No introduction found. Create it?
Install with:
helm repo add app-template oci://ghcr.io/bjw-s-labs/helm/app-template
helm install ocis app-template/app-template -f values.yamlSee examples from other people.
| Name | Repo | Stars | Version | Timestamp |
|---|---|---|---|---|
| ocis | haraldkoch/kochhaus-home | 160 | 4.6.2 | a month ago |
See the most popular values for this chart:
| Key | Types |
|---|---|
| string | |
| number | |
| boolean | |
| number | |
| number | |
| string | |
controllers.ocis.containers.ocis.env.OCIS_URL (6) https://files.${CLUSTER_DOMAIN} | string |
| boolean | |
| boolean | |
| string | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| string | |
| string | |
| boolean | |
| string | |
| string | |
controllers.ocis.containers.ocis.env.PROXY_USER_OIDC_CLAIM (3) preferred_username | string |
controllers.ocis.containers.ocis.env.TZ (3) ${TIMEZONE} | string |
controllers.ocis.containers.ocis.env.WEB_OIDC_SCOPE (3) openid profile email groups | string |
| string | |
controllers.ocis.containers.ocis.env.OCIS_OIDC_ISSUER (2) https://auth.${CLUSTER_DOMAIN} | string |
controllers.ocis.containers.ocis.env.PROXY_CSP_CONFIG_FILE_LOCATION (2) /etc/ocis/csp.yaml | string |
| boolean | |
| string | |
controllers.ocis.containers.ocis.env.WEB_OIDC_METADATA_URL (2) https://auth.${CLUSTER_DOMAIN}/.well-known/openid-configuration | string |
| boolean | |
| string | |
| boolean | |
controllers.ocis.containers.ocis.env.NOTIFICATIONS_SMTP_HOST (1) smtp.${CLUSTER_DOMAIN} | string |
| boolean | |
controllers.ocis.containers.ocis.env.NOTIFICATIONS_SMTP_SENDER (1) ocis@${CLUSTER_DOMAIN:=fnord} | string |
| boolean | |
| string | |
| string | |
| string | |
| boolean | |
| string | |
| string | |
| boolean | |
| string | |
controllers.ocis.containers.ocis.image.repository (6) docker.io/owncloud/ocis | string |
controllers.ocis.containers.ocis.image.tag (6) 7.3.1@sha256:6ab768c78681e743b5fe4d18a26cda58a28b714c9ed9a2c585411af51c26a6f7 | string |
| boolean | |
| boolean | |
| boolean | |
| string | |
| boolean | |
| string | |
| string | |
| string | |
| string | |
controllers.ocis.containers.app.args[] (1) - -c | string |
| string | |
| boolean | |
controllers.ocis.containers.app.env.NOTIFICATIONS_SMTP_HOST (1) ${SMTP_RELAY_IP} | string |
| boolean | |
| string | |
controllers.ocis.containers.app.env.NOTIFICATIONS_SMTP_SENDER (1) ocis@${SECRET_DOMAIN} | string |
| boolean | |
| boolean | |
| string | |
| boolean | |
controllers.ocis.containers.app.env.OCIS_OIDC_ISSUER (1) https://auth.${SECRET_DOMAIN} | string |
controllers.ocis.containers.app.env.OCIS_URL (1) https://ocis.${SECRET_DOMAIN} | string |
| boolean | |
| string | |
| string | |
| string | |
| boolean | |
| string | |
| string | |
| boolean | |
controllers.ocis.containers.app.env.PROXY_USER_OIDC_CLAIM (1) preferred_username | string |
| string | |
controllers.ocis.containers.app.env.TZ (1) ${TIMEZONE} | string |
| string | |
controllers.ocis.containers.app.env.WEB_OIDC_METADATA_URL (1) https://auth.${SECRET_DOMAIN}/.well-known/openid-configuration | string |
controllers.ocis.containers.app.env.WEB_OIDC_SCOPE (1) openid profile email groups | string |
| string | |
controllers.ocis.containers.app.image.repository (1) docker.io/owncloud/ocis | string |
| string | |
| boolean | |
| boolean | |
controllers.ocis.initContainers.init-config.args[] (6) - if [ ! -f /etc/ocis/ocis.yaml ]; then ocis init; else exit 0; fi
| string |
| string | |
| boolean | |
controllers.ocis.initContainers.init-config.image.repository (6) docker.io/owncloud/ocis | string |
| string | |
persistence.data.globalMounts[].path (7) /etc/ocis | string |
| string | |
| string | |
| string | |
persistence.data.path (3) /backup/data/k8s/ocis | string |
persistence.data.server (3) ${SECRET_BACKUP_SERVER:=fnord} | string |
persistence.data.accessMode (1) ReadWriteOnce | string |
| string | |
persistence.tmpfs.type (6) emptyDir | string |
| string | |
| string | |
| string | |
| string | |
persistence.config.globalMounts[].path (4) /etc/ocis/csp.yaml | string |
persistence.config.globalMounts[].subPath (4) csp.yaml | string |
| boolean | |
persistence.config.type (4) configMap | string |
| string | |
persistence.config.accessMode (1) ReadWriteOnce | string |
| boolean | |
| string | |
| string | |
persistence.config-proxy.globalMounts[].path (2) /etc/ocis/proxy.yaml | string |
| boolean | |
| string | |
persistence.config-proxy.name (2) ocis-configmap | string |
persistence.config-proxy.type (2) configMap | string |
| string | |
persistence.storage-users.globalMounts[].subPath (2) storage-users | string |
persistence.storage-users.path (2) /backup/data/k8s/ocis | string |
persistence.storage-users.server (2) ${SECRET_BACKUP_SERVER:=fnord} | string |
| string | |
| string | |
| boolean | |
persistence.movies.path (1) /movies | string |
persistence.movies.server (1) ${NFS_SERVER} | string |
| string | |
| string | |
| boolean | |
persistence.series.path (1) /series | string |
persistence.series.server (1) ${NFS_SERVER} | string |
| string | |
persistence.web-config.globalMounts[].path (1) /etc/ocis/web.yaml | string |
| boolean | |
| string | |
| string | |
persistence.web-config.type (1) configMap | string |
| number | |
| boolean | |
| number | |
| string | |
route.app.hostnames[] (4) - files.${CLUSTER_DOMAIN} | string |
route.app.parentRefs[].name (4) envoy-internal | string |
| string | |
| string | |
| string | |
| string | |
route.app.annotations."gethomepage.dev/icon" (3) owncloud.svg | string |
route.app.annotations."gethomepage.dev/name" (3) ownCloud Infinite Scale | string |
| string | |
| string | |
| number | |
| string | |
| string | |
| string | |
ingress.internal.hosts[].host (2) arai.${SECRET_DOMAIN} | string |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
ingress.internal.annotations."hajimari.io/icon" (1) arcticons:owncloud | string |
| string | |
| string | |
| boolean | |
ingress.internal.tls[].hosts[] (1) - drive.${SECRET_DOMAIN} | string |
ingress.app.annotations."external-dns.alpha.kubernetes.io/target" (1) internal.${CLUSTER_DOMAIN} | string |
ingress.app.className (1) internal | string |
ingress.app.hosts[].host (1) files.${CLUSTER_DOMAIN} | string |
| string | |
| string | |
| number | |
ingress.external.annotations."external-dns.alpha.kubernetes.io/target" (1) external.${SECRET_DOMAIN} | string |
ingress.external.className (1) external | string |
ingress.external.hosts[].host (1) drive.${SECRET_DOMAIN} | string |
| string | |
| string | |
| string | |
ingress.external.tls[].hosts[] (1) - drive.${SECRET_DOMAIN} | string |
ingress.public.annotations."external-dns.alpha.kubernetes.io/target" (1) ingress.${PUBLIC_DOMAIN} | string |
| string | |
ingress.public.annotations."nginx.ingress.kubernetes.io/configuration-snippet" (1) sub_filter </head>
'</head><script defer src="https://analytics.thiagoalmeida.xyz/script.js" data-website-id="3ba1cf3d-89e2-410e-beeb-700a854307ff"></script>';
sub_filter_once on;
| string |
| string | |
| string | |
| string | |
| boolean | |
ingress.public.hosts[].host (1) arai.${PUBLIC_DOMAIN} | string |
| string | |
| string | |
| string |