mirror of
https://github.com/auricom/home-cluster.git
synced 2025-10-03 01:00:54 +02:00
chore(deps): update helm release lidarr to v10
Signed-off-by: Auricom <auricom@users.noreply.github.com>
This commit is contained in:
@@ -10,7 +10,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
# renovate: registryUrl=https://k8s-at-home.com/charts/
|
# renovate: registryUrl=https://k8s-at-home.com/charts/
|
||||||
chart: lidarr
|
chart: lidarr
|
||||||
version: 9.1.0
|
version: 10.1.1
|
||||||
sourceRef:
|
sourceRef:
|
||||||
kind: HelmRepository
|
kind: HelmRepository
|
||||||
name: k8s-at-home-charts
|
name: k8s-at-home-charts
|
||||||
@@ -28,22 +28,58 @@ spec:
|
|||||||
runAsUser: 568
|
runAsUser: 568
|
||||||
runAsGroup: 568
|
runAsGroup: 568
|
||||||
fsGroup: 568
|
fsGroup: 568
|
||||||
|
ingress:
|
||||||
|
main:
|
||||||
|
enabled: true
|
||||||
|
annotations:
|
||||||
|
kubernetes.io/ingress.class: "nginx"
|
||||||
|
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
|
||||||
|
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}/"
|
||||||
|
nginx.ingress.kubernetes.io/configuration-snippet: |
|
||||||
|
proxy_set_header Accept-Encoding "";
|
||||||
|
sub_filter '</head>' '<link rel="stylesheet" type="text/css" href="https://gilbn.github.io/theme.park/CSS/themes/lidarr/space-gray.css"></head>';
|
||||||
|
sub_filter_once on;
|
||||||
|
forecastle.stakater.com/expose: "true"
|
||||||
|
forecastle.stakater.com/appName: "Lidarr"
|
||||||
|
forecastle.stakater.com/icon: "https://raw.githubusercontent.com/lidarr/Lidarr/14c3d31c2bf64893e9e7c137a04bfc096e6d36fe/frontend/src/Content/Images/Icons/android-chrome-192x192.png"
|
||||||
|
forecastle.stakater.com/network-restricted: "true"
|
||||||
|
# -- Nginx client Body Buffer Size
|
||||||
|
nginx.ingress.kubernetes.io/client-body-buffer-size: "20m"
|
||||||
|
# -- Nginx Proxy Body Size
|
||||||
|
nginx.ingress.kubernetes.io/proxy-body-size: "20m"
|
||||||
|
nginx.ingress.kubernetes.io/proxy-buffering: "off"
|
||||||
|
hosts:
|
||||||
|
- host: lidarr.${SECRET_CLUSTER_DOMAIN}
|
||||||
|
paths:
|
||||||
|
- path: /
|
||||||
|
pathType: Prefix
|
||||||
|
tls:
|
||||||
|
- hosts:
|
||||||
|
- "liddarr.${SECRET_CLUSTER_DOMAIN}"
|
||||||
|
api:
|
||||||
|
enabled: true
|
||||||
|
annotations:
|
||||||
|
kubernetes.io/ingress.class: "nginx"
|
||||||
|
hosts:
|
||||||
|
- host: "lidarr.${SECRET_CLUSTER_DOMAIN}"
|
||||||
|
paths:
|
||||||
|
- path: /api
|
||||||
|
pathType: Prefix
|
||||||
|
tls:
|
||||||
|
- hosts:
|
||||||
|
- "lidarr.${SECRET_CLUSTER_DOMAIN}"
|
||||||
persistence:
|
persistence:
|
||||||
config:
|
config:
|
||||||
enabled: true
|
enabled: true
|
||||||
existingClaim: lidarr-config
|
existingClaim: lidarr-config
|
||||||
additionalVolumeMounts:
|
nfs-video-media:
|
||||||
- name: nfs-music-media
|
enabled: true
|
||||||
|
existingClaim: nfs-music-media
|
||||||
mountPath: "/mnt/storage/music"
|
mountPath: "/mnt/storage/music"
|
||||||
- name: qbittorrent-cache
|
qbittorrent-cache:
|
||||||
|
enabled: true
|
||||||
|
existingClaim: qbittorrent-cache
|
||||||
mountPath: "/downloads"
|
mountPath: "/downloads"
|
||||||
additionalVolumes:
|
|
||||||
- name: nfs-music-media
|
|
||||||
persistentVolumeClaim:
|
|
||||||
claimName: nfs-music-media
|
|
||||||
- name: qbittorrent-cache
|
|
||||||
persistentVolumeClaim:
|
|
||||||
claimName: qbittorrent-cache
|
|
||||||
resources:
|
resources:
|
||||||
requests:
|
requests:
|
||||||
memory: 500Mi
|
memory: 500Mi
|
||||||
@@ -51,28 +87,35 @@ spec:
|
|||||||
limits:
|
limits:
|
||||||
memory: 1500Mi
|
memory: 1500Mi
|
||||||
service:
|
service:
|
||||||
annotations:
|
main:
|
||||||
prometheus.io/probe: "true"
|
annotations:
|
||||||
prometheus.io/protocol: http
|
prometheus.io/probe: "true"
|
||||||
ingress:
|
prometheus.io/protocol: http
|
||||||
enabled: true
|
prometheus:
|
||||||
annotations:
|
podMonitor:
|
||||||
kubernetes.io/ingress.class: "nginx"
|
enabled: true
|
||||||
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
|
interval: 10m
|
||||||
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}/"
|
scrapeTimeout: 2m
|
||||||
nginx.ingress.kubernetes.io/configuration-snippet: |
|
additionalContainers:
|
||||||
proxy_set_header Accept-Encoding "";
|
- name: exportarr
|
||||||
sub_filter '</head>' '<link rel="stylesheet" type="text/css" href="https://gilbn.github.io/theme.park/CSS/themes/lidarr/space-gray.css"></head>';
|
image: ghcr.io/onedr0p/exportarr:v0.6.0
|
||||||
sub_filter_once on;
|
imagePullPolicy: IfNotPresent
|
||||||
forecastle.stakater.com/expose: "true"
|
args: ["exportarr", "lidarr"]
|
||||||
forecastle.stakater.com/appName: "Lidarr"
|
env:
|
||||||
forecastle.stakater.com/icon: "https://raw.githubusercontent.com/lidarr/Lidarr/14c3d31c2bf64893e9e7c137a04bfc096e6d36fe/frontend/src/Content/Images/Icons/android-chrome-192x192.png"
|
- name: PORT
|
||||||
forecastle.stakater.com/network-restricted: "true"
|
value: "32123"
|
||||||
hosts:
|
- name: URL
|
||||||
- host: lidarr.${SECRET_CLUSTER_DOMAIN}
|
value: "http://localhost"
|
||||||
paths:
|
- name: CONFIG
|
||||||
- path: /
|
value: "/config/config.xml"
|
||||||
pathType: Prefix
|
- name: ENABLE_UNKNOWN_QUEUE_ITEMS
|
||||||
tls:
|
value: "true"
|
||||||
- hosts:
|
- name: ENABLE_ADDITIONAL_METRICS
|
||||||
- "lidarr.${SECRET_CLUSTER_DOMAIN}"
|
value: "true"
|
||||||
|
ports:
|
||||||
|
- name: exportarr
|
||||||
|
containerPort: 32123
|
||||||
|
volumeMounts:
|
||||||
|
- name: config
|
||||||
|
mountPath: /config
|
||||||
|
readOnly: true
|
||||||
|
@@ -49,7 +49,7 @@ spec:
|
|||||||
nginx.ingress.kubernetes.io/proxy-body-size: "20m"
|
nginx.ingress.kubernetes.io/proxy-body-size: "20m"
|
||||||
nginx.ingress.kubernetes.io/proxy-buffering: "off"
|
nginx.ingress.kubernetes.io/proxy-buffering: "off"
|
||||||
hosts:
|
hosts:
|
||||||
- host: sonarr.${SECRET_CLUSTER_DOMAIN}
|
- host: radarr.${SECRET_CLUSTER_DOMAIN}
|
||||||
paths:
|
paths:
|
||||||
- path: /
|
- path: /
|
||||||
pathType: Prefix
|
pathType: Prefix
|
||||||
|
Reference in New Issue
Block a user