No introduction found. Create it?
calibre-web from bjw-s is more popular with 17 repositories.
Install with:
helm repo add bjw-s oci://ghcr.io/bjw-s/helm/
helm install calibre-web bjw-s/app-template -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|---|---|---|---|
calibre-web | szinn/k8s-homelab | 88 | 1.5.1 | 3 hours ago |
calibre-web | bjw-s/home-ops | 369 | 1.5.1 | 7 hours ago |
See the most popular values for this chart:
Key | Types |
---|---|
image.repository (6) ghcr.io/bjw-s/calibre-web | string |
image.tag (6) 0.6.20@sha256:a5a40ae5bc78afee94515cc20dca470ce775c2e7456962fac3e09e63cc00ddf2 | string |
image.pullPolicy (1) IfNotPresent | string |
boolean | |
ingress.main.hosts[].host (6) books.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
ingress.main.tls[].hosts[] (5) - books.${SECRET_DOMAIN} | string |
ingress.main.annotations."external-dns.alpha.kubernetes.io/target" (4) ingress.${SECRET_DOMAIN} | string |
ingress.main.annotations."hajimari.io/icon" (4) book-plus-multiple | string |
string | |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-response-headers" (2) Remote-User,Remote-Name,Remote-Groups,Remote-Email | string |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-signin" (2) https://auth.${SECRET_DOMAIN}?rm=$request_method | string |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-url" (2) http://authelia.default.svc.cluster.local:8000/api/verify | string |
string | |
string | |
string | |
string | |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-snippet" (1) proxy_set_header X-Forwarded-Method $request_method; | string |
ingress.main.annotations."nginx.ingress.kubernetes.io/configuration-snippet" (1) proxy_set_header Accept-Encoding "";
sub_filter '</head>' '<link rel="stylesheet" type="text/css" href="https://theme-park.${SECRET_DOMAIN_NAME}/css/base/calibreweb/nord.css"></head>';
sub_filter_once on;
| string |
ingress.main.annotations."traefik.ingress.kubernetes.io/router.middlewares" (1) networking-sso@kubernetescrd | string |
ingress.kobo.annotations."external-dns.alpha.kubernetes.io/target" (1) ingress.${SECRET_DOMAIN} | string |
string | |
ingress.kobo.annotations."nginx.ingress.kubernetes.io/configuration-snippet" (1) proxy_busy_buffers_size 256k;
| string |
string | |
string | |
string | |
boolean | |
ingress.kobo.hosts[].host (1) books-kobo.${SECRET_DOMAIN} | string |
string | |
ingress.kobo.ingressClassName (1) nginx-internal | string |
ingress.kobo.tls[].hosts[] (1) - books-kobo.${SECRET_DOMAIN} | string |
boolean | |
string | |
persistence.cache.type (6) emptyDir | string |
boolean | |
string | |
persistence.media.path (3) /volume1/Media | string |
persistence.media.server (3) ${NAS_ADDR} | string |
string | |
persistence.media.existingClaim (2) calibre-web-books-nfs | string |
boolean | |
boolean | |
string | |
persistence.books.path (1) /volume1/Library/Calibre/Calibre_eBooks | string |
string | |
string | |
boolean | |
persistence.config.existingClaim (1) calibre-web-config-ceph | string |
boolean | |
persistence.custom-scripts.mountPath (1) /custom-cont-init.d/patch-session-protection.sh | string |
persistence.custom-scripts.name (1) calibre-web-configmap | string |
persistence.custom-scripts.subPath (1) patch-session-protection.sh | string |
persistence.custom-scripts.type (1) configMap | string |
string | |
string | |
string | |
number | |
boolean | |
env.CACHE_DIR (5) /cache | string |
env.PGID (3) 568 | number |
env.PUID (3) 568 | number |
env.TZ (3) ${TIMEZONE} | string |
number | |
env.DOCKER_MODS (1) linuxserver/mods:universal-calibre | string |
volumeClaimTemplates[].accessMode (5) ReadWriteOnce | string |
string | |
string | |
string | |
volumeClaimTemplates[].storageClass (5) ceph-block | string |
controller.type (4) statefulset | string |
string | |
number | |
number | |
number | |
podSecurityContext.fsGroupChangePolicy (3) OnRootMismatch | string |
number | |
securityContext.seccompProfile.type (1) Unconfined | string |