فهرست منبع

Publish new changes in catalog

sonicaj 1 سال پیش
والد
کامیت
33ab2308d2

+ 6 - 0
community/passbolt/1.0.0/Chart.lock

@@ -0,0 +1,6 @@
+dependencies:
+- name: common
+  repository: file://../../../common
+  version: 1.1.1
+digest: sha256:a7dbe3e4d42dbcd4325776e5e01a1d630c7f185f79e7ebf22b1b9cc80f56eed7
+generated: "2023-10-18T15:31:40.718484458+03:00"

+ 26 - 0
community/passbolt/1.0.0/Chart.yaml

@@ -0,0 +1,26 @@
+name: passbolt
+description: Passbolt is a security-first, open source password manager
+annotations:
+  title: Passbolt
+type: application
+version: 1.0.0
+apiVersion: v2
+appVersion: 4.3.0
+kubeVersion: '>=1.16.0-0'
+maintainers:
+  - name: truenas
+    url: https://www.truenas.com/
+    email: dev@ixsystems.com
+dependencies:
+  - name: common
+    repository: file://../../../common
+    version: 1.1.1
+home: https://www.passbolt.com
+icon: https://media.sys.truenas.net/apps/passbolt/icons/icon.svg
+sources:
+  - https://hub.docker.com/r/passbolt/passbolt
+  - https://github.com/truenas/charts/tree/master/community/passbolt
+  - https://www.passbolt.com
+keywords:
+  - password
+  - manager

+ 22 - 0
community/passbolt/1.0.0/README.md

@@ -0,0 +1,22 @@
+# Passbolt
+
+[Passbolt](https://www.passbolt.com) is a security-first, open source password manager
+
+> When application is installed, a container will be launched with **root** privileges.
+> This is required in order to apply the correct permissions to the `Passbolt` directories.
+> Afterward, the `Passbolt` container will run as a **non**-root user (`33`).
+> Same applies to the `mariadb` container. This will run afterwards as a **non**-root user (`999`).
+> On each upgrade, a container will be launched with **root** privileges in order to apply the correct
+> permissions to the `mariadb` **backups** directory. Container that performs the backup will run as a **non**-root user (`999`) afterwards.
+> Keep in mind the permissions on the backup directory will be changed to `999:999` on **every** update.
+> But will only be changed once for the `Passbolt` and `mariadb` data directories.
+
+## Register admin user
+
+Connect to the container's shell and run the following command replacing the
+values (`user@example.com`, `first_name`, `last_name`) with your own values.
+
+```shell
+/usr/share/php/passbolt/bin/cake passbolt register_user -r admin \
+  -u user@example.com -f first_name -l last_name
+```

+ 22 - 0
community/passbolt/1.0.0/app-readme.md

@@ -0,0 +1,22 @@
+# Passbolt
+
+[Passbolt](https://www.passbolt.com) is a security-first, open source password manager
+
+> When application is installed, a container will be launched with **root** privileges.
+> This is required in order to apply the correct permissions to the `Passbolt` directories.
+> Afterward, the `Passbolt` container will run as a **non**-root user (`33`).
+> Same applies to the `mariadb` container. This will run afterwards as a **non**-root user (`999`).
+> On each upgrade, a container will be launched with **root** privileges in order to apply the correct
+> permissions to the `mariadb` **backups** directory. Container that performs the backup will run as a **non**-root user (`999`) afterwards.
+> Keep in mind the permissions on the backup directory will be changed to `999:999` on **every** update.
+> But will only be changed once for the `Passbolt` and `mariadb` data directories.
+
+## Register admin user
+
+Connect to the container's shell and run the following command replacing the
+values (`user@example.com`, `first_name`, `last_name`) with your own values.
+
+```shell
+/usr/share/php/passbolt/bin/cake passbolt register_user -r admin \
+  -u user@example.com -f first_name -l last_name
+```

BIN
community/passbolt/1.0.0/charts/common-1.1.1.tgz


+ 15 - 0
community/passbolt/1.0.0/ci/basic-values.yaml

@@ -0,0 +1,15 @@
+passboltNetwork:
+  webPort: 31000
+
+passboltConfig:
+  appUrl: http://localhost:31000
+
+passboltStorage:
+  gpg:
+    type: pvc
+  jwt:
+    type: pvc
+  mariadbData:
+    type: pvc
+  mariadbBackup:
+    type: emptyDir

+ 15 - 0
community/passbolt/1.0.0/ci/host-values.yaml

@@ -0,0 +1,15 @@
+passboltNetwork:
+  hostNetwork: true
+
+passboltConfig:
+  appUrl: http://localhost:8080
+
+passboltStorage:
+  gpg:
+    type: pvc
+  jwt:
+    type: pvc
+  mariadbData:
+    type: pvc
+  mariadbBackup:
+    type: emptyDir

+ 102 - 0
community/passbolt/1.0.0/ci/https-values.yaml

@@ -0,0 +1,102 @@
+passboltConfig:
+  appUrl: https://localhost:31000
+
+passboltNetwork:
+  webPort: 31000
+  certificateID: 1
+
+passboltStorage:
+  gpg:
+    type: pvc
+  jwt:
+    type: pvc
+  mariadbData:
+    type: pvc
+  mariadbBackup:
+    type: emptyDir
+
+ixCertificates:
+  "1":
+    certificate: |
+      -----BEGIN CERTIFICATE-----
+      MIIEdjCCA16gAwIBAgIDYFMYMA0GCSqGSIb3DQEBCwUAMGwxDDAKBgNVBAMMA2Fz
+      ZDELMAkGA1UEBhMCVVMxDTALBgNVBAgMBGFzZGYxCzAJBgNVBAcMAmFmMQ0wCwYD
+      VQQKDARhc2RmMQwwCgYDVQQLDANhc2QxFjAUBgkqhkiG9w0BCQEWB2FAYS5jb20w
+      HhcNMjEwODMwMjMyMzU0WhcNMjMxMjAzMjMyMzU0WjBuMQswCQYDVQQDDAJhZDEL
+      MAkGA1UEBhMCVVMxDTALBgNVBAgMBGFzZGYxDTALBgNVBAcMBGFzZGYxDTALBgNV
+      BAoMBGFkc2YxDTALBgNVBAsMBGFzZGYxFjAUBgkqhkiG9w0BCQEWB2FAYS5jb20w
+      ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC7+1xOHRQyOnQTHFcrdasX
+      Zl0gzutVlA890a1wiQpdD5dOtCLo7+eqVYjqVKo9W8RUIArXWmBu/AbkH7oVFWC1
+      P973W1+ArF5sA70f7BZgqRKJTIisuIFIlRETgfnP2pfQmHRZtGaIJRZI4vQCdYgW
+      2g0KOvvNcZJCVq1OrhKiNiY1bWCp66DGg0ic6OEkZFHTm745zUNQaf2dNgsxKU0H
+      PGjVLJI//yrRFAOSBUqgD4c50krnMF7fU/Fqh+UyOu8t6Y/HsySh3urB+Zie331t
+      AzV6QV39KKxRflNx/yuWrtIEslGTm+xHKoCYJEk/nZ3mX8Y5hG6wWAb7A/FuDVg3
+      AgMBAAGjggEdMIIBGTAnBgNVHREEIDAehwTAqAADhwTAqAAFhwTAqAC2hwTAqACB
+      hwTAqACSMB0GA1UdDgQWBBQ4G2ff4tgZl4vmo4xCfqmJhdqShzAMBgNVHRMBAf8E
+      AjAAMIGYBgNVHSMEgZAwgY2AFLlYf9L99nxJDcpCM/LT3V5hQ/a3oXCkbjBsMQww
+      CgYDVQQDDANhc2QxCzAJBgNVBAYTAlVTMQ0wCwYDVQQIDARhc2RmMQswCQYDVQQH
+      DAJhZjENMAsGA1UECgwEYXNkZjEMMAoGA1UECwwDYXNkMRYwFAYJKoZIhvcNAQkB
+      FgdhQGEuY29tggNgUxcwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwEwDgYDVR0PAQH/
+      BAQDAgWgMA0GCSqGSIb3DQEBCwUAA4IBAQA6FpOInEHB5iVk3FP67GybJ29vHZTD
+      KQHbQgmg8s4L7qIsA1HQ+DMCbdylpA11x+t/eL/n48BvGw2FNXpN6uykhLHJjbKR
+      h8yITa2KeD3LjLYhScwIigXmTVYSP3km6s8jRL6UKT9zttnIHyXVpBDya6Q4WTMx
+      fmfC6O7t1PjQ5ZyVtzizIUP8ah9n4TKdXU4A3QIM6WsJXpHb+vqp1WDWJ7mKFtgj
+      x5TKv3wcPnktx0zMPfLb5BTSE9rc9djcBG0eIAsPT4FgiatCUChe7VhuMnqskxEz
+      MymJLoq8+mzucRwFkOkR2EIt1x+Irl2mJVMeBow63rVZfUQBD8h++LqB
+      -----END CERTIFICATE-----
+      -----BEGIN CERTIFICATE-----
+      MIIEhDCCA2ygAwIBAgIDYFMXMA0GCSqGSIb3DQEBCwUAMGwxDDAKBgNVBAMMA2Fz
+      ZDELMAkGA1UEBhMCVVMxDTALBgNVBAgMBGFzZGYxCzAJBgNVBAcMAmFmMQ0wCwYD
+      VQQKDARhc2RmMQwwCgYDVQQLDANhc2QxFjAUBgkqhkiG9w0BCQEWB2FAYS5jb20w
+      HhcNMjEwODMwMjMyMDQ1WhcNMzEwODI4MjMyMDQ1WjBsMQwwCgYDVQQDDANhc2Qx
+      CzAJBgNVBAYTAlVTMQ0wCwYDVQQIDARhc2RmMQswCQYDVQQHDAJhZjENMAsGA1UE
+      CgwEYXNkZjEMMAoGA1UECwwDYXNkMRYwFAYJKoZIhvcNAQkBFgdhQGEuY29tMIIB
+      IjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAq//c0hEEr83CS1pMgsHX50jt
+      2MqIbcf63UUNJTiYpUUvUQSFJFc7m/dr+RTZvu97eDCnD5K2qkHHvTPaPZwY+Djf
+      iy7N641Sz6u/y3Yo3xxs1Aermsfedh48vusJpjbkT2XS44VjbkrpKcWDNVpp3Evd
+      M7oJotXeUsZ+imiyVCfr4YhoY5gbGh/r+KN9Wf9YKoUyfLLZGwdZkhtX2zIbidsL
+      Thqi9YTaUHttGinjiBBum234u/CfvKXsfG3yP2gvBGnlvZnM9ktv+lVffYNqlf7H
+      VmB1bKKk84HtzuW5X76SGAgOG8eHX4x5ZLI1WQUuoQOVRl1I0UCjBtbz8XhwvQID
+      AQABo4IBLTCCASkwLQYDVR0RBCYwJIcEwKgABYcEwKgAA4cEwKgAkocEwKgAtYcE
+      wKgAgYcEwKgAtjAdBgNVHQ4EFgQUuVh/0v32fEkNykIz8tPdXmFD9rcwDwYDVR0T
+      AQH/BAUwAwEB/zCBmAYDVR0jBIGQMIGNgBS5WH/S/fZ8SQ3KQjPy091eYUP2t6Fw
+      pG4wbDEMMAoGA1UEAwwDYXNkMQswCQYDVQQGEwJVUzENMAsGA1UECAwEYXNkZjEL
+      MAkGA1UEBwwCYWYxDTALBgNVBAoMBGFzZGYxDDAKBgNVBAsMA2FzZDEWMBQGCSqG
+      SIb3DQEJARYHYUBhLmNvbYIDYFMXMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEF
+      BQcDAjAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQELBQADggEBAKEocOmVuWlr
+      zegtKYMe8NhHIkFY9oVn5ym6RHNOJpPH4QF8XYC3Z5+iC5yGh4P/jVe/4I4SF6Ql
+      PtofU0jNq5vzapt/y+m008eXqPQFmoUOvu+JavoRVcRx2LIP5AgBA1mF56CSREsX
+      TkuJAA9IUQ8EjnmAoAeKINuPaKxGDuU8BGCMqr/qd564MKNf9XYL+Fb2rlkA0O2d
+      2No34DQLgqSmST/LAvPM7Cbp6knYgnKmGr1nETCXasg1cueHLnWWTvps2HiPp2D/
+      +Fq0uqcZLu4Mdo0CPs4e5sHRyldEnRSKh0DVLprq9zr/GMipmPLJUsT5Jed3sj0w
+      M7Y3vwxshpo=
+      -----END CERTIFICATE-----
+    privatekey: |
+      -----BEGIN PRIVATE KEY-----
+      MIIEvAIBADANBgkqhkiG9w0BAQEFAASCBKYwggSiAgEAAoIBAQC7+1xOHRQyOnQT
+      HFcrdasXZl0gzutVlA890a1wiQpdD5dOtCLo7+eqVYjqVKo9W8RUIArXWmBu/Abk
+      H7oVFWC1P973W1+ArF5sA70f7BZgqRKJTIisuIFIlRETgfnP2pfQmHRZtGaIJRZI
+      4vQCdYgW2g0KOvvNcZJCVq1OrhKiNiY1bWCp66DGg0ic6OEkZFHTm745zUNQaf2d
+      NgsxKU0HPGjVLJI//yrRFAOSBUqgD4c50krnMF7fU/Fqh+UyOu8t6Y/HsySh3urB
+      +Zie331tAzV6QV39KKxRflNx/yuWrtIEslGTm+xHKoCYJEk/nZ3mX8Y5hG6wWAb7
+      A/FuDVg3AgMBAAECggEAapt30rj9DitGTtxAt13pJMEhyYxvvD3WkvmJwguF/Bbu
+      eW0Ba1c668fMeRCA54FWi1sMqusPS4HUqqUvk+tmyAOsAF4qgD/A4MMSC7uJSVI5
+      N/JWhJWyhCY94/FPakiO1nbPbVw41bcqtzU2qvparpME2CtxSCbDiqm7aaag3Kqe
+      EF0fGSUdZ+TYl9JM05+eIyiX+UY19Fg0OjTHMn8nGpxcNTfDBdQ68TKvdo/dtIKL
+      PLKzJUNNdM8odC4CvQtfGMqaslwZwXkiOl5VJcW21ncj/Y0ngEMKeD/i65ZoqGdR
+      0FKCQYEAGtM2FvJcZQ92Wsw7yj2bK2MSegVUyLK32QKBgQDe8syVCepPzRsfjfxA
+      6TZlWcGuTZLhwIx97Ktw3VcQ1f4rLoEYlv0xC2VWBORpzIsJo4I/OLmgp8a+Ga8z
+      FkVRnq90dV3t4NP9uJlHgcODHnOardC2UUka4olBSCG6zmK4Jxi34lOxhGRkshOo
+      L4IBeOIB5g+ZrEEXkzfYJHESRQKBgQDX2YhFhGIrT8BAnC5BbXbhm8h6Bhjz8DYL
+      d+qhVJjef7L/aJxViU0hX9Ba2O8CLK3FZeREFE3hJPiJ4TZSlN4evxs5p+bbNDcA
+      0mhRI/o3X4ac6IxdRebyYnCOB/Cu94/MzppcZcotlCekKNike7eorCcX4Qavm7Pu
+      MUuQ+ifmSwKBgEnchoqZzlbBzMqXb4rRuIO7SL9GU/MWp3TQg7vQmJerTZlgvsQ2
+      wYsOC3SECmhCq4117iCj2luvOdihCboTFsQDnn0mpQe6BIF6Ns3J38wAuqv0CcFd
+      DKsrge1uyD3rQilgSoAhKzkUc24o0PpXQurZ8YZPgbuXpbj5vPaOnCdBAoGACYc7
+      wb3XS4wos3FxhUfcwJbM4b4VKeeHqzfu7pI6cU/3ydiHVitKcVe2bdw3qMPqI9Wc
+      nvi6e17Tbdq4OCsEJx1OiVwFD9YdO3cOTc6lw/3+hjypvZBRYo+/4jUthbu96E+S
+      dtOzehGZMmDvN0uSzupSi3ZOgkAAUFpyuIKickMCgYAId0PCRjonO2thn/R0rZ7P
+      //L852uyzYhXKw5/fjFGhQ6LbaLgIRFaCZ0L2809u0HFnNvJjHv4AKP6j+vFQYYY
+      qQ+66XnfsA9G/bu4MDS9AX83iahD9IdLXQAy8I19prAbpVumKegPbMnNYNB/TYEc
+      3G15AKCXo7jjOUtHY01DCQ==
+      -----END PRIVATE KEY-----

+ 45 - 0
community/passbolt/1.0.0/ix_values.yaml

@@ -0,0 +1,45 @@
+image:
+  repository: passbolt/passbolt
+  pullPolicy: IfNotPresent
+  tag: 4.3.0-1-ce-non-root
+
+resources:
+  limits:
+    cpu: 4000m
+    memory: 8Gi
+
+passboltConfig:
+  appUrl: ''
+  additionalEnvs: []
+
+passboltNetwork:
+  webPort: 30097
+  certificateID:
+  hostNetwork: false
+
+passboltStorage:
+  gpg:
+    type: ixVolume
+    datasetName: gpg
+  jwt:
+    type: ixVolume
+    datasetName: jwt
+  mariadbData:
+    type: ixVolume
+    datasetName: mariadbData
+  mariadbBackup:
+    type: ixVolume
+    datasetName: mariadbBackup
+  additionalStorages: []
+
+notes:
+  custom: |
+    ## Register admin user
+
+    Connect to the container's shell and run the following command replacing the
+    values (`user@example.com`, `first_name`, `last_name`) with your own values.
+
+    ```shell
+    /usr/share/php/passbolt/bin/cake passbolt register_user -r admin \
+      -u user@example.com -f first_name -l last_name
+    ```

+ 8 - 0
community/passbolt/1.0.0/metadata.yaml

@@ -0,0 +1,8 @@
+runAsContext:
+  - userName: www-data
+    groupName: www-data
+    gid: 33
+    uid: 33
+    description: Passbolt run as a non-root user
+capabilities: []
+hostMounts: []

+ 340 - 0
community/passbolt/1.0.0/questions.yaml

@@ -0,0 +1,340 @@
+groups:
+  - name: Passbolt Configuration
+    description: Configure Passbolt
+  - name: Network Configuration
+    description: Configure Network for Passbolt
+  - name: Storage Configuration
+    description: Configure Storage for Passbolt
+  - name: Resources Configuration
+    description: Configure Resources for Passbolt
+
+portals:
+  web_portal:
+    protocols:
+      - "$kubernetes-resource_configmap_portal_protocol"
+    host:
+      - "$kubernetes-resource_configmap_portal_host"
+    ports:
+      - "$kubernetes-resource_configmap_portal_port"
+    path: "$kubernetes-resource_configmap_portal_path"
+
+questions:
+  - variable: passboltConfig
+    label: ""
+    group: Passbolt Configuration
+    schema:
+      type: dict
+      attrs:
+        - variable: appUrl
+          label: App URL
+          description: |
+            The URL for the Passbolt WebUI.</br>
+            Format is: https://sub.domain.tld:port
+          schema:
+            type: uri
+            default: ''
+            required: true
+        - variable: additionalEnvs
+          label: Additional Environment Variables
+          description: Configure additional environment variables for Passbolt.
+          schema:
+            type: list
+            default: []
+            items:
+              - variable: env
+                label: Environment Variable
+                schema:
+                  type: dict
+                  attrs:
+                    - variable: name
+                      label: Name
+                      schema:
+                        type: string
+                        required: true
+                    - variable: value
+                      label: Value
+                      schema:
+                        type: string
+                        required: true
+
+  - variable: passboltNetwork
+    label: ""
+    group: Network Configuration
+    schema:
+      type: dict
+      attrs:
+        - variable: hostNetwork
+          label: Host Network
+          description: |
+            Bind to the host network. It's recommended to keep this disabled.</br>
+          schema:
+            type: boolean
+            default: false
+        - variable: webPort
+          label: Web Port
+          description: The port for the Passbolt WebUI.
+          schema:
+            type: int
+            default: 30097
+            show_if: [["hostNetwork", "=", false]]
+            min: 9000
+            max: 65535
+            required: true
+        - variable: certificateID
+          label: Certificate
+          description: The certificate to use for Passbolt.
+          schema:
+            type: int
+            "null": true
+            $ref:
+              - "definitions/certificate"
+
+  - variable: passboltStorage
+    label: ""
+    group: Storage Configuration
+    schema:
+      type: dict
+      attrs:
+        - variable: gpg
+          label: Passbolt GPG Storage
+          description: The path to store Passbolt GPG.
+          schema:
+            type: dict
+            attrs:
+              - variable: type
+                label: Type
+                description: |
+                  ixVolume: Is dataset created automatically by the system.</br>
+                  Host Path: Is a path that already exists on the system.
+                schema:
+                  type: string
+                  required: true
+                  default: ixVolume
+                  enum:
+                    - value: hostPath
+                      description: Host Path (Path that already exists on the system)
+                    - value: ixVolume
+                      description: ixVolume (Dataset created automatically by the system)
+              - variable: datasetName
+                label: Dataset Name
+                schema:
+                  type: string
+                  show_if: [["type", "=", "ixVolume"]]
+                  required: true
+                  hidden: true
+                  immutable: true
+                  default: gpg
+                  $ref:
+                    - "normalize/ixVolume"
+              - variable: hostPath
+                label: Host Path
+                schema:
+                  type: hostpath
+                  show_if: [["type", "=", "hostPath"]]
+                  immutable: true
+                  required: true
+        - variable: jwt
+          label: Passbolt JWT Storage
+          description: The path to store Passbolt JWT.
+          schema:
+            type: dict
+            attrs:
+              - variable: type
+                label: Type
+                description: |
+                  ixVolume: Is dataset created automatically by the system.</br>
+                  Host Path: Is a path that already exists on the system.
+                schema:
+                  type: string
+                  required: true
+                  default: ixVolume
+                  enum:
+                    - value: hostPath
+                      description: Host Path (Path that already exists on the system)
+                    - value: ixVolume
+                      description: ixVolume (Dataset created automatically by the system)
+              - variable: datasetName
+                label: Dataset Name
+                schema:
+                  type: string
+                  show_if: [["type", "=", "ixVolume"]]
+                  required: true
+                  hidden: true
+                  immutable: true
+                  default: jwt
+                  $ref:
+                    - "normalize/ixVolume"
+              - variable: hostPath
+                label: Host Path
+                schema:
+                  type: hostpath
+                  show_if: [["type", "=", "hostPath"]]
+                  immutable: true
+                  required: true
+        - variable: mariadbData
+          label: Passbolt MariaDB Data Storage
+          description: The path to store Passbolt MariaDB Data.
+          schema:
+            type: dict
+            attrs:
+              - variable: type
+                label: Type
+                description: |
+                  ixVolume: Is dataset created automatically by the system.</br>
+                  Host Path: Is a path that already exists on the system.
+                schema:
+                  type: string
+                  required: true
+                  default: ixVolume
+                  enum:
+                    - value: hostPath
+                      description: Host Path (Path that already exists on the system)
+                    - value: ixVolume
+                      description: ixVolume (Dataset created automatically by the system)
+              - variable: datasetName
+                label: Dataset Name
+                schema:
+                  type: string
+                  show_if: [["type", "=", "ixVolume"]]
+                  required: true
+                  hidden: true
+                  immutable: true
+                  default: mariadbData
+                  $ref:
+                    - "normalize/ixVolume"
+              - variable: hostPath
+                label: Host Path
+                schema:
+                  type: hostpath
+                  show_if: [["type", "=", "hostPath"]]
+                  immutable: true
+                  required: true
+        - variable: mariadbBackup
+          label: Passbolt MariaDB Backup Storage
+          description: The path to store Passbolt MariaDB Backup.
+          schema:
+            type: dict
+            attrs:
+              - variable: type
+                label: Type
+                description: |
+                  ixVolume: Is dataset created automatically by the system.</br>
+                  Host Path: Is a path that already exists on the system.
+                schema:
+                  type: string
+                  required: true
+                  default: ixVolume
+                  enum:
+                    - value: hostPath
+                      description: Host Path (Path that already exists on the system)
+                    - value: ixVolume
+                      description: ixVolume (Dataset created automatically by the system)
+              - variable: datasetName
+                label: Dataset Name
+                schema:
+                  type: string
+                  show_if: [["type", "=", "ixVolume"]]
+                  required: true
+                  hidden: true
+                  immutable: true
+                  default: mariadbBackup
+                  $ref:
+                    - "normalize/ixVolume"
+              - variable: hostPath
+                label: Host Path
+                schema:
+                  type: hostpath
+                  show_if: [["type", "=", "hostPath"]]
+                  immutable: true
+                  required: true
+        - variable: additionalStorages
+          label: Additional Storage
+          description: Additional storage for Passbolt.
+          schema:
+            type: list
+            default: []
+            items:
+              - variable: storageEntry
+                label: Storage Entry
+                schema:
+                  type: dict
+                  attrs:
+                    - variable: type
+                      label: Type
+                      description: |
+                        ixVolume: Is dataset created automatically by the system.</br>
+                        Host Path: Is a path that already exists on the system.
+                      schema:
+                        type: string
+                        required: true
+                        default: "ixVolume"
+                        enum:
+                          - value: "hostPath"
+                            description: Host Path (Path that already exists on the system)
+                          - value: "ixVolume"
+                            description: ixVolume (Dataset created automatically by the system)
+                    - variable: mountPath
+                      label: Mount Path
+                      description: The path inside the container to mount the storage.
+                      schema:
+                        type: path
+                        required: true
+                    - variable: hostPath
+                      label: Host Path
+                      description: The host path to use for storage.
+                      schema:
+                        type: hostpath
+                        show_if: [["type", "=", "hostPath"]]
+                        required: true
+                    - variable: datasetName
+                      label: Dataset Name
+                      description: The name of the dataset to use for storage.
+                      schema:
+                        type: string
+                        show_if: [["type", "=", "ixVolume"]]
+                        required: true
+                        immutable: true
+                        default: "storage_entry"
+                        $ref:
+                          - "normalize/ixVolume"
+
+  - variable: resources
+    label: ""
+    group: Resources Configuration
+    schema:
+      type: dict
+      attrs:
+        - variable: limits
+          label: Limits
+          schema:
+            type: dict
+            attrs:
+              - variable: cpu
+                label: CPU
+                description: CPU limit for Passbolt.
+                schema:
+                  type: string
+                  max_length: 6
+                  valid_chars: '^(0\.[1-9]|[1-9][0-9]*)(\.[0-9]|m?)$'
+                  valid_chars_error: |
+                    Valid CPU limit formats are</br>
+                    - Plain Integer - eg. 1</br>
+                    - Float - eg. 0.5</br>
+                    - Milicpu - eg. 500m
+                  default: "4000m"
+                  required: true
+              - variable: memory
+                label: Memory
+                description: Memory limit for Passbolt.
+                schema:
+                  type: string
+                  max_length: 12
+                  valid_chars: '^[1-9][0-9]*([EPTGMK]i?|e[0-9]+)?$'
+                  valid_chars_error: |
+                    Valid Memory limit formats are</br>
+                    - Suffixed with E/P/T/G/M/K - eg. 1G</br>
+                    - Suffixed with Ei/Pi/Ti/Gi/Mi/Ki - eg. 1Gi</br>
+                    - Plain Integer in bytes - eg. 1024</br>
+                    - Exponent - eg. 134e6
+                  default: "8Gi"
+                  required: true

+ 1 - 0
community/passbolt/1.0.0/templates/NOTES.txt

@@ -0,0 +1 @@
+{{ include "ix.v1.common.lib.chart.notes" $ }}

+ 43 - 0
community/passbolt/1.0.0/templates/_configuration.tpl

@@ -0,0 +1,43 @@
+{{- define "passbolt.configuration" -}}
+
+  {{- $fullname := (include "ix.v1.common.lib.chart.names.fullname" $) -}}
+
+  {{- $dbHost := (printf "%s-mariadb" $fullname) -}}
+  {{- $dbUser := "passbolt" -}}
+  {{- $dbName := "passbolt" -}}
+
+  {{- $dbPass := (randAlphaNum 32) -}}
+  {{- $dbRootPass := (randAlphaNum 32) -}}
+  {{- with (lookup "v1" "Secret" .Release.Namespace (printf "%s-mariadb-creds" $fullname)) -}}
+    {{- $dbPass = ((index .data "MARIADB_PASSWORD") | b64dec) -}}
+    {{- $dbRootPass = ((index .data "MARIADB_ROOT_PASSWORD") | b64dec) -}}
+  {{- end }}
+
+secret:
+  mariadb-creds:
+    enabled: true
+    data:
+      MARIADB_USER: {{ $dbUser }}
+      MARIADB_DATABASE: {{ $dbName }}
+      MARIADB_PASSWORD: {{ $dbPass }}
+      MARIADB_ROOT_PASSWORD: {{ $dbRootPass }}
+      MARIADB_HOST: {{ $dbHost }}
+
+  passbolt-creds:
+    enabled: true
+    data:
+      DATASOURCES_DEFAULT_HOST: {{ $dbHost }}
+      DATASOURCES_DEFAULT_DATABASE: {{ $dbName }}
+      DATASOURCES_DEFAULT_USERNAME: {{ $dbUser }}
+      DATASOURCES_DEFAULT_PASSWORD: {{ $dbPass }}
+      DATASOURCES_DEFAULT_PORT: "3306"
+
+configmap:
+  passbolt-config:
+    enabled: true
+    data:
+      APP_FULL_BASE_URL: {{ .Values.passboltConfig.appUrl }}
+      GNUPGHOME: /var/lib/passbolt/.gnupg
+      PASSBOLT_GPG_SERVER_KEY_PUBLIC: /etc/passbolt/gpg/serverkey.asc
+      PASSBOLT_GPG_SERVER_KEY_PRIVATE: /etc/passbolt/gpg/serverkey_private.asc
+{{- end -}}

+ 6 - 0
community/passbolt/1.0.0/templates/_mariadb.tpl

@@ -0,0 +1,6 @@
+{{- define "passbolt.mariadb.workload" -}}
+workload:
+{{- include "ix.v1.common.app.mariadb" (dict "secretName" "mariadb-creds"
+                                              "resources" .Values.resources
+                                              "ixChartContext" .Values.ixChartContext) | nindent 2 }}
+{{- end -}}

+ 59 - 0
community/passbolt/1.0.0/templates/_passbolt.tpl

@@ -0,0 +1,59 @@
+{{- define "passbolt.workload" -}}
+workload:
+  passbolt:
+    enabled: true
+    primary: true
+    type: Deployment
+    podSpec:
+      hostNetwork: {{ .Values.passboltNetwork.hostNetwork }}
+      containers:
+        passbolt:
+          enabled: true
+          primary: true
+          imageSelector: image
+          securityContext:
+            runAsUser: 33
+            runAsGroup: 33
+            readOnlyRootFilesystem: false
+          envFrom:
+            - secretRef:
+                name: passbolt-creds
+            - configMapRef:
+                name: passbolt-config
+          {{ with .Values.passboltConfig.additionalEnvs }}
+          envList:
+            {{ range $env := . }}
+            - name: {{ $env.name }}
+              value: {{ $env.value }}
+            {{ end }}
+          {{ end }}
+          probes:
+            {{- $port := 8080 -}}
+            {{- $protocol := "http" -}}
+            {{- if .Values.passboltNetwork.certificateID -}}
+              {{- $port = 4433 -}}
+              {{- $protocol = "https" -}}
+            {{- end }}
+            liveness:
+              enabled: true
+              type: {{ $protocol }}
+              port: {{ $port }}
+              path: /healthcheck/status
+            readiness:
+              enabled: true
+              type: {{ $protocol }}
+              port: {{ $port }}
+              path: /healthcheck/status
+            startup:
+              enabled: true
+              type: {{ $protocol }}
+              port: {{ $port }}
+              path: /healthcheck/status
+      initContainers:
+      {{- include "ix.v1.common.app.permissions" (dict "containerName" "01-permissions"
+                                                        "UID" 33
+                                                        "GID" 33
+                                                        "type" "install") | nindent 8 }}
+      {{- include "ix.v1.common.app.mariadbWait" (dict "name" "02-mariadb-wait"
+                                                       "secretName" "mariadb-creds") | nindent 8 }}
+{{- end -}}

+ 104 - 0
community/passbolt/1.0.0/templates/_persistence.tpl

@@ -0,0 +1,104 @@
+{{- define "passbolt.persistence" -}}
+persistence:
+  gpg:
+    enabled: true
+    type: {{ .Values.passboltStorage.gpg.type }}
+    datasetName: {{ .Values.passboltStorage.gpg.datasetName | default "" }}
+    hostPath: {{ .Values.passboltStorage.gpg.hostPath | default "" }}
+    targetSelector:
+      passbolt:
+        passbolt:
+          mountPath: /etc/passbolt/gpg
+        01-permissions:
+          mountPath: /mnt/directories/gpg
+  jwt:
+    enabled: true
+    type: {{ .Values.passboltStorage.jwt.type }}
+    datasetName: {{ .Values.passboltStorage.jwt.datasetName | default "" }}
+    hostPath: {{ .Values.passboltStorage.jwt.hostPath | default "" }}
+    targetSelector:
+      passbolt:
+        passbolt:
+          mountPath: /etc/passbolt/jwt
+        01-permissions:
+          mountPath: /mnt/directories/jwt
+  tmp:
+    enabled: true
+    type: emptyDir
+    targetSelector:
+      passbolt:
+        passbolt:
+          mountPath: /tmp
+  varrun:
+    enabled: true
+    type: emptyDir
+    targetSelector:
+      passbolt:
+        passbolt:
+          mountPath: /var/run
+  {{- range $idx, $storage := .Values.passboltStorage.additionalStorages }}
+  {{ printf "passbolt-%v" (int $idx) }}:
+    enabled: true
+    type: {{ $storage.type }}
+    datasetName: {{ $storage.datasetName | default "" }}
+    hostPath: {{ $storage.hostPath | default "" }}
+    targetSelector:
+      passbolt:
+        passbolt:
+          mountPath: {{ $storage.mountPath }}
+        01-permissions:
+          mountPath: /mnt/directories{{ $storage.mountPath }}
+  {{- end }}
+
+  mariadbdata:
+    enabled: true
+    type: {{ .Values.passboltStorage.mariadbData.type }}
+    datasetName: {{ .Values.passboltStorage.mariadbData.datasetName | default "" }}
+    hostPath: {{ .Values.passboltStorage.mariadbData.hostPath | default "" }}
+    targetSelector:
+      # MariaDB pod
+      mariadb:
+        # MariaDB container
+        mariadb:
+          mountPath: /var/lib/mysql
+        # MariaDB - Permissions container
+        permissions:
+          mountPath: /mnt/directories/mariadb_data
+  mariadbbackup:
+    enabled: true
+    type: {{ .Values.passboltStorage.mariadbBackup.type }}
+    datasetName: {{ .Values.passboltStorage.mariadbBackup.datasetName | default "" }}
+    hostPath: {{ .Values.passboltStorage.mariadbBackup.hostPath | default "" }}
+    targetSelector:
+      # MariaDB backup pod
+      mariadbbackup:
+        # MariaDB backup container
+        mariadbbackup:
+          mountPath: /mariadb_backup
+        # MariaDB - Permissions container
+        permissions:
+          mountPath: /mnt/directories/mariadb_backup
+
+  {{- if .Values.passboltNetwork.certificateID }}
+  cert:
+    enabled: true
+    type: secret
+    objectName: passbolt-cert
+    defaultMode: "0600"
+    items:
+      - key: tls.key
+        path: certificate.key
+      - key: tls.crt
+        path: certificate.crt
+    targetSelector:
+      passbolt:
+        passbolt:
+          mountPath: /etc/passbolt/certs
+          readOnly: true
+
+scaleCertificate:
+  passbolt-cert:
+    enabled: true
+    id: {{ .Values.passboltNetwork.certificateID }}
+    {{- end -}}
+{{- end -}}

+ 29 - 0
community/passbolt/1.0.0/templates/_portal.tpl

@@ -0,0 +1,29 @@
+{{- define "passbolt.portal" -}}
+  {{- $url := urlParse .Values.passboltConfig.appUrl -}}
+
+  {{- $protocol := "http" -}}
+  {{- if $url.scheme -}}
+    {{- $protocol = $url.scheme -}}
+  {{- end -}}
+
+  {{- $host := "$node_ip" -}}
+  {{- $port := ternary "443" "80" (eq $protocol "https") -}}
+  {{- if $url.host -}}
+    {{- if contains ":" $url.host -}}
+      {{- $port = (split ":" $url.host)._1 -}}
+      {{- $host = (split ":" $url.host)._0 -}}
+    {{- else -}}
+      {{- $host = $url.host -}}
+    {{- end -}}
+  {{- end }}
+---
+apiVersion: v1
+kind: ConfigMap
+metadata:
+  name: portal
+data:
+  path: /
+  port: {{ $port | quote }}
+  protocol: {{ $protocol | quote }}
+  host: {{ $host | quote }}
+{{- end -}}

+ 31 - 0
community/passbolt/1.0.0/templates/_service.tpl

@@ -0,0 +1,31 @@
+{{- define "passbolt.service" -}}
+{{- $port := 8080 -}}
+{{- if .Values.passboltNetwork.certificateID -}}
+  {{- $port = 4433 -}}
+{{- end }}
+service:
+  passbolt:
+    enabled: true
+    primary: true
+    type: NodePort
+    targetSelector: passbolt
+    ports:
+      webui:
+        enabled: true
+        primary: true
+        port: {{ .Values.passboltNetwork.webPort }}
+        nodePort: {{ .Values.passboltNetwork.webPort }}
+        targetPort: {{ $port }}
+        targetSelector: passbolt
+  mariadb:
+    enabled: true
+    type: ClusterIP
+    targetSelector: mariadb
+    ports:
+      mariadb:
+        enabled: true
+        primary: true
+        port: 3306
+        targetPort: 3306
+        targetSelector: mariadb
+{{- end -}}

+ 13 - 0
community/passbolt/1.0.0/templates/common.yaml

@@ -0,0 +1,13 @@
+{{- include "ix.v1.common.loader.init" . -}}
+
+{{/* Merge the templates with Values */}}
+{{- $_ := mustMergeOverwrite .Values (include "passbolt.configuration" $ | fromYaml) -}}
+{{- $_ := mustMergeOverwrite .Values (include "passbolt.persistence" $ | fromYaml) -}}
+{{- $_ := mustMergeOverwrite .Values (include "passbolt.service" $ | fromYaml) -}}
+{{- $_ := mustMergeOverwrite .Values (include "passbolt.workload" $ | fromYaml) -}}
+{{- $_ := mustMergeOverwrite .Values (include "passbolt.mariadb.workload" $ | fromYaml) -}}
+
+{{/* Create the configmap for portal manually*/}}
+{{- include "passbolt.portal" $ -}}
+
+{{- include "ix.v1.common.loader.apply" . -}}

+ 11 - 0
community/passbolt/item.yaml

@@ -0,0 +1,11 @@
+icon_url: https://media.sys.truenas.net/apps/passbolt/icon/icon.svg
+categories:
+  - security
+screenshots:
+  - https://media.sys.truenas.net/apps/passbolt/screenshots/screenshot1.png
+  - https://media.sys.truenas.net/apps/passbolt/screenshots/screenshot2.png
+  - https://media.sys.truenas.net/apps/passbolt/screenshots/screenshot3.png
+  - https://media.sys.truenas.net/apps/passbolt/screenshots/screenshot4.png
+tags:
+  - password
+  - manager