app_versions.json 71 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209
  1. {
  2. "1.2.7": {
  3. "healthy": true,
  4. "supported": true,
  5. "healthy_error": null,
  6. "location": "/__w/apps/apps/trains/community/netbootxyz/1.2.7",
  7. "last_update": "2025-09-02 11:33:24",
  8. "required_features": [],
  9. "human_version": "0.7.6-nbxyz4_1.2.7",
  10. "version": "1.2.7",
  11. "app_metadata": {
  12. "annotations": {
  13. "min_scale_version": "24.10.2.2"
  14. },
  15. "app_version": "0.7.6-nbxyz4",
  16. "capabilities": [
  17. {
  18. "description": "Netboot is able to change file ownership arbitrarily",
  19. "name": "CHOWN"
  20. },
  21. {
  22. "description": "Netboot is able to bypass file permission checks",
  23. "name": "DAC_OVERRIDE"
  24. },
  25. {
  26. "description": "Netboot is able to bypass permission checks for file operations",
  27. "name": "FOWNER"
  28. },
  29. {
  30. "description": "Netboot is able to send signals to any process",
  31. "name": "KILL"
  32. },
  33. {
  34. "description": "Netboot is able to bind to privileged ports (< 1024)",
  35. "name": "NET_BIND_SERVICE"
  36. },
  37. {
  38. "description": "Netboot is able to change group ID of processes",
  39. "name": "SETGID"
  40. },
  41. {
  42. "description": "Netboot is able to change user ID of processes",
  43. "name": "SETUID"
  44. },
  45. {
  46. "description": "Netboot is able to use chroot() system call",
  47. "name": "SYS_CHROOT"
  48. }
  49. ],
  50. "categories": [
  51. "networking"
  52. ],
  53. "changelog_url": "https://github.com/netbootxyz/docker-netbootxyz/tags",
  54. "date_added": "2024-08-02",
  55. "description": "netboot.xyz lets you PXE boot various operating system installers or utilities from a single tool over the network.",
  56. "home": "https://netboot.xyz",
  57. "host_mounts": [],
  58. "icon": "https://media.sys.truenas.net/apps/netbootxyz/icons/icon.png",
  59. "keywords": [
  60. "tftp",
  61. "network",
  62. "pxe",
  63. "netboot",
  64. "netbootxyz",
  65. "netboot.xyz"
  66. ],
  67. "lib_version": "2.1.49",
  68. "lib_version_hash": "e71e6b0122c9446fa5ea6fb07e7eb01b11fb42d549a19845426bbd7e21a42634",
  69. "maintainers": [
  70. {
  71. "email": "dev@ixsystems.com",
  72. "name": "truenas",
  73. "url": "https://www.truenas.com/"
  74. }
  75. ],
  76. "name": "netbootxyz",
  77. "run_as_context": [
  78. {
  79. "description": "Netboot.xyz runs as root user.",
  80. "gid": 0,
  81. "group_name": "root",
  82. "uid": 0,
  83. "user_name": "root"
  84. }
  85. ],
  86. "screenshots": [
  87. "https://media.sys.truenas.net/apps/netbootxyz/screenshots/screenshot1.jpg"
  88. ],
  89. "sources": [
  90. "https://github.com/netbootxyz/docker-netbootxyz",
  91. "https://netboot.xyz"
  92. ],
  93. "title": "Netboot.xyz",
  94. "train": "community",
  95. "version": "1.2.7"
  96. },
  97. "schema": {
  98. "groups": [
  99. {
  100. "name": "Netboot.xyz Configuration",
  101. "description": "Configure Netboot.xyz"
  102. },
  103. {
  104. "name": "User and Group Configuration",
  105. "description": "Configure User and Group for Netboot.xyz"
  106. },
  107. {
  108. "name": "Network Configuration",
  109. "description": "Configure Network for Netboot.xyz"
  110. },
  111. {
  112. "name": "Storage Configuration",
  113. "description": "Configure Storage for Netboot.xyz"
  114. },
  115. {
  116. "name": "Labels Configuration",
  117. "description": "Configure Labels for Netboot.xyz"
  118. },
  119. {
  120. "name": "Resources Configuration",
  121. "description": "Configure Resources for Netboot.xyz"
  122. }
  123. ],
  124. "questions": [
  125. {
  126. "variable": "TZ",
  127. "group": "Netboot.xyz Configuration",
  128. "label": "Timezone",
  129. "schema": {
  130. "type": "string",
  131. "default": "Etc/UTC",
  132. "required": true,
  133. "$ref": [
  134. "definitions/timezone"
  135. ]
  136. }
  137. },
  138. {
  139. "variable": "netbootxyz",
  140. "label": "",
  141. "group": "Netboot.xyz Configuration",
  142. "schema": {
  143. "type": "dict",
  144. "attrs": [
  145. {
  146. "variable": "tftpd_opts",
  147. "label": "TFTPD Options",
  148. "description": "Additional options for the TFTPD service.",
  149. "schema": {
  150. "type": "list",
  151. "default": [],
  152. "items": [
  153. {
  154. "variable": "opt",
  155. "label": "Option",
  156. "schema": {
  157. "type": "string",
  158. "required": true
  159. }
  160. }
  161. ]
  162. }
  163. },
  164. {
  165. "variable": "additional_envs",
  166. "label": "Additional Environment Variables",
  167. "schema": {
  168. "type": "list",
  169. "default": [],
  170. "items": [
  171. {
  172. "variable": "env",
  173. "label": "Environment Variable",
  174. "schema": {
  175. "type": "dict",
  176. "attrs": [
  177. {
  178. "variable": "name",
  179. "label": "Name",
  180. "schema": {
  181. "type": "string",
  182. "required": true
  183. }
  184. },
  185. {
  186. "variable": "value",
  187. "label": "Value",
  188. "schema": {
  189. "type": "string"
  190. }
  191. }
  192. ]
  193. }
  194. }
  195. ]
  196. }
  197. }
  198. ]
  199. }
  200. },
  201. {
  202. "variable": "run_as",
  203. "label": "",
  204. "group": "User and Group Configuration",
  205. "schema": {
  206. "type": "dict",
  207. "attrs": [
  208. {
  209. "variable": "user",
  210. "label": "User ID",
  211. "description": "The user id that Netboot.xyz files will be owned by.",
  212. "schema": {
  213. "type": "int",
  214. "min": 568,
  215. "default": 568,
  216. "required": true
  217. }
  218. },
  219. {
  220. "variable": "group",
  221. "label": "Group ID",
  222. "description": "The group id that Netboot.xyz files will be owned by.",
  223. "schema": {
  224. "type": "int",
  225. "min": 568,
  226. "default": 568,
  227. "required": true
  228. }
  229. }
  230. ]
  231. }
  232. },
  233. {
  234. "variable": "network",
  235. "label": "",
  236. "group": "Network Configuration",
  237. "schema": {
  238. "type": "dict",
  239. "attrs": [
  240. {
  241. "variable": "tftp_port",
  242. "label": "TFTP Port",
  243. "description": "The TFTP port for netboot.xyz.",
  244. "schema": {
  245. "type": "dict",
  246. "show_if": [
  247. [
  248. "host_network",
  249. "=",
  250. false
  251. ]
  252. ],
  253. "attrs": [
  254. {
  255. "variable": "bind_mode",
  256. "label": "Port Bind Mode",
  257. "description": "The port bind mode.</br>\n- Publish: The port will be published on the host for external access.</br>\n- Expose: The port will be exposed for inter-container communication.</br>\n- None: The port will not be exposed or published.</br>\nNote: If the Dockerfile defines an EXPOSE directive,\nthe port will still be exposed for inter-container communication regardless of this setting.\n",
  258. "schema": {
  259. "type": "string",
  260. "default": "published",
  261. "enum": [
  262. {
  263. "value": "published",
  264. "description": "Publish port on the host for external access"
  265. },
  266. {
  267. "value": "exposed",
  268. "description": "Expose port for inter-container communication"
  269. },
  270. {
  271. "value": "",
  272. "description": "None"
  273. }
  274. ]
  275. }
  276. },
  277. {
  278. "variable": "port_number",
  279. "label": "Port Number",
  280. "schema": {
  281. "type": "int",
  282. "show_if": [
  283. [
  284. "bind_mode",
  285. "=",
  286. "published"
  287. ]
  288. ],
  289. "default": 31009,
  290. "min": 1,
  291. "max": 65535,
  292. "required": true
  293. }
  294. },
  295. {
  296. "variable": "host_ips",
  297. "label": "Host IPs",
  298. "description": "IPs on the host to bind this port",
  299. "schema": {
  300. "type": "list",
  301. "show_if": [
  302. [
  303. "bind_mode",
  304. "=",
  305. "published"
  306. ]
  307. ],
  308. "default": [],
  309. "items": [
  310. {
  311. "variable": "host_ip",
  312. "label": "Host IP",
  313. "schema": {
  314. "type": "string",
  315. "required": true,
  316. "$ref": [
  317. "definitions/node_bind_ip"
  318. ]
  319. }
  320. }
  321. ]
  322. }
  323. }
  324. ]
  325. }
  326. },
  327. {
  328. "variable": "web_http_port",
  329. "label": "Web HTTP Port",
  330. "description": "The HTTP port for the netboot.xyz Portal.",
  331. "schema": {
  332. "type": "dict",
  333. "attrs": [
  334. {
  335. "variable": "bind_mode",
  336. "label": "Port Bind Mode",
  337. "description": "The port bind mode.</br>\n- Publish: The port will be published on the host for external access.</br>\n- Expose: The port will be exposed for inter-container communication.</br>\n- None: The port will not be exposed or published.</br>\nNote: If the Dockerfile defines an EXPOSE directive,\nthe port will still be exposed for inter-container communication regardless of this setting.\n",
  338. "schema": {
  339. "type": "string",
  340. "default": "published",
  341. "enum": [
  342. {
  343. "value": "published",
  344. "description": "Publish port on the host for external access"
  345. },
  346. {
  347. "value": "exposed",
  348. "description": "Expose port for inter-container communication"
  349. },
  350. {
  351. "value": "",
  352. "description": "None"
  353. }
  354. ]
  355. }
  356. },
  357. {
  358. "variable": "port_number",
  359. "label": "Port Number",
  360. "schema": {
  361. "type": "int",
  362. "default": 31010,
  363. "min": 1,
  364. "max": 65535,
  365. "required": true
  366. }
  367. },
  368. {
  369. "variable": "host_ips",
  370. "label": "Host IPs",
  371. "description": "IPs on the host to bind this port",
  372. "schema": {
  373. "type": "list",
  374. "show_if": [
  375. [
  376. "bind_mode",
  377. "=",
  378. "published"
  379. ]
  380. ],
  381. "default": [],
  382. "items": [
  383. {
  384. "variable": "host_ip",
  385. "label": "Host IP",
  386. "schema": {
  387. "type": "string",
  388. "required": true,
  389. "$ref": [
  390. "definitions/node_bind_ip"
  391. ]
  392. }
  393. }
  394. ]
  395. }
  396. }
  397. ]
  398. }
  399. },
  400. {
  401. "variable": "web_assets_port",
  402. "label": "Web Assets Port",
  403. "description": "The Assets port for the netboot.xyz, configures the NGINX_PORT variable on the container.",
  404. "schema": {
  405. "type": "dict",
  406. "attrs": [
  407. {
  408. "variable": "bind_mode",
  409. "label": "Port Bind Mode",
  410. "description": "The port bind mode.</br>\n- Publish: The port will be published on the host for external access.</br>\n- Expose: The port will be exposed for inter-container communication.</br>\n- None: The port will not be exposed or published.</br>\nNote: If the Dockerfile defines an EXPOSE directive,\nthe port will still be exposed for inter-container communication regardless of this setting.\n",
  411. "schema": {
  412. "type": "string",
  413. "default": "published",
  414. "enum": [
  415. {
  416. "value": "published",
  417. "description": "Publish port on the host for external access"
  418. },
  419. {
  420. "value": "exposed",
  421. "description": "Expose port for inter-container communication"
  422. },
  423. {
  424. "value": "",
  425. "description": "None"
  426. }
  427. ]
  428. }
  429. },
  430. {
  431. "variable": "port_number",
  432. "label": "Port Number",
  433. "schema": {
  434. "type": "int",
  435. "default": 31011,
  436. "min": 1,
  437. "max": 65535,
  438. "required": true
  439. }
  440. },
  441. {
  442. "variable": "host_ips",
  443. "label": "Host IPs",
  444. "description": "IPs on the host to bind this port",
  445. "schema": {
  446. "type": "list",
  447. "show_if": [
  448. [
  449. "bind_mode",
  450. "=",
  451. "published"
  452. ]
  453. ],
  454. "default": [],
  455. "items": [
  456. {
  457. "variable": "host_ip",
  458. "label": "Host IP",
  459. "schema": {
  460. "type": "string",
  461. "required": true,
  462. "$ref": [
  463. "definitions/node_bind_ip"
  464. ]
  465. }
  466. }
  467. ]
  468. }
  469. }
  470. ]
  471. }
  472. },
  473. {
  474. "variable": "host_network",
  475. "label": "Host Network",
  476. "description": "Bind to the host network. It's recommended to keep this disabled.\n",
  477. "schema": {
  478. "type": "boolean",
  479. "default": true
  480. }
  481. }
  482. ]
  483. }
  484. },
  485. {
  486. "variable": "storage",
  487. "label": "",
  488. "group": "Storage Configuration",
  489. "schema": {
  490. "type": "dict",
  491. "attrs": [
  492. {
  493. "variable": "config",
  494. "label": "Netboot.xyz Config Storage",
  495. "description": "The path to store Netboot.xyz Config.",
  496. "schema": {
  497. "type": "dict",
  498. "attrs": [
  499. {
  500. "variable": "type",
  501. "label": "Type",
  502. "description": "ixVolume: Is dataset created automatically by the system.</br>\nHost Path: Is a path that already exists on the system.\n",
  503. "schema": {
  504. "type": "string",
  505. "required": true,
  506. "default": "ix_volume",
  507. "enum": [
  508. {
  509. "value": "host_path",
  510. "description": "Host Path (Path that already exists on the system)"
  511. },
  512. {
  513. "value": "ix_volume",
  514. "description": "ixVolume (Dataset created automatically by the system)"
  515. }
  516. ]
  517. }
  518. },
  519. {
  520. "variable": "ix_volume_config",
  521. "label": "ixVolume Configuration",
  522. "description": "The configuration for the ixVolume dataset.",
  523. "schema": {
  524. "type": "dict",
  525. "show_if": [
  526. [
  527. "type",
  528. "=",
  529. "ix_volume"
  530. ]
  531. ],
  532. "$ref": [
  533. "normalize/ix_volume"
  534. ],
  535. "attrs": [
  536. {
  537. "variable": "acl_enable",
  538. "label": "Enable ACL",
  539. "description": "Enable ACL for the storage.",
  540. "schema": {
  541. "type": "boolean",
  542. "default": false
  543. }
  544. },
  545. {
  546. "variable": "dataset_name",
  547. "label": "Dataset Name",
  548. "description": "The name of the dataset to use for storage.",
  549. "schema": {
  550. "type": "string",
  551. "required": true,
  552. "hidden": true,
  553. "default": "config"
  554. }
  555. },
  556. {
  557. "variable": "acl_entries",
  558. "label": "ACL Configuration",
  559. "schema": {
  560. "type": "dict",
  561. "show_if": [
  562. [
  563. "acl_enable",
  564. "=",
  565. true
  566. ]
  567. ],
  568. "attrs": []
  569. }
  570. }
  571. ]
  572. }
  573. },
  574. {
  575. "variable": "host_path_config",
  576. "label": "Host Path Configuration",
  577. "schema": {
  578. "type": "dict",
  579. "show_if": [
  580. [
  581. "type",
  582. "=",
  583. "host_path"
  584. ]
  585. ],
  586. "attrs": [
  587. {
  588. "variable": "acl_enable",
  589. "label": "Enable ACL",
  590. "description": "Enable ACL for the storage.",
  591. "schema": {
  592. "type": "boolean",
  593. "default": false
  594. }
  595. },
  596. {
  597. "variable": "acl",
  598. "label": "ACL Configuration",
  599. "schema": {
  600. "type": "dict",
  601. "show_if": [
  602. [
  603. "acl_enable",
  604. "=",
  605. true
  606. ]
  607. ],
  608. "attrs": [],
  609. "$ref": [
  610. "normalize/acl"
  611. ]
  612. }
  613. },
  614. {
  615. "variable": "path",
  616. "label": "Host Path",
  617. "description": "The host path to use for storage.",
  618. "schema": {
  619. "type": "hostpath",
  620. "show_if": [
  621. [
  622. "acl_enable",
  623. "=",
  624. false
  625. ]
  626. ],
  627. "required": true
  628. }
  629. }
  630. ]
  631. }
  632. }
  633. ]
  634. }
  635. },
  636. {
  637. "variable": "assets",
  638. "label": "Netboot.xyz Assets Storage",
  639. "description": "The path to store Netboot.xyz Assets.",
  640. "schema": {
  641. "type": "dict",
  642. "attrs": [
  643. {
  644. "variable": "type",
  645. "label": "Type",
  646. "description": "ixVolume: Is dataset created automatically by the system.</br>\nHost Path: Is a path that already exists on the system.\n",
  647. "schema": {
  648. "type": "string",
  649. "required": true,
  650. "default": "ix_volume",
  651. "enum": [
  652. {
  653. "value": "host_path",
  654. "description": "Host Path (Path that already exists on the system)"
  655. },
  656. {
  657. "value": "ix_volume",
  658. "description": "ixVolume (Dataset created automatically by the system)"
  659. }
  660. ]
  661. }
  662. },
  663. {
  664. "variable": "ix_volume_config",
  665. "label": "ixVolume Configuration",
  666. "description": "The configuration for the ixVolume dataset.",
  667. "schema": {
  668. "type": "dict",
  669. "show_if": [
  670. [
  671. "type",
  672. "=",
  673. "ix_volume"
  674. ]
  675. ],
  676. "$ref": [
  677. "normalize/ix_volume"
  678. ],
  679. "attrs": [
  680. {
  681. "variable": "acl_enable",
  682. "label": "Enable ACL",
  683. "description": "Enable ACL for the storage.",
  684. "schema": {
  685. "type": "boolean",
  686. "default": false
  687. }
  688. },
  689. {
  690. "variable": "dataset_name",
  691. "label": "Dataset Name",
  692. "description": "The name of the dataset to use for storage.",
  693. "schema": {
  694. "type": "string",
  695. "required": true,
  696. "hidden": true,
  697. "default": "assets"
  698. }
  699. },
  700. {
  701. "variable": "acl_entries",
  702. "label": "ACL Configuration",
  703. "schema": {
  704. "type": "dict",
  705. "show_if": [
  706. [
  707. "acl_enable",
  708. "=",
  709. true
  710. ]
  711. ],
  712. "attrs": []
  713. }
  714. }
  715. ]
  716. }
  717. },
  718. {
  719. "variable": "host_path_config",
  720. "label": "Host Path Configuration",
  721. "schema": {
  722. "type": "dict",
  723. "show_if": [
  724. [
  725. "type",
  726. "=",
  727. "host_path"
  728. ]
  729. ],
  730. "attrs": [
  731. {
  732. "variable": "acl_enable",
  733. "label": "Enable ACL",
  734. "description": "Enable ACL for the storage.",
  735. "schema": {
  736. "type": "boolean",
  737. "default": false
  738. }
  739. },
  740. {
  741. "variable": "acl",
  742. "label": "ACL Configuration",
  743. "schema": {
  744. "type": "dict",
  745. "show_if": [
  746. [
  747. "acl_enable",
  748. "=",
  749. true
  750. ]
  751. ],
  752. "attrs": [],
  753. "$ref": [
  754. "normalize/acl"
  755. ]
  756. }
  757. },
  758. {
  759. "variable": "path",
  760. "label": "Host Path",
  761. "description": "The host path to use for storage.",
  762. "schema": {
  763. "type": "hostpath",
  764. "show_if": [
  765. [
  766. "acl_enable",
  767. "=",
  768. false
  769. ]
  770. ],
  771. "required": true
  772. }
  773. }
  774. ]
  775. }
  776. }
  777. ]
  778. }
  779. },
  780. {
  781. "variable": "additional_storage",
  782. "label": "Additional Storage",
  783. "schema": {
  784. "type": "list",
  785. "default": [],
  786. "items": [
  787. {
  788. "variable": "storageEntry",
  789. "label": "Storage Entry",
  790. "schema": {
  791. "type": "dict",
  792. "attrs": [
  793. {
  794. "variable": "type",
  795. "label": "Type",
  796. "description": "ixVolume: Is dataset created automatically by the system.</br>\nHost Path: Is a path that already exists on the system.</br>\nSMB Share: Is a SMB share that is mounted to as a volume.\n",
  797. "schema": {
  798. "type": "string",
  799. "required": true,
  800. "default": "ix_volume",
  801. "enum": [
  802. {
  803. "value": "host_path",
  804. "description": "Host Path (Path that already exists on the system)"
  805. },
  806. {
  807. "value": "ix_volume",
  808. "description": "ixVolume (Dataset created automatically by the system)"
  809. },
  810. {
  811. "value": "cifs",
  812. "description": "SMB/CIFS Share (Mounts a volume to a SMB share)"
  813. }
  814. ]
  815. }
  816. },
  817. {
  818. "variable": "read_only",
  819. "label": "Read Only",
  820. "description": "Mount the volume as read only.",
  821. "schema": {
  822. "type": "boolean",
  823. "default": false
  824. }
  825. },
  826. {
  827. "variable": "mount_path",
  828. "label": "Mount Path",
  829. "description": "The path inside the container to mount the storage.",
  830. "schema": {
  831. "type": "path",
  832. "required": true
  833. }
  834. },
  835. {
  836. "variable": "host_path_config",
  837. "label": "Host Path Configuration",
  838. "schema": {
  839. "type": "dict",
  840. "show_if": [
  841. [
  842. "type",
  843. "=",
  844. "host_path"
  845. ]
  846. ],
  847. "attrs": [
  848. {
  849. "variable": "acl_enable",
  850. "label": "Enable ACL",
  851. "description": "Enable ACL for the storage.",
  852. "schema": {
  853. "type": "boolean",
  854. "default": false
  855. }
  856. },
  857. {
  858. "variable": "acl",
  859. "label": "ACL Configuration",
  860. "schema": {
  861. "type": "dict",
  862. "show_if": [
  863. [
  864. "acl_enable",
  865. "=",
  866. true
  867. ]
  868. ],
  869. "attrs": [],
  870. "$ref": [
  871. "normalize/acl"
  872. ]
  873. }
  874. },
  875. {
  876. "variable": "path",
  877. "label": "Host Path",
  878. "description": "The host path to use for storage.",
  879. "schema": {
  880. "type": "hostpath",
  881. "show_if": [
  882. [
  883. "acl_enable",
  884. "=",
  885. false
  886. ]
  887. ],
  888. "required": true
  889. }
  890. }
  891. ]
  892. }
  893. },
  894. {
  895. "variable": "ix_volume_config",
  896. "label": "ixVolume Configuration",
  897. "description": "The configuration for the ixVolume dataset.",
  898. "schema": {
  899. "type": "dict",
  900. "show_if": [
  901. [
  902. "type",
  903. "=",
  904. "ix_volume"
  905. ]
  906. ],
  907. "$ref": [
  908. "normalize/ix_volume"
  909. ],
  910. "attrs": [
  911. {
  912. "variable": "acl_enable",
  913. "label": "Enable ACL",
  914. "description": "Enable ACL for the storage.",
  915. "schema": {
  916. "type": "boolean",
  917. "default": false
  918. }
  919. },
  920. {
  921. "variable": "dataset_name",
  922. "label": "Dataset Name",
  923. "description": "The name of the dataset to use for storage.",
  924. "schema": {
  925. "type": "string",
  926. "required": true,
  927. "default": "storage_entry"
  928. }
  929. },
  930. {
  931. "variable": "acl_entries",
  932. "label": "ACL Configuration",
  933. "schema": {
  934. "type": "dict",
  935. "show_if": [
  936. [
  937. "acl_enable",
  938. "=",
  939. true
  940. ]
  941. ],
  942. "attrs": []
  943. }
  944. }
  945. ]
  946. }
  947. },
  948. {
  949. "variable": "cifs_config",
  950. "label": "SMB Configuration",
  951. "description": "The configuration for the SMB dataset.",
  952. "schema": {
  953. "type": "dict",
  954. "show_if": [
  955. [
  956. "type",
  957. "=",
  958. "cifs"
  959. ]
  960. ],
  961. "attrs": [
  962. {
  963. "variable": "server",
  964. "label": "Server",
  965. "description": "The server to mount the SMB share.",
  966. "schema": {
  967. "type": "string",
  968. "required": true
  969. }
  970. },
  971. {
  972. "variable": "path",
  973. "label": "Path",
  974. "description": "The path to mount the SMB share.",
  975. "schema": {
  976. "type": "string",
  977. "required": true
  978. }
  979. },
  980. {
  981. "variable": "username",
  982. "label": "Username",
  983. "description": "The username to use for the SMB share.",
  984. "schema": {
  985. "type": "string",
  986. "required": true
  987. }
  988. },
  989. {
  990. "variable": "password",
  991. "label": "Password",
  992. "description": "The password to use for the SMB share.",
  993. "schema": {
  994. "type": "string",
  995. "required": true,
  996. "private": true
  997. }
  998. },
  999. {
  1000. "variable": "domain",
  1001. "label": "Domain",
  1002. "description": "The domain to use for the SMB share.",
  1003. "schema": {
  1004. "type": "string"
  1005. }
  1006. }
  1007. ]
  1008. }
  1009. }
  1010. ]
  1011. }
  1012. }
  1013. ]
  1014. }
  1015. }
  1016. ]
  1017. }
  1018. },
  1019. {
  1020. "variable": "labels",
  1021. "label": "",
  1022. "group": "Labels Configuration",
  1023. "schema": {
  1024. "type": "list",
  1025. "default": [],
  1026. "items": [
  1027. {
  1028. "variable": "label",
  1029. "label": "Label",
  1030. "schema": {
  1031. "type": "dict",
  1032. "attrs": [
  1033. {
  1034. "variable": "key",
  1035. "label": "Key",
  1036. "schema": {
  1037. "type": "string",
  1038. "required": true
  1039. }
  1040. },
  1041. {
  1042. "variable": "value",
  1043. "label": "Value",
  1044. "schema": {
  1045. "type": "string",
  1046. "required": true
  1047. }
  1048. },
  1049. {
  1050. "variable": "containers",
  1051. "label": "Containers",
  1052. "description": "Containers where the label should be applied",
  1053. "schema": {
  1054. "type": "list",
  1055. "items": [
  1056. {
  1057. "variable": "container",
  1058. "label": "Container",
  1059. "schema": {
  1060. "type": "string",
  1061. "required": true,
  1062. "enum": [
  1063. {
  1064. "value": "netboot",
  1065. "description": "netboot"
  1066. }
  1067. ]
  1068. }
  1069. }
  1070. ]
  1071. }
  1072. }
  1073. ]
  1074. }
  1075. }
  1076. ]
  1077. }
  1078. },
  1079. {
  1080. "variable": "resources",
  1081. "label": "",
  1082. "group": "Resources Configuration",
  1083. "schema": {
  1084. "type": "dict",
  1085. "attrs": [
  1086. {
  1087. "variable": "limits",
  1088. "label": "Limits",
  1089. "schema": {
  1090. "type": "dict",
  1091. "attrs": [
  1092. {
  1093. "variable": "cpus",
  1094. "label": "CPUs",
  1095. "description": "CPUs limit for Netboot.xyz.",
  1096. "schema": {
  1097. "type": "int",
  1098. "default": 2,
  1099. "required": true
  1100. }
  1101. },
  1102. {
  1103. "variable": "memory",
  1104. "label": "Memory (in MB)",
  1105. "description": "Memory limit for Netboot.xyz.",
  1106. "schema": {
  1107. "type": "int",
  1108. "default": 4096,
  1109. "required": true
  1110. }
  1111. }
  1112. ]
  1113. }
  1114. }
  1115. ]
  1116. }
  1117. }
  1118. ]
  1119. },
  1120. "readme": "<h1>Netboot.xyz</h1> <p><a href=\"https://netboot.xyz\">netboot.xyz</a> lets you PXE boot various operating system installers or utilities from a single tool over the network.</p>",
  1121. "changelog": null,
  1122. "chart_metadata": {
  1123. "annotations": {
  1124. "min_scale_version": "24.10.2.2"
  1125. },
  1126. "app_version": "0.7.6-nbxyz4",
  1127. "capabilities": [
  1128. {
  1129. "description": "Netboot is able to change file ownership arbitrarily",
  1130. "name": "CHOWN"
  1131. },
  1132. {
  1133. "description": "Netboot is able to bypass file permission checks",
  1134. "name": "DAC_OVERRIDE"
  1135. },
  1136. {
  1137. "description": "Netboot is able to bypass permission checks for file operations",
  1138. "name": "FOWNER"
  1139. },
  1140. {
  1141. "description": "Netboot is able to send signals to any process",
  1142. "name": "KILL"
  1143. },
  1144. {
  1145. "description": "Netboot is able to bind to privileged ports (< 1024)",
  1146. "name": "NET_BIND_SERVICE"
  1147. },
  1148. {
  1149. "description": "Netboot is able to change group ID of processes",
  1150. "name": "SETGID"
  1151. },
  1152. {
  1153. "description": "Netboot is able to change user ID of processes",
  1154. "name": "SETUID"
  1155. },
  1156. {
  1157. "description": "Netboot is able to use chroot() system call",
  1158. "name": "SYS_CHROOT"
  1159. }
  1160. ],
  1161. "categories": [
  1162. "networking"
  1163. ],
  1164. "changelog_url": "https://github.com/netbootxyz/docker-netbootxyz/tags",
  1165. "date_added": "2024-08-02",
  1166. "description": "netboot.xyz lets you PXE boot various operating system installers or utilities from a single tool over the network.",
  1167. "home": "https://netboot.xyz",
  1168. "host_mounts": [],
  1169. "icon": "https://media.sys.truenas.net/apps/netbootxyz/icons/icon.png",
  1170. "keywords": [
  1171. "tftp",
  1172. "network",
  1173. "pxe",
  1174. "netboot",
  1175. "netbootxyz",
  1176. "netboot.xyz"
  1177. ],
  1178. "lib_version": "2.1.49",
  1179. "lib_version_hash": "e71e6b0122c9446fa5ea6fb07e7eb01b11fb42d549a19845426bbd7e21a42634",
  1180. "maintainers": [
  1181. {
  1182. "email": "dev@ixsystems.com",
  1183. "name": "truenas",
  1184. "url": "https://www.truenas.com/"
  1185. }
  1186. ],
  1187. "name": "netbootxyz",
  1188. "run_as_context": [
  1189. {
  1190. "description": "Netboot.xyz runs as root user.",
  1191. "gid": 0,
  1192. "group_name": "root",
  1193. "uid": 0,
  1194. "user_name": "root"
  1195. }
  1196. ],
  1197. "screenshots": [
  1198. "https://media.sys.truenas.net/apps/netbootxyz/screenshots/screenshot1.jpg"
  1199. ],
  1200. "sources": [
  1201. "https://github.com/netbootxyz/docker-netbootxyz",
  1202. "https://netboot.xyz"
  1203. ],
  1204. "title": "Netboot.xyz",
  1205. "train": "community",
  1206. "version": "1.2.7"
  1207. }
  1208. }
  1209. }