress.kubernetes.io/whitelist-source-range" (2) 10.0.0.0/8,172.16.0.0/12,192.168.0.0/16
| string |
ingress.app.annotations."cert-manager.io/cluster-issuer" (1) letsencrypt-production | string |
string | |
ingress.app.annotations."nginx.ingress.kubernetes.io/auth-response-headers" (1) Remote-User,Remote-Name,Remote-Groups,Remote-Email | string |
ingress.app.annotations."nginx.ingress.kubernetes.io/auth-signin" (1) https://auth.${SECRET_DOMAIN}?rm=$request_method | string |
ingress.app.annotations."nginx.ingress.kubernetes.io/auth-snippet" (1) proxy_set_header X-Forwarded-Method $request_method; | string |
ingress.app.annotations."nginx.ingress.kubernetes.io/auth-url" (1) http://authelia.default.svc.cluster.local/api/verify | string |
ingress.app.annotations."nginx.ingress.kubernetes.io/configuration-snippet" (1) if ($host = 'www.18b.haus') {
rewrite ^ https://18b.haus$request_uri permanent;
}
| string |
ingress.main.className (11) internal | string |
ingress.main.hosts[].host (11) homepage.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
string | |
string | |
boolean | |
ingress.main.tls[].hosts[] (8) - ${SECRET_DOMAIN} | string |
ingress.main.tls[].secretName (1) ${SECRET_DOMAIN_0}-prod | string |
ingress.main.annotations."external-dns.alpha.kubernetes.io/target" (2) external.${SECRET_DOMAIN} | string |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-signin" (2) https://auth.${SECRET_DOMAIN}/oauth2/auth/oauth2/start?rd=$scheme://$host$request_uri | string |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-url" (2) http://oauth2-proxy.security.svc.cluster.local:4180/oauth2/auth | string |
string | |
string | |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-response-headers" (1) Remote-User,Remote-Name,Remote-Groups,Remote-Email | string |
ingress.main.annotations."nginx.ingress.kubernetes.io/whitelist-source-range" (1) ${CONFIG_NGINX_WHITELIST} | string |
string | |
ingress.homepage.hosts[].host (2) ${SECRET_DOMAIN} | string |
string | |
string | |
string | |
string | |
ingress.homepage.tls[].hosts[] (2) - ${SECRET_DOMAIN} | string |
ingress.homepage.tls[].secretName (1) homepage-tls | string |
ingress.homepage.annotations."cert-manager.io/cluster-issuer" (1) letsencrypt-production | string |
string | |
ingress.homepage.annotations."traefik.ingress.kubernetes.io/router.middlewares" (1) networking-traefik-forward-auth@kubernetescrd | string |
string | |
boolean | |
string | |
ingress.code.annotations."nginx.ingress.kubernetes.io/auth-response-headers" (1) Remote-User,Remote-Name,Remote-Groups,Remote-Email | string |
ingress.code.annotations."nginx.ingress.kubernetes.io/auth-signin" (1) https://auth.${SECRET_DOMAIN}?rm=$request_method | string |
ingress.code.annotations."nginx.ingress.kubernetes.io/auth-snippet" (1) proxy_set_header X-Forwarded-Method $request_method; | string |
ingress.code.annotations."nginx.ingress.kubernetes.io/auth-url" (1) http://authelia.default.svc.cluster.local/api/verify | string |
ingress.code.className (1) internal | string |
ingress.code.hosts[].host (1) homepage-config.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
ingress.tailscale.className (1) tailscale | string |
boolean | |
ingress.tailscale.hosts[].host (1) {{ .Release.Name }} | string |
string | |
string | |
string | |
string | |
ingress.tailscale.tls[].hosts[] (1) - homepage | string |
number | |
string | |
number | |
boolean | |
number | |
string | |
boolean | |
string | |
defaultPodOptions.dnsConfig.searches[] (1) - svc.cluster.local | string |
string | |
global.hostname (1) homepage.${SECRET_DOMAIN_0} | string |
string | |
rbac.bindings.app.roleRef.apiGroup (1) rbac.authorization.k8s.io | string |
rbac.bindings.app.roleRef.kind (1) ClusterRole | string |
string | |
rbac.bindings.app.subjects[].kind (1) ServiceAccount | string |
string | |
string | |
rbac.bindings.app.type (1) ClusterRoleBinding | string |
rbac.roles.app.forceRename (1) homepage | string |
rbac.roles.app.rules[].apiGroups[] (1) - | string |
rbac.roles.app.rules[].resources[] (1) - namespaces | string |
rbac.roles.app.rules[].verbs[] (1) - get | string |
rbac.roles.app.type (1) ClusterRole | string |