No introduction found. Create it?
Install with:
helm repo add app-template oci://ghcr.io/bjw-s-labs/helm/app-template
helm install ocis app-template/app-template -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|---|---|---|---|
ocis | ishioni/homelab-ops | 139 | 4.3.0 | 6 days ago |
ocis | haraldkoch/kochhaus-home | 153 | 4.3.0 | 8 days ago |
ocis | szinn/k8s-homelab | 260 | 4.2.0 | 2 months ago |
See the most popular values for this chart:
Key | Types |
---|---|
controllers.ocis.initContainers.init-config.args[] (13) - if [ ! -f /etc/ocis/ocis.yaml ]; then ocis init; else exit 0; fi
| string |
string | |
boolean | |
controllers.ocis.initContainers.init-config.image.repository (13) docker.io/owncloud/ocis | string |
string | |
number, string | |
string | |
number, string | |
boolean | |
number, string | |
number | |
string | |
number | |
controllers.ocis.pod.topologySpreadConstraints[].topologyKey (2) kubernetes.io/hostname | string |
string | |
boolean | |
string | |
boolean | |
controllers.ocis.containers.ocis.env.OCIS_URL (12) https://files.${SECRET_DOMAIN} | string |
boolean | |
boolean | |
string, boolean | |
boolean | |
controllers.ocis.containers.ocis.env.PROXY_CSP_CONFIG_FILE_LOCATION (6) /etc/ocis/csp.yaml | string |
string | |
boolean | |
string | |
string | |
controllers.ocis.containers.ocis.env.PROXY_USER_OIDC_CLAIM (6) preferred_username | string |
controllers.ocis.containers.ocis.env.TZ (6) ${TIMEZONE} | string |
controllers.ocis.containers.ocis.env.WEB_OIDC_SCOPE (6) openid profile email groups | string |
controllers.ocis.containers.ocis.env.OCIS_OIDC_ISSUER (5) https://auth.${EXTERNAL_DOMAIN}/application/o/owncloud/ | string |
string | |
controllers.ocis.containers.ocis.env.WEB_OIDC_METADATA_URL (5) https://auth.${EXTERNAL_DOMAIN}/application/o/owncloud/.well-known/openid-configuration | string |
boolean | |
boolean | |
string, boolean | |
string | |
string | |
string | |
controllers.ocis.containers.ocis.env.STORAGE_USERS_S3NG_ENDPOINT (3) https://s3.cnas.dev | string |
string | |
string | |
string | |
string | |
number | |
string, number | |
controllers.ocis.containers.ocis.env.ONLYOFFICE_DOMAIN (2) onlyoffice.${SECRET_DOMAIN} | string |
string | |
boolean | |
controllers.ocis.containers.ocis.env.NOTIFICATIONS_SMTP_HOST (1) smtp.${CLUSTER_DOMAIN} | string |
boolean | |
controllers.ocis.containers.ocis.env.NOTIFICATIONS_SMTP_SENDER (1) ocis@${CLUSTER_DOMAIN:=fnord} | string |
string | |
string | |
string | |
controllers.ocis.containers.ocis.image.repository (12) docker.io/owncloud/ocis | string |
string | |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
boolean | |
string | |
string | |
string | |
string | |
boolean | |
string | |
boolean | |
string | |
string | |
string | |
string | |
controllers.ocis.containers.app.env.OCIS_URL (1) https://${GATUS_DOMAIN:-${GATUS_SUBDOMAIN:-${APP}}.${DOMAIN_APP}} | string |
string | |
string | |
controllers.ocis.containers.app.image.repository (1) docker.io/owncloud/ocis | string |
controllers.ocis.containers.app.image.tag (1) 7.2.0@sha256:a4b42923f0f3c4458660e1485693bf5a8399b8354c75febfedfd07e55590b8ab | string |
boolean | |
boolean | |
string | |
string | |
string | |
boolean | |
string | |
boolean | |
string | |
string | |
persistence.data.globalMounts[].path (13) /var/lib/ocis | string |
string | |
persistence.data.existingClaim (8) ocis-data | string |
string | |
persistence.data.path (4) ${NAS_BASE_URL}/media/software/applications/owncloud | string |
persistence.data.server (4) ${NAS_ADDRESS} | string |
persistence.data.accessMode (1) ReadWriteOnce | string |
string | |
persistence.config.globalMounts[].path (11) /etc/ocis/web.yaml | string |
string | |
boolean | |
persistence.config.type (11) configMap | string |
string | |
persistence.config.accessMode (1) ReadWriteOnce | string |
boolean | |
string | |
string | |
persistence.tmpfs.type (10) emptyDir | string |
string | |
string | |
string | |
string | |
string | |
persistence.storage-users.globalMounts[].subPath (3) storage-users | string |
persistence.storage-users.path (3) ${NAS_BASE_URL}/media/software/applications/owncloud | string |
persistence.storage-users.server (3) ${NAS_ADDRESS} | string |
string | |
string | |
string | |
persistence.tmp.type (3) emptyDir | string |
persistence.csp.globalMounts[].path (2) /etc/ocis/csp.yaml | string |
boolean | |
string | |
persistence.csp.name (2) ocis-csp | string |
persistence.csp.type (2) configMap | string |
persistence.config-proxy.globalMounts[].path (1) /etc/ocis/proxy.yaml | string |
boolean | |
string | |
persistence.config-proxy.name (1) ocis-configmap | string |
persistence.config-proxy.type (1) configMap | string |
string | |
boolean | |
persistence.movies.path (1) /movies | string |
persistence.movies.server (1) ${NFS_SERVER} | string |
string | |
string | |
boolean | |
persistence.series.path (1) /series | string |
persistence.series.server (1) ${NFS_SERVER} | string |
string | |
persistence.web-config.globalMounts[].path (1) /etc/ocis/web.yaml | string |
boolean | |
string | |
string | |
persistence.web-config.type (1) configMap | string |
number | |
boolean | |
number | |
number | |
number | |
string | |
string | |
number | |
route.app.hostnames[] (8) - files.${SECRET_DOMAIN} | string |
route.app.parentRefs[].name (8) envoy-external | string |
string | |
string | |
string | |
string | |
route.app.annotations."gethomepage.dev/icon" (4) owncloud.svg | string |
route.app.annotations."gethomepage.dev/name" (4) ownCloud Infinite Scale | string |
route.app.annotations."gethomepage.dev/description" (1) File Sync and Share | string |
number | |
string | |
string | |
route.internal.hostnames[] (1) - files.zinn.ca | string |
string | |
route.internal.parentRefs[].namespace (1) kube-system | string |
string | |
string | |
string | |
ingress.app.className (2) internal | string |
ingress.app.hosts[].host (2) files.${CLUSTER_DOMAIN} | string |
string | |
string | |
number, string | |
string | |
ingress.app.annotations."external-dns.alpha.kubernetes.io/target" (1) internal.${CLUSTER_DOMAIN} | string |
string | |
ingress.app.tls[].hosts[] (1) - files.${EXTERNAL_DOMAIN} | string |
string | |
ingress.internal.hosts[].host (2) arai.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
ingress.internal.annotations."hajimari.io/icon" (1) arcticons:owncloud | string |
string | |
string | |
boolean | |
ingress.internal.tls[].hosts[] (1) - drive.${SECRET_DOMAIN} | string |
ingress.external.annotations."external-dns.alpha.kubernetes.io/target" (1) external.${SECRET_DOMAIN} | string |
ingress.external.className (1) external | string |
ingress.external.hosts[].host (1) drive.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
ingress.external.tls[].hosts[] (1) - drive.${SECRET_DOMAIN} | string |
ingress.public.annotations."external-dns.alpha.kubernetes.io/target" (1) ingress.${PUBLIC_DOMAIN} | string |
string | |
ingress.public.annotations."nginx.ingress.kubernetes.io/configuration-snippet" (1) sub_filter </head>
'</head><script defer src="https://analytics.thiagoalmeida.xyz/script.js" data-website-id="3ba1cf3d-89e2-410e-beeb-700a854307ff"></script>';
sub_filter_once on;
| string |
string | |
string | |
string | |
boolean | |
ingress.public.hosts[].host (1) arai.${PUBLIC_DOMAIN} | string |
string | |
string | |
string |