mirror of
https://github.com/bitnami/charts.git
synced 2026-04-02 15:27:08 +08:00
[bitnami/several] Replace base64 --decode with base64 -d (#10495)
Signed-off-by: Carlos Rodriguez Hernandez <carlosrh@vmware.com>
This commit is contained in:
committed by
GitHub
parent
c08a2b76f0
commit
099286ae7a
@@ -35,4 +35,4 @@ sources:
|
||||
- https://github.com/bitnami/bitnami-docker-argo-workflow-controller
|
||||
- https://github.com/bitnami/bitnami-docker-argo-workflow-exec
|
||||
- https://argoproj.github.io/workflows/
|
||||
version: 2.2.2
|
||||
version: 2.2.3
|
||||
|
||||
@@ -41,7 +41,7 @@ Obtain the Argo Workflows UI URL:
|
||||
Obtain the Argo Workflows access token:
|
||||
|
||||
SECRET=$(kubectl get sa {{ include "argo-workflows.server.serviceAccountName" . }} -o=jsonpath='{.secrets[0].name}')
|
||||
ARGO_TOKEN="Bearer $(kubectl get secret $SECRET -o=jsonpath='{.data.token}' | base64 --decode)"
|
||||
ARGO_TOKEN="Bearer $(kubectl get secret $SECRET -o=jsonpath='{.data.token}' | base64 -d)"
|
||||
echo "$ARGO_TOKEN"
|
||||
|
||||
{{- end }}
|
||||
|
||||
@@ -30,4 +30,4 @@ name: concourse
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-concourse
|
||||
- https://github.com/concourse/concourse
|
||||
version: 1.3.0
|
||||
version: 1.3.1
|
||||
|
||||
@@ -104,7 +104,7 @@ Get your Concourse login credentials by running:
|
||||
|
||||
echo "Username : Password
|
||||
-------------------
|
||||
$(kubectl get secret --namespace {{ $releaseNamespace }} {{ $concourseWebSecretName }} -o jsonpath="{.data.local_users}" | base64 --decode)"
|
||||
$(kubectl get secret --namespace {{ $releaseNamespace }} {{ $concourseWebSecretName }} -o jsonpath="{.data.local_users}" | base64 -d)"
|
||||
|
||||
Concourse can be accessed via port {{ .Values.web.containerPorts.http }}: on the following DNS name from within your cluster:
|
||||
|
||||
|
||||
@@ -24,4 +24,4 @@ name: dokuwiki
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-dokuwiki
|
||||
- http://www.dokuwiki.org/
|
||||
version: 12.5.0
|
||||
version: 12.5.1
|
||||
|
||||
@@ -44,7 +44,7 @@ APP VERSION: {{ .Chart.AppVersion }}
|
||||
2. Login with the following credentials
|
||||
|
||||
echo Username: {{ .Values.dokuwikiUsername }}
|
||||
echo Password: $(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ include "dokuwiki.secretName" . }} -o jsonpath="{.data.dokuwiki-password}" | base64 --decode)
|
||||
echo Password: $(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ include "dokuwiki.secretName" . }} -o jsonpath="{.data.dokuwiki-password}" | base64 -d)
|
||||
|
||||
{{- include "dokuwiki.checkRollingTags" . }}
|
||||
|
||||
|
||||
@@ -31,4 +31,4 @@ name: drupal
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-drupal
|
||||
- https://www.drupal.org/
|
||||
version: 12.2.4
|
||||
version: 12.2.5
|
||||
|
||||
@@ -7,7 +7,7 @@ Drupal is one of the most versatile open source content management systems in th
|
||||
[Overview of Drupal](http://drupal.org)
|
||||
|
||||
Trademarks: This software listing is packaged by Bitnami. The respective trademarks mentioned in the offering are owned by the respective companies, and use of them does not imply any affiliation or endorsement.
|
||||
|
||||
|
||||
## TL;DR
|
||||
|
||||
```console
|
||||
@@ -440,9 +440,9 @@ To upgrade to `9.0.0`, you have two alternatives:
|
||||
Obtain the credentials and the name of the PVC used to hold the MariaDB data on your current release:
|
||||
|
||||
```console
|
||||
export DRUPAL_PASSWORD=$(kubectl get secret --namespace default drupal -o jsonpath="{.data.drupal-password}" | base64 --decode)
|
||||
export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default drupal-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 --decode)
|
||||
export MARIADB_PASSWORD=$(kubectl get secret --namespace default drupal-mariadb -o jsonpath="{.data.mariadb-password}" | base64 --decode)
|
||||
export DRUPAL_PASSWORD=$(kubectl get secret --namespace default drupal -o jsonpath="{.data.drupal-password}" | base64 -d)
|
||||
export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default drupal-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 -d)
|
||||
export MARIADB_PASSWORD=$(kubectl get secret --namespace default drupal-mariadb -o jsonpath="{.data.mariadb-password}" | base64 -d)
|
||||
export MARIADB_PVC=$(kubectl get pvc -l app=mariadb,component=master,release=drupal -o jsonpath="{.items[0].metadata.name}")
|
||||
```
|
||||
|
||||
@@ -521,4 +521,4 @@ Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
limitations under the License.
|
||||
|
||||
@@ -44,7 +44,7 @@ APP VERSION: {{ .Chart.AppVersion }}
|
||||
2. Get your Drupal login credentials by running:
|
||||
|
||||
echo Username: {{ .Values.drupalUsername }}
|
||||
echo Password: $(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ template "drupal.secretName" . }} -o jsonpath="{.data.drupal-password}" | base64 --decode)
|
||||
echo Password: $(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ template "drupal.secretName" . }} -o jsonpath="{.data.drupal-password}" | base64 -d)
|
||||
|
||||
{{- else -}}
|
||||
|
||||
@@ -57,7 +57,7 @@ host. To configure Drupal to use and external database host:
|
||||
|
||||
1. Complete your Drupal deployment by running:
|
||||
|
||||
export APP_PASSWORD=$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ template "drupal.secretName" . }} -o jsonpath="{.data.drupal-password}" | base64 --decode)
|
||||
export APP_PASSWORD=$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ template "drupal.secretName" . }} -o jsonpath="{.data.drupal-password}" | base64 -d)
|
||||
|
||||
## PLEASE UPDATE THE EXTERNAL DATABASE CONNECTION PARAMETERS IN THE FOLLOWING COMMAND AS NEEDED ##
|
||||
|
||||
|
||||
@@ -30,4 +30,4 @@ name: ejbca
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-ejbca
|
||||
- https://www.ejbca.org/
|
||||
version: 6.2.4
|
||||
version: 6.2.5
|
||||
|
||||
@@ -7,7 +7,7 @@ EJBCA is an enterprise class PKI Certificate Authority software, built using Jav
|
||||
[Overview of EJBCA](http://www.ejbca.org)
|
||||
|
||||
Trademarks: This software listing is packaged by Bitnami. The respective trademarks mentioned in the offering are owned by the respective companies, and use of them does not imply any affiliation or endorsement.
|
||||
|
||||
|
||||
## TL;DR
|
||||
|
||||
```console
|
||||
@@ -352,9 +352,9 @@ To upgrade to `1.0.0`, you have two alternatives:
|
||||
Obtain the credentials and the name of the PVC used to hold the MariaDB data on your current release:
|
||||
|
||||
```console
|
||||
export EJBCA_ADMIN_PASSWORD=$(kubectl get secret --namespace default ejbca -o jsonpath="{.data.ejbca-admin-password}" | base64 --decode)
|
||||
export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default ejbca-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 --decode)
|
||||
export MARIADB_PASSWORD=$(kubectl get secret --namespace default ejbca-mariadb -o jsonpath="{.data.mariadb-password}" | base64 --decode)
|
||||
export EJBCA_ADMIN_PASSWORD=$(kubectl get secret --namespace default ejbca -o jsonpath="{.data.ejbca-admin-password}" | base64 -d)
|
||||
export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default ejbca-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 -d)
|
||||
export MARIADB_PASSWORD=$(kubectl get secret --namespace default ejbca-mariadb -o jsonpath="{.data.mariadb-password}" | base64 -d)
|
||||
export MARIADB_PVC=$(kubectl get pvc -l app=mariadb,component=master,release=ejbca -o jsonpath="{.items[0].metadata.name}")
|
||||
```
|
||||
|
||||
@@ -394,4 +394,4 @@ Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
limitations under the License.
|
||||
|
||||
@@ -24,4 +24,4 @@ name: etcd
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-etcd
|
||||
- https://coreos.com/etcd/
|
||||
version: 8.2.2
|
||||
version: 8.2.3
|
||||
|
||||
@@ -45,7 +45,7 @@ etcd can be accessed via port {{ coalesce .Values.service.ports.client .Values.s
|
||||
|
||||
To create a pod that you can use as a etcd client run the following command:
|
||||
|
||||
kubectl run {{ template "common.names.fullname" . }}-client --restart='Never' --image {{ template "etcd.image" . }}{{- if or .Values.auth.rbac.create .Values.auth.rbac.enabled }} --env ROOT_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "common.names.fullname" . }} -o jsonpath="{.data.etcd-root-password}" | base64 --decode){{- end }} --env ETCDCTL_ENDPOINTS="{{ template "common.names.fullname" . }}.{{ .Release.Namespace }}.svc.{{ .Values.clusterDomain }}:{{ coalesce .Values.service.ports.client .Values.service.port }}" --namespace {{ .Release.Namespace }} --command -- sleep infinity
|
||||
kubectl run {{ template "common.names.fullname" . }}-client --restart='Never' --image {{ template "etcd.image" . }}{{- if or .Values.auth.rbac.create .Values.auth.rbac.enabled }} --env ROOT_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "common.names.fullname" . }} -o jsonpath="{.data.etcd-root-password}" | base64 -d){{- end }} --env ETCDCTL_ENDPOINTS="{{ template "common.names.fullname" . }}.{{ .Release.Namespace }}.svc.{{ .Values.clusterDomain }}:{{ coalesce .Values.service.ports.client .Values.service.port }}" --namespace {{ .Release.Namespace }} --command -- sleep infinity
|
||||
|
||||
Then, you can set/get a key using the commands below:
|
||||
|
||||
@@ -80,7 +80,7 @@ To connect to your etcd server from outside the cluster execute the following co
|
||||
|
||||
* As rbac is enabled you should add the flag `--user root:$ETCD_ROOT_PASSWORD` to the etcdctl commands. Use the command below to export the password:
|
||||
|
||||
export ETCD_ROOT_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "common.names.fullname" . }} -o jsonpath="{.data.etcd-root-password}" | base64 --decode)
|
||||
export ETCD_ROOT_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "common.names.fullname" . }} -o jsonpath="{.data.etcd-root-password}" | base64 -d)
|
||||
|
||||
{{- end }}
|
||||
{{- if .Values.auth.client.secureTransport }}
|
||||
|
||||
@@ -22,4 +22,4 @@ name: geode
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-geode
|
||||
- https://github.com/apache/geode
|
||||
version: 0.6.4
|
||||
version: 0.6.5
|
||||
|
||||
@@ -50,8 +50,8 @@ In order to replicate the container startup scripts execute this command:
|
||||
|
||||
To obtain the credentials to access Apache Geode locators, run:
|
||||
|
||||
export GEODE_SECURITY_USERNAME=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "geode.secretName" . }} -o jsonpath="{.data.username}" | base64 --decode)
|
||||
export GEODE_SECURITY_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "geode.secretName" . }} -o jsonpath="{.data.password}" | base64 --decode)
|
||||
export GEODE_SECURITY_USERNAME=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "geode.secretName" . }} -o jsonpath="{.data.username}" | base64 -d)
|
||||
export GEODE_SECURITY_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "geode.secretName" . }} -o jsonpath="{.data.password}" | base64 -d)
|
||||
|
||||
{{- end }}
|
||||
|
||||
|
||||
@@ -33,4 +33,4 @@ name: ghost
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-ghost
|
||||
- https://www.ghost.org/
|
||||
version: 17.2.1
|
||||
version: 17.2.2
|
||||
|
||||
@@ -7,7 +7,7 @@ Ghost is an open source publishing platform designed to create blogs, magazines,
|
||||
[Overview of Ghost](https://ghost.org/)
|
||||
|
||||
Trademarks: This software listing is packaged by Bitnami. The respective trademarks mentioned in the offering are owned by the respective companies, and use of them does not imply any affiliation or endorsement.
|
||||
|
||||
|
||||
## TL;DR
|
||||
|
||||
```console
|
||||
@@ -455,9 +455,9 @@ Obtain the credentials and the name of the PVC used to hold the MariaDB data on
|
||||
|
||||
```console
|
||||
$ export GHOST_HOST=$(kubectl get svc --namespace default ghost --template "{{ range (index .status.loadBalancer.ingress 0) }}{{ . }}{{ end }}")
|
||||
$ export GHOST_PASSWORD=$(kubectl get secret --namespace default ghost -o jsonpath="{.data.ghost-password}" | base64 --decode)
|
||||
$ export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default ghost-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 --decode)
|
||||
$ export MARIADB_PASSWORD=$(kubectl get secret --namespace default ghost-mariadb -o jsonpath="{.data.mariadb-password}" | base64 --decode)
|
||||
$ export GHOST_PASSWORD=$(kubectl get secret --namespace default ghost -o jsonpath="{.data.ghost-password}" | base64 -d)
|
||||
$ export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default ghost-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 -d)
|
||||
$ export MARIADB_PASSWORD=$(kubectl get secret --namespace default ghost-mariadb -o jsonpath="{.data.mariadb-password}" | base64 -d)
|
||||
$ export MARIADB_PVC=$(kubectl get pvc -l app=mariadb,component=master,release=ghost -o jsonpath="{.items[0].metadata.name}")
|
||||
```
|
||||
|
||||
@@ -544,4 +544,4 @@ Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
limitations under the License.
|
||||
|
||||
@@ -92,7 +92,7 @@ host. To configure Ghost with the URL of your service:
|
||||
2. Get your Ghost login credentials by running:
|
||||
|
||||
echo Email: {{ .Values.ghostEmail }}
|
||||
echo Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "common.names.fullname" . }} -o jsonpath="{.data.{{- $ghostPasswordKey -}}}" | base64 --decode)
|
||||
echo Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "common.names.fullname" . }} -o jsonpath="{.data.{{- $ghostPasswordKey -}}}" | base64 -d)
|
||||
|
||||
{{- end }}
|
||||
|
||||
|
||||
@@ -24,4 +24,4 @@ name: grafana
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-grafana
|
||||
- https://grafana.com/
|
||||
version: 7.9.0
|
||||
version: 7.9.1
|
||||
|
||||
@@ -25,7 +25,7 @@ APP VERSION: {{ .Chart.AppVersion }}
|
||||
2. Get the admin credentials:
|
||||
|
||||
echo "User: {{ .Values.admin.user }}"
|
||||
echo "Password: $(kubectl get secret {{ include "grafana.adminSecretName" . }} --namespace {{ .Release.Namespace }} -o jsonpath="{.data.{{ include "grafana.adminSecretPasswordKey" . }}}" | base64 --decode)"
|
||||
echo "Password: $(kubectl get secret {{ include "grafana.adminSecretName" . }} --namespace {{ .Release.Namespace }} -o jsonpath="{.data.{{ include "grafana.adminSecretPasswordKey" . }}}" | base64 -d)"
|
||||
|
||||
{{- include "common.warnings.rollingTag" .Values.image }}
|
||||
{{- include "common.warnings.rollingTag" .Values.imageRenderer.image }}
|
||||
|
||||
@@ -34,4 +34,4 @@ sources:
|
||||
- https://github.com/bitnami/bitnami-docker-harbor-registry
|
||||
- https://github.com/bitnami/bitnami-docker-harbor-registryctl
|
||||
- https://goharbor.io/
|
||||
version: 13.2.1
|
||||
version: 13.2.2
|
||||
|
||||
@@ -44,7 +44,7 @@ APP VERSION: {{ .Chart.AppVersion }}
|
||||
2. Login with the following credentials to see your Harbor application
|
||||
|
||||
echo Username: "admin"
|
||||
echo Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ printf "%s-envvars" (include "harbor.core" .) }} -o jsonpath="{.data.HARBOR_ADMIN_PASSWORD}" | base64 --decode)
|
||||
echo Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ printf "%s-envvars" (include "harbor.core" .) }} -o jsonpath="{.data.HARBOR_ADMIN_PASSWORD}" | base64 -d)
|
||||
|
||||
{{- if .Values.clair.enabled }}
|
||||
|
||||
|
||||
@@ -24,4 +24,4 @@ name: influxdb
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-influxdb
|
||||
- https://www.influxdata.com/products/influxdb-overview/
|
||||
version: 5.3.0
|
||||
version: 5.3.1
|
||||
|
||||
@@ -7,7 +7,7 @@ InfluxDB(TM) is an open source time-series database. It is a core component of t
|
||||
[Overview of InfluxDB™](https://www.influxdata.com/products/influxdb-overview)
|
||||
|
||||
InfluxDB(TM) is a trademark owned by InfluxData, which is not affiliated with, and does not endorse, this site.
|
||||
|
||||
|
||||
## TL;DR
|
||||
|
||||
```console
|
||||
@@ -524,7 +524,7 @@ $ helm install influxdb bitnami/influxdb
|
||||
##### Export secrets and required values to update
|
||||
|
||||
```console
|
||||
$ export INFLUXDB_ADMIN_PASSWORD=$(kubectl get secret --namespace default influxdb -o jsonpath="{.data.admin-user-password}" | base64 --decode)
|
||||
$ export INFLUXDB_ADMIN_PASSWORD=$(kubectl get secret --namespace default influxdb -o jsonpath="{.data.admin-user-password}" | base64 -d)
|
||||
```
|
||||
|
||||
##### Upgrade the chart release
|
||||
@@ -574,4 +574,4 @@ You may obtain a copy of the License at
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
See the License for the specific language governing permissions and
|
||||
|
||||
@@ -35,27 +35,27 @@ InfluxDB™ can be accessed through following DNS names from within your clu
|
||||
|
||||
To get the password for the {{ .Values.auth.admin.username }} user, run:
|
||||
|
||||
export ADMIN_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "influxdb.secretName" . }} -o jsonpath="{.data.admin-user-password}" | base64 --decode)
|
||||
export ADMIN_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "influxdb.secretName" . }} -o jsonpath="{.data.admin-user-password}" | base64 -d)
|
||||
|
||||
{{- if .Values.auth.user.username }}
|
||||
|
||||
To get the password for the {{ .Values.auth.user.username }} user, run:
|
||||
|
||||
export USER_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "influxdb.secretName" . }} -o jsonpath="{.data.user-password}" | base64 --decode)
|
||||
export USER_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "influxdb.secretName" . }} -o jsonpath="{.data.user-password}" | base64 -d)
|
||||
|
||||
{{- end }}
|
||||
{{- if .Values.auth.readUser.username }}
|
||||
|
||||
To get the password for the {{ .Values.auth.readUser.username }} user, run:
|
||||
|
||||
export READ_USER_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "influxdb.secretName" . }} -o jsonpath="{.data.read-user-password}" | base64 --decode)
|
||||
export READ_USER_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "influxdb.secretName" . }} -o jsonpath="{.data.read-user-password}" | base64 -d)
|
||||
|
||||
{{- end }}
|
||||
{{- if .Values.auth.writeUser.username }}
|
||||
|
||||
To get the password for the {{ .Values.auth.writeUser.username }} user, run:
|
||||
|
||||
export WRITE_USER_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "influxdb.secretName" . }} -o jsonpath="{.data.write-user-password}" | base64 --decode)
|
||||
export WRITE_USER_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "influxdb.secretName" . }} -o jsonpath="{.data.write-user-password}" | base64 -d)
|
||||
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
@@ -30,4 +30,4 @@ name: jasperreports
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-jasperreports
|
||||
- http://community.jaspersoft.com/project/jasperreports-server
|
||||
version: 14.1.4
|
||||
version: 14.1.5
|
||||
|
||||
@@ -7,7 +7,7 @@ JasperReports Server is a stand-alone and embeddable reporting server. It is a c
|
||||
[Overview of JasperReports](http://community.jaspersoft.com/project/jasperreports-server)
|
||||
|
||||
Trademarks: This software listing is packaged by Bitnami. The respective trademarks mentioned in the offering are owned by the respective companies, and use of them does not imply any affiliation or endorsement.
|
||||
|
||||
|
||||
## TL;DR
|
||||
|
||||
```console
|
||||
@@ -366,9 +366,9 @@ Consequences:
|
||||
- Backwards compatibility is not guaranteed. However, you can easily workaround this issue by removing JasperReports deployment before upgrading (the following example assumes that the release name is `jasperreports`):
|
||||
|
||||
```console
|
||||
$ export JASPER_PASSWORD=$(kubectl get secret --namespace default jasperreports -o jsonpath="{.data.jasperreports-password}" | base64 --decode)
|
||||
$ export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default jasperreports-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 --decode)
|
||||
$ export MARIADB_PASSWORD=$(kubectl get secret --namespace default jasperreports-mariadb -o jsonpath="{.data.mariadb-password}" | base64 --decode)
|
||||
$ export JASPER_PASSWORD=$(kubectl get secret --namespace default jasperreports -o jsonpath="{.data.jasperreports-password}" | base64 -d)
|
||||
$ export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default jasperreports-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 -d)
|
||||
$ export MARIADB_PASSWORD=$(kubectl get secret --namespace default jasperreports-mariadb -o jsonpath="{.data.mariadb-password}" | base64 -d)
|
||||
$ kubectl delete deployments.apps jasperreports
|
||||
$ helm upgrade jasperreports bitnami/jasperreports --set jasperreportsPassword=$JASPER_PASSWORD,mariadb.auth.rootPassword=$MARIADB_ROOT_PASSWORD,mariadb.auth.password=$MARIADB_PASSWORD
|
||||
```
|
||||
@@ -416,9 +416,9 @@ To upgrade to `9.0.0`, it should be done reusing the PVCs used to hold both the
|
||||
Obtain the credentials and the names of the PVCs used to hold both the MariaDB and JasperReports data on your current release:
|
||||
|
||||
```console
|
||||
export JASPERREPORTS_PASSWORD=$(kubectl get secret --namespace default jasperreports -o jsonpath="{.data.jasperreports-password}" | base64 --decode)
|
||||
export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default jasperreports-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 --decode)
|
||||
export MARIADB_PASSWORD=$(kubectl get secret --namespace default jasperreports-mariadb -o jsonpath="{.data.mariadb-password}" | base64 --decode)
|
||||
export JASPERREPORTS_PASSWORD=$(kubectl get secret --namespace default jasperreports -o jsonpath="{.data.jasperreports-password}" | base64 -d)
|
||||
export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default jasperreports-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 -d)
|
||||
export MARIADB_PASSWORD=$(kubectl get secret --namespace default jasperreports-mariadb -o jsonpath="{.data.mariadb-password}" | base64 -d)
|
||||
export MARIADB_PVC=$(kubectl get pvc -l app=mariadb,component=master,release=jasperreports -o jsonpath="{.items[0].metadata.name}")
|
||||
```
|
||||
|
||||
@@ -496,4 +496,4 @@ Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
limitations under the License.
|
||||
|
||||
@@ -44,7 +44,7 @@ APP VERSION: {{ .Chart.AppVersion }}
|
||||
2. Login with the following credentials
|
||||
|
||||
echo Username: {{ .Values.jasperreportsUsername }}
|
||||
echo Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "common.names.fullname" . }} -o jsonpath="{.data.jasperreports-password}" | base64 --decode)
|
||||
echo Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "common.names.fullname" . }} -o jsonpath="{.data.jasperreports-password}" | base64 -d)
|
||||
|
||||
{{- else -}}
|
||||
|
||||
|
||||
@@ -26,4 +26,4 @@ name: jenkins
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-jenkins
|
||||
- https://jenkins.io/
|
||||
version: 10.1.1
|
||||
version: 10.1.2
|
||||
|
||||
@@ -7,7 +7,7 @@ Jenkins is an open source Continuous Integration and Continuous Delivery (CI/CD)
|
||||
[Overview of Jenkins](http://jenkins-ci.org/)
|
||||
|
||||
Trademarks: This software listing is packaged by Bitnami. The respective trademarks mentioned in the offering are owned by the respective companies, and use of them does not imply any affiliation or endorsement.
|
||||
|
||||
|
||||
## TL;DR
|
||||
|
||||
```console
|
||||
@@ -320,7 +320,7 @@ Upgrading from version `7.x.x` should be possible following the workaround below
|
||||
- Remove Jenkins deployment:
|
||||
|
||||
```console
|
||||
$ export JENKINS_PASSWORD=$(kubectl get secret --namespace default jenkins -o jsonpath="{.data.jenkins-password}" | base64 --decode)
|
||||
$ export JENKINS_PASSWORD=$(kubectl get secret --namespace default jenkins -o jsonpath="{.data.jenkins-password}" | base64 -d)
|
||||
$ kubectl delete deployments.apps jenkins
|
||||
```
|
||||
|
||||
@@ -340,7 +340,7 @@ Consequences:
|
||||
- Backwards compatibility is not guaranteed. However, you can easily workaround this issue by removing Jenkins deployment before upgrading (the following example assumes that the release name is `jenkins`):
|
||||
|
||||
```console
|
||||
$ export JENKINS_PASSWORD=$(kubectl get secret --namespace default jenkins -o jsonpath="{.data.jenkins-password}" | base64 --decode)
|
||||
$ export JENKINS_PASSWORD=$(kubectl get secret --namespace default jenkins -o jsonpath="{.data.jenkins-password}" | base64 -d)
|
||||
$ kubectl delete deployments.apps jenkins
|
||||
$ helm upgrade jenkins bitnami/jenkins --set jenkinsPassword=$JENKINS_PASSWORD
|
||||
```
|
||||
@@ -398,4 +398,4 @@ Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
limitations under the License.
|
||||
|
||||
@@ -42,6 +42,6 @@ APP VERSION: {{ .Chart.AppVersion }}
|
||||
2. Login with the following credentials
|
||||
|
||||
echo Username: {{ .Values.jenkinsUser }}
|
||||
echo Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "common.names.fullname" . }} -o jsonpath="{.data.jenkins-password}" | base64 --decode)
|
||||
echo Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "common.names.fullname" . }} -o jsonpath="{.data.jenkins-password}" | base64 -d)
|
||||
|
||||
{{- include "jenkins.checkRollingTags" . }}
|
||||
|
||||
@@ -27,4 +27,4 @@ name: joomla
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-joomla
|
||||
- https://www.joomla.org/
|
||||
version: 13.2.6
|
||||
version: 13.2.7
|
||||
|
||||
@@ -7,7 +7,7 @@ Joomla! is an award winning open source CMS platform for building websites and a
|
||||
[Overview of Joomla!](http://www.joomla.org/)
|
||||
|
||||
Trademarks: This software listing is packaged by Bitnami. The respective trademarks mentioned in the offering are owned by the respective companies, and use of them does not imply any affiliation or endorsement.
|
||||
|
||||
|
||||
## TL;DR
|
||||
|
||||
```console
|
||||
@@ -417,9 +417,9 @@ To upgrade to `9.0.0`, it should be done reusing the PVCs used to hold both the
|
||||
Obtain the credentials and the names of the PVCs used to hold both the MariaDB and Joomla data on your current release:
|
||||
|
||||
```console
|
||||
export JOOMLA_PASSWORD=$(kubectl get secret --namespace default joomla -o jsonpath="{.data.joomla-password}" | base64 --decode)
|
||||
export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default joomla-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 --decode)
|
||||
export MARIADB_PASSWORD=$(kubectl get secret --namespace default joomla-mariadb -o jsonpath="{.data.mariadb-password}" | base64 --decode)
|
||||
export JOOMLA_PASSWORD=$(kubectl get secret --namespace default joomla -o jsonpath="{.data.joomla-password}" | base64 -d)
|
||||
export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default joomla-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 -d)
|
||||
export MARIADB_PASSWORD=$(kubectl get secret --namespace default joomla-mariadb -o jsonpath="{.data.mariadb-password}" | base64 -d)
|
||||
export MARIADB_PVC=$(kubectl get pvc -l app=mariadb,component=master,release=joomla -o jsonpath="{.items[0].metadata.name}")
|
||||
```
|
||||
|
||||
@@ -498,4 +498,4 @@ Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
limitations under the License.
|
||||
|
||||
@@ -44,7 +44,7 @@ APP VERSION: {{ .Chart.AppVersion }}
|
||||
2. Login with the following credentials
|
||||
|
||||
echo Username: {{ .Values.joomlaUsername }}
|
||||
echo Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "joomla.secretName" . }} -o jsonpath="{.data.joomla-password}" | base64 --decode)
|
||||
echo Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "joomla.secretName" . }} -o jsonpath="{.data.joomla-password}" | base64 -d)
|
||||
|
||||
{{- else -}}
|
||||
|
||||
|
||||
@@ -26,4 +26,4 @@ name: jupyterhub
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-jupyterhub
|
||||
- https://github.com/jupyterhub/jupyterhub
|
||||
version: 1.3.1
|
||||
version: 1.3.2
|
||||
|
||||
@@ -43,7 +43,7 @@ APP VERSION: {{ .Chart.AppVersion }}
|
||||
2. Login with the following admin user below to create a Notebook:
|
||||
|
||||
echo Admin user: {{ .Values.hub.adminUser }}
|
||||
echo Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "common.names.fullname" . }}-hub -o jsonpath="{.data['values\.yaml']}" | base64 --decode | awk -F: '/password/ {gsub(/[ \t]+/, "", $2);print $2}')
|
||||
echo Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "common.names.fullname" . }}-hub -o jsonpath="{.data['values\.yaml']}" | base64 -d | awk -F: '/password/ {gsub(/[ \t]+/, "", $2);print $2}')
|
||||
|
||||
{{- include "common.warnings.rollingTag" .Values.hub.image }}
|
||||
{{- include "common.warnings.rollingTag" .Values.proxy.image }}
|
||||
|
||||
@@ -29,4 +29,4 @@ name: kafka
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-kafka
|
||||
- https://kafka.apache.org/
|
||||
version: 17.2.0
|
||||
version: 17.2.1
|
||||
|
||||
@@ -30,7 +30,7 @@ In order to replicate the container startup scripts execute this command:
|
||||
{{- $externalClientProtocol := include "kafka.listenerType" (dict "protocol" (include "kafka.externalClientProtocol" . )) -}}
|
||||
{{- $saslMechanisms := .Values.auth.sasl.mechanisms -}}
|
||||
{{- $tlsEndpointIdentificationAlgorithm := default "" .Values.auth.tls.endpointIdentificationAlgorithm -}}
|
||||
{{- $tlsPasswordSecret := printf "$(kubectl get secret %s --namespace %s -o jsonpath='{.data.password}' | base64 --decode | cut -d , -f 1)" .Values.auth.tls.existingSecret $releaseNamespace -}}
|
||||
{{- $tlsPasswordSecret := printf "$(kubectl get secret %s --namespace %s -o jsonpath='{.data.password}' | base64 -d | cut -d , -f 1)" .Values.auth.tls.existingSecret $releaseNamespace -}}
|
||||
{{- $tlsPassword := ternary .Values.auth.tls.password $tlsPasswordSecret (eq .Values.auth.tls.existingSecret "") -}}
|
||||
{{- $servicePort := int .Values.service.ports.client -}}
|
||||
|
||||
@@ -74,7 +74,7 @@ org.apache.kafka.common.security.scram.ScramLoginModule required
|
||||
org.apache.kafka.common.security.plain.PlainLoginModule required
|
||||
{{- end }}
|
||||
username="{{ index .Values.auth.sasl.jaas.clientUsers 0 }}"
|
||||
password="$(kubectl get secret {{ $fullname }}-jaas --namespace {{ $releaseNamespace }} -o jsonpath='{.data.client-passwords}' | base64 --decode | cut -d , -f 1)";
|
||||
password="$(kubectl get secret {{ $fullname }}-jaas --namespace {{ $releaseNamespace }} -o jsonpath='{.data.client-passwords}' | base64 -d | cut -d , -f 1)";
|
||||
};
|
||||
|
||||
- client.properties:
|
||||
@@ -229,7 +229,7 @@ org.apache.kafka.common.security.scram.ScramLoginModule required
|
||||
org.apache.kafka.common.security.plain.PlainLoginModule required
|
||||
{{- end }}
|
||||
username="{{ index .Values.auth.sasl.jaas.clientUsers 0 }}"
|
||||
password="$(kubectl get secret {{ $fullname }}-jaas --namespace {{ $releaseNamespace }} -o jsonpath='{.data.client-passwords}' | base64 --decode | cut -d , -f 1)";
|
||||
password="$(kubectl get secret {{ $fullname }}-jaas --namespace {{ $releaseNamespace }} -o jsonpath='{.data.client-passwords}' | base64 -d | cut -d , -f 1)";
|
||||
};
|
||||
|
||||
- client.properties:
|
||||
|
||||
@@ -26,4 +26,4 @@ name: keycloak
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-keycloak
|
||||
- https://github.com/keycloak/keycloak
|
||||
version: 9.2.0
|
||||
version: 9.2.1
|
||||
|
||||
@@ -52,9 +52,9 @@ To access Keycloak from outside the cluster execute the following commands:
|
||||
|
||||
echo Username: {{ .Values.auth.adminUser }}
|
||||
{{- if not .Values.auth.existingSecretPerPassword }}
|
||||
echo Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "common.secrets.name" (dict "existingSecret" .Values.auth.existingSecret "context" $) }} -o jsonpath="{.data.admin-password}" | base64 --decode)
|
||||
echo Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "common.secrets.name" (dict "existingSecret" .Values.auth.existingSecret "context" $) }} -o jsonpath="{.data.admin-password}" | base64 -d)
|
||||
{{- else }}
|
||||
echo Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "common.secrets.name" (dict "existingSecret" .Values.auth.existingSecretPerPassword.adminPassword "context" $) }} -o jsonpath="\{ {{ include "common.secrets.key" (dict "existingSecret" .Values.auth.existingSecretPerPassword "key" "adminPassword") }} \}" | base64 --decode)
|
||||
echo Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "common.secrets.name" (dict "existingSecret" .Values.auth.existingSecretPerPassword.adminPassword "context" $) }} -o jsonpath="\{ {{ include "common.secrets.key" (dict "existingSecret" .Values.auth.existingSecretPerPassword "key" "adminPassword") }} \}" | base64 -d)
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- if .Values.metrics.enabled }}
|
||||
|
||||
@@ -34,4 +34,4 @@ name: kong
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-kong
|
||||
- https://konghq.com/
|
||||
version: 6.3.1
|
||||
version: 6.3.2
|
||||
|
||||
@@ -7,7 +7,7 @@ Kong is an open source Microservice API gateway and platform designed for managi
|
||||
[Overview of Kong](https://konghq.com/kong-community-edition/)
|
||||
|
||||
Trademarks: This software listing is packaged by Bitnami. The respective trademarks mentioned in the offering are owned by the respective companies, and use of them does not imply any affiliation or endorsement.
|
||||
|
||||
|
||||
## TL;DR
|
||||
|
||||
```console
|
||||
@@ -564,7 +564,7 @@ Kong Ingress Controller version was bumped to new major version, `1.x.x`. The as
|
||||
##### Export secrets and required values to update
|
||||
|
||||
```console
|
||||
$ export POSTGRESQL_PASSWORD=$(kubectl get secret --namespace default kong-postgresql -o jsonpath="{.data.password}" | base64 --decode)
|
||||
$ export POSTGRESQL_PASSWORD=$(kubectl get secret --namespace default kong-postgresql -o jsonpath="{.data.password}" | base64 -d)
|
||||
$ export POSTGRESQL_PVC=$(kubectl get pvc -l app.kubernetes.io/instance=kong,app.kubernetes.io/name=postgresql,role=master -o jsonpath="{.items[0].metadata.name}")
|
||||
```
|
||||
|
||||
@@ -632,4 +632,4 @@ Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
limitations under the License.
|
||||
|
||||
@@ -112,7 +112,7 @@ If you want to upgrade the installation you will need to re-set the database cre
|
||||
{{- $dbPasswordValidationErrors := include "common.validations.values.cassandra.passwords" (dict "secret" $dbSecretName "subchart" true "context" $) -}}
|
||||
{{- $passwordValidationErrors = append $passwordValidationErrors $dbPasswordValidationErrors -}}
|
||||
|
||||
kubectl get secret --namespace {{ .Release.Namespace }} {{ include "kong.cassandra.secretName" . }} -o jsonpath="{.data.cassandra-password}" | base64 --decode
|
||||
kubectl get secret --namespace {{ .Release.Namespace }} {{ include "kong.cassandra.secretName" . }} -o jsonpath="{.data.cassandra-password}" | base64 -d
|
||||
{{- end }}
|
||||
|
||||
{{- if .Values.service.exposeAdmin }}
|
||||
|
||||
@@ -30,4 +30,4 @@ maintainers:
|
||||
name: kubeapps
|
||||
sources:
|
||||
- https://github.com/vmware-tanzu/kubeapps
|
||||
version: 8.1.6
|
||||
version: 8.1.7
|
||||
|
||||
@@ -7,7 +7,7 @@ Kubeapps is a web-based UI for launching and managing applications on Kubernetes
|
||||
[Overview of Kubeapps](https://github.com/vmware-tanzu/kubeapps)
|
||||
|
||||
|
||||
|
||||
|
||||
## TL;DR
|
||||
|
||||
```bash
|
||||
@@ -1079,7 +1079,7 @@ PASSWORDS ERROR: you must provide your current passwords when upgrade the releas
|
||||
The error gives you generic instructions for retrieving the PostgreSQL password, but if you have installed a Kubeapps version prior to 2.3.1, the name of the secret will differ. Run the following command:
|
||||
|
||||
```console
|
||||
export POSTGRESQL_PASSWORD=$(kubectl get secret --namespace "kubeapps" kubeapps-db -o jsonpath="{.data.postgresql-password}" | base64 --decode)
|
||||
export POSTGRESQL_PASSWORD=$(kubectl get secret --namespace "kubeapps" kubeapps-db -o jsonpath="{.data.postgresql-password}" | base64 -d)
|
||||
```
|
||||
|
||||
> NOTE: Replace the namespace in the command with the namespace in which you have deployed Kubeapps.
|
||||
@@ -1170,4 +1170,4 @@ Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
limitations under the License.
|
||||
|
||||
@@ -35,4 +35,4 @@ name: magento
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-magento
|
||||
- https://magento.com/
|
||||
version: 20.1.5
|
||||
version: 20.1.6
|
||||
|
||||
@@ -7,7 +7,7 @@ Magento is a powerful open source e-commerce platform. With easy customizations
|
||||
[Overview of Magento](http://www.magento.com)
|
||||
|
||||
Trademarks: This software listing is packaged by Bitnami. The respective trademarks mentioned in the offering are owned by the respective companies, and use of them does not imply any affiliation or endorsement.
|
||||
|
||||
|
||||
## TL;DR
|
||||
|
||||
```console
|
||||
@@ -687,9 +687,9 @@ Consequences:
|
||||
|
||||
```console
|
||||
$ export APP_HOST=$(kubectl get svc --namespace default magento --template "{{ range (index .status.loadBalancer.ingress 0) }}{{ . }}{{ end }}")
|
||||
$ export APP_PASSWORD=$(kubectl get secret --namespace default magento -o jsonpath="{.data.magento-password}" | base64 --decode)
|
||||
$ export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default magento-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 --decode)
|
||||
$ export MARIADB_PASSWORD=$(kubectl get secret --namespace default magento-mariadb -o jsonpath="{.data.mariadb-password}" | base64 --decode)
|
||||
$ export APP_PASSWORD=$(kubectl get secret --namespace default magento -o jsonpath="{.data.magento-password}" | base64 -d)
|
||||
$ export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default magento-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 -d)
|
||||
$ export MARIADB_PASSWORD=$(kubectl get secret --namespace default magento-mariadb -o jsonpath="{.data.mariadb-password}" | base64 -d)
|
||||
$ kubectl delete deployments.apps magento
|
||||
$ helm upgrade magento bitnami/magento --set magentoHost=$APP_HOST,magentoPassword=$APP_PASSWORD,mariadb.auth.rootPassword=$MARIADB_ROOT_PASSWORD,mariadb.auth.password=$MARIADB_PASSWORD
|
||||
```
|
||||
@@ -738,9 +738,9 @@ Obtain the credentials and the names of the PVCs used to hold the MariaDB data o
|
||||
|
||||
```console
|
||||
$ export MAGENTO_HOST=$(kubectl get svc --namespace default magento --template "{{ range (index .status.loadBalancer.ingress 0) }}{{ . }}{{ end }}")
|
||||
$ export MAGENTO_PASSWORD=$(kubectl get secret --namespace default magento -o jsonpath="{.data.magento-password}" | base64 --decode)
|
||||
$ export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default magento-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 --decode)
|
||||
$ export MARIADB_PASSWORD=$(kubectl get secret --namespace default magento-mariadb -o jsonpath="{.data.mariadb-password}" | base64 --decode)
|
||||
$ export MAGENTO_PASSWORD=$(kubectl get secret --namespace default magento -o jsonpath="{.data.magento-password}" | base64 -d)
|
||||
$ export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default magento-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 -d)
|
||||
$ export MARIADB_PASSWORD=$(kubectl get secret --namespace default magento-mariadb -o jsonpath="{.data.mariadb-password}" | base64 -d)
|
||||
$ export MARIADB_PVC=$(kubectl get pvc -l app=mariadb,component=master,release=magento -o jsonpath="{.items[0].metadata.name}")
|
||||
```
|
||||
|
||||
@@ -826,4 +826,4 @@ Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
limitations under the License.
|
||||
|
||||
@@ -27,10 +27,10 @@ host. To configure Magento with the URL of your service:
|
||||
Watch the status with: 'kubectl get svc --namespace {{ include "common.names.namespace" . }} -w {{ include "common.names.fullname" . }}'
|
||||
|
||||
export APP_HOST=$(kubectl get svc --namespace {{ include "common.names.namespace" . }} {{ include "common.names.fullname" . }} --template "{{ "{{ range (index .status.loadBalancer.ingress 0) }}{{ . }}{{ end }}" }}")
|
||||
export APP_PASSWORD=$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ template "magento.secretName" . }} -o jsonpath="{.data.magento-password}" | base64 --decode)
|
||||
export DATABASE_ROOT_PASSWORD=$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ template "magento.databaseSecretName" . }} -o jsonpath="{.data.mariadb-root-password}" | base64 --decode)
|
||||
export APP_PASSWORD=$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ template "magento.secretName" . }} -o jsonpath="{.data.magento-password}" | base64 -d)
|
||||
export DATABASE_ROOT_PASSWORD=$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ template "magento.databaseSecretName" . }} -o jsonpath="{.data.mariadb-root-password}" | base64 -d)
|
||||
{{- end }}
|
||||
export APP_DATABASE_PASSWORD=$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ template "magento.databaseSecretName" . }} -o jsonpath="{.data.mariadb-password}" | base64 --decode)
|
||||
export APP_DATABASE_PASSWORD=$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ template "magento.databaseSecretName" . }} -o jsonpath="{.data.mariadb-password}" | base64 -d)
|
||||
|
||||
2. Complete your Magento deployment by running:
|
||||
|
||||
@@ -68,7 +68,7 @@ host. To configure Magento with the URL of your service:
|
||||
2. Get your Magento login credentials by running:
|
||||
|
||||
echo Username : {{ .Values.magentoUsername }}
|
||||
echo Password : $(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ template "magento.secretName" . }} -o jsonpath="{.data.magento-password}" | base64 --decode)
|
||||
echo Password : $(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ template "magento.secretName" . }} -o jsonpath="{.data.magento-password}" | base64 -d)
|
||||
{{- end }}
|
||||
|
||||
{{- else -}}
|
||||
@@ -93,7 +93,7 @@ host. To configure Magento to use and external database host:
|
||||
|
||||
export APP_HOST=127.0.0.1
|
||||
{{- end }}
|
||||
export APP_PASSWORD=$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ template "magento.secretName" . }} -o jsonpath="{.data.magento-password}" | base64 --decode)
|
||||
export APP_PASSWORD=$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ template "magento.secretName" . }} -o jsonpath="{.data.magento-password}" | base64 -d)
|
||||
|
||||
## PLEASE UPDATE THE EXTERNAL DATABASE CONNECTION PARAMETERS IN THE FOLLOWING COMMAND AS NEEDED ##
|
||||
|
||||
|
||||
@@ -27,4 +27,4 @@ sources:
|
||||
- https://github.com/bitnami/bitnami-docker-mariadb-galera
|
||||
- https://github.com/prometheus/mysqld_exporter
|
||||
- https://mariadb.org
|
||||
version: 7.3.0
|
||||
version: 7.3.1
|
||||
|
||||
@@ -35,12 +35,12 @@ MariaDB can be accessed via port "{{ .Values.service.ports.mysql }}" on the foll
|
||||
|
||||
To obtain the password for the MariaDB admin user run the following command:
|
||||
|
||||
echo "$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ if .Values.existingSecret }}{{ .Values.existingSecret }}{{ else }}{{ template "common.names.fullname" . }}{{ end }} -o jsonpath="{.data.mariadb-root-password}" | base64 --decode)"
|
||||
echo "$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ if .Values.existingSecret }}{{ .Values.existingSecret }}{{ else }}{{ template "common.names.fullname" . }}{{ end }} -o jsonpath="{.data.mariadb-root-password}" | base64 -d)"
|
||||
|
||||
To connect to your database run the following command:
|
||||
|
||||
kubectl run {{ template "common.names.fullname" . }}-client --rm --tty -i --restart='Never' --namespace {{ include "common.names.namespace" . }} --image {{ template "mariadb-galera.image" . }} --command \
|
||||
-- mysql -h {{ template "common.names.fullname" . }} -P {{ .Values.service.ports.mysql }} -u{{ if .Values.db.user }}{{ .Values.db.user }}{{ else }}{{ .Values.rootUser.user }}{{ end }} -p{{ if .Values.db.user }}$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ if .Values.existingSecret }}{{ .Values.existingSecret }}{{ else }}{{ template "common.names.fullname" . }}{{ end }} -o jsonpath="{.data.mariadb-password}" | base64 --decode){{ else }}$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ if .Values.existingSecret }}{{ .Values.existingSecret }}{{ else }}{{ template "common.names.fullname" . }}{{ end }} -o jsonpath="{.data.mariadb-root-password}" | base64 --decode){{ end }} {{ .Values.db.name }}
|
||||
-- mysql -h {{ template "common.names.fullname" . }} -P {{ .Values.service.ports.mysql }} -u{{ if .Values.db.user }}{{ .Values.db.user }}{{ else }}{{ .Values.rootUser.user }}{{ end }} -p{{ if .Values.db.user }}$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ if .Values.existingSecret }}{{ .Values.existingSecret }}{{ else }}{{ template "common.names.fullname" . }}{{ end }} -o jsonpath="{.data.mariadb-password}" | base64 -d){{ else }}$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ if .Values.existingSecret }}{{ .Values.existingSecret }}{{ else }}{{ template "common.names.fullname" . }}{{ end }} -o jsonpath="{.data.mariadb-root-password}" | base64 -d){{ end }} {{ .Values.db.name }}
|
||||
|
||||
To connect to your database from outside the cluster execute the following commands:
|
||||
|
||||
@@ -48,7 +48,7 @@ To connect to your database from outside the cluster execute the following comma
|
||||
|
||||
export NODE_IP=$(kubectl get nodes --namespace {{ include "common.names.namespace" . }} -o jsonpath="{.items[0].status.addresses[0].address}")
|
||||
export NODE_PORT=$(kubectl get --namespace {{ include "common.names.namespace" . }} -o jsonpath="{.spec.ports[0].nodePort}" services {{ template "common.names.fullname" . }})
|
||||
mysql -h $NODE_IP -P $NODE_PORT -u{{ if .Values.db.user }}{{ .Values.db.user }}{{ else }}{{ .Values.rootUser.user }}{{ end }} -p{{ if .Values.db.user }}$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ if .Values.existingSecret }}{{ .Values.existingSecret }}{{ else }}{{ template "common.names.fullname" . }}{{ end }} -o jsonpath="{.data.mariadb-password}" | base64 --decode){{ else }}$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ if .Values.existingSecret }}{{ .Values.existingSecret }}{{ else }}{{ template "common.names.fullname" . }}{{ end }} -o jsonpath="{.data.mariadb-root-password}" | base64 --decode){{ end }} {{ .Values.db.name }}
|
||||
mysql -h $NODE_IP -P $NODE_PORT -u{{ if .Values.db.user }}{{ .Values.db.user }}{{ else }}{{ .Values.rootUser.user }}{{ end }} -p{{ if .Values.db.user }}$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ if .Values.existingSecret }}{{ .Values.existingSecret }}{{ else }}{{ template "common.names.fullname" . }}{{ end }} -o jsonpath="{.data.mariadb-password}" | base64 -d){{ else }}$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ if .Values.existingSecret }}{{ .Values.existingSecret }}{{ else }}{{ template "common.names.fullname" . }}{{ end }} -o jsonpath="{.data.mariadb-root-password}" | base64 -d){{ end }} {{ .Values.db.name }}
|
||||
|
||||
{{- else if contains "LoadBalancer" .Values.service.type }}
|
||||
|
||||
@@ -56,12 +56,12 @@ To connect to your database from outside the cluster execute the following comma
|
||||
Watch the status with: 'kubectl get svc --namespace {{ include "common.names.namespace" . }} -w {{ template "common.names.fullname" . }}'
|
||||
|
||||
export SERVICE_IP=$(kubectl get svc --namespace {{ include "common.names.namespace" . }} {{ template "common.names.fullname" . }} --template "{{ "{{ range (index .status.loadBalancer.ingress 0) }}{{ . }}{{ end }}" }}")
|
||||
mysql -h $SERVICE_IP -P {{ .Values.service.ports.mysql }} -u{{ if .Values.db.user }}{{ .Values.db.user }}{{ else }}{{ .Values.rootUser.user }}{{ end }} -p{{ if .Values.db.user }}$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ if .Values.existingSecret }}{{ .Values.existingSecret }}{{ else }}{{ template "common.names.fullname" . }}{{ end }} -o jsonpath="{.data.mariadb-password}" | base64 --decode){{ else }}$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ if .Values.existingSecret }}{{ .Values.existingSecret }}{{ else }}{{ template "common.names.fullname" . }}{{ end }} -o jsonpath="{.data.mariadb-root-password}" | base64 --decode){{ end }} {{ .Values.db.name }}
|
||||
mysql -h $SERVICE_IP -P {{ .Values.service.ports.mysql }} -u{{ if .Values.db.user }}{{ .Values.db.user }}{{ else }}{{ .Values.rootUser.user }}{{ end }} -p{{ if .Values.db.user }}$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ if .Values.existingSecret }}{{ .Values.existingSecret }}{{ else }}{{ template "common.names.fullname" . }}{{ end }} -o jsonpath="{.data.mariadb-password}" | base64 -d){{ else }}$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ if .Values.existingSecret }}{{ .Values.existingSecret }}{{ else }}{{ template "common.names.fullname" . }}{{ end }} -o jsonpath="{.data.mariadb-root-password}" | base64 -d){{ end }} {{ .Values.db.name }}
|
||||
|
||||
{{- else if contains "ClusterIP" .Values.service.type }}
|
||||
|
||||
kubectl port-forward --namespace {{ include "common.names.namespace" . }} svc/{{ template "common.names.fullname" . }} {{ .Values.service.ports.mysql }}:{{ .Values.service.ports.mysql }} &
|
||||
mysql -h 127.0.0.1 -P {{ .Values.service.ports.mysql }} -u{{ if .Values.db.user }}{{ .Values.db.user }}{{ else }}{{ .Values.rootUser.user }}{{ end }} -p{{ if .Values.db.user }}$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ if .Values.existingSecret }}{{ .Values.existingSecret }}{{ else }}{{ template "common.names.fullname" . }}{{ end }} -o jsonpath="{.data.mariadb-password}" | base64 --decode){{ else }}$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ if .Values.existingSecret }}{{ .Values.existingSecret }}{{ else }}{{ template "common.names.fullname" . }}{{ end }} -o jsonpath="{.data.mariadb-root-password}" | base64 --decode){{ end }} {{ .Values.db.name }}
|
||||
mysql -h 127.0.0.1 -P {{ .Values.service.ports.mysql }} -u{{ if .Values.db.user }}{{ .Values.db.user }}{{ else }}{{ .Values.rootUser.user }}{{ end }} -p{{ if .Values.db.user }}$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ if .Values.existingSecret }}{{ .Values.existingSecret }}{{ else }}{{ template "common.names.fullname" . }}{{ end }} -o jsonpath="{.data.mariadb-password}" | base64 -d){{ else }}$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ if .Values.existingSecret }}{{ .Values.existingSecret }}{{ else }}{{ template "common.names.fullname" . }}{{ end }} -o jsonpath="{.data.mariadb-root-password}" | base64 -d){{ end }} {{ .Values.db.name }}
|
||||
|
||||
{{- end }}
|
||||
|
||||
@@ -77,9 +77,9 @@ To access the MariaDB Prometheus metrics from outside the cluster execute the fo
|
||||
To upgrade this helm chart:
|
||||
|
||||
helm upgrade --namespace {{ include "common.names.namespace" . }} {{ .Release.Name }} bitnami/mariadb-galera \
|
||||
--set rootUser.password=$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ if .Values.existingSecret }}{{ .Values.existingSecret }}{{ else }}{{ template "common.names.fullname" . }}{{ end }} -o jsonpath="{.data.mariadb-root-password}" | base64 --decode) \
|
||||
{{ if .Values.db.user }}--set db.user={{ .Values.db.user }} --set db.password=$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ if .Values.existingSecret }}{{ .Values.existingSecret }}{{ else }}{{ template "common.names.fullname" . }}{{ end }} -o jsonpath="{.data.mariadb-password}" | base64 --decode) {{ end }}--set db.name={{ .Values.db.name }} \
|
||||
--set galera.mariabackup.password=$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ if .Values.existingSecret }}{{ .Values.existingSecret }}{{ else }}{{ template "common.names.fullname" . }}{{ end }} -o jsonpath="{.data.mariadb-galera-mariabackup-password}" | base64 --decode)
|
||||
--set rootUser.password=$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ if .Values.existingSecret }}{{ .Values.existingSecret }}{{ else }}{{ template "common.names.fullname" . }}{{ end }} -o jsonpath="{.data.mariadb-root-password}" | base64 -d) \
|
||||
{{ if .Values.db.user }}--set db.user={{ .Values.db.user }} --set db.password=$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ if .Values.existingSecret }}{{ .Values.existingSecret }}{{ else }}{{ template "common.names.fullname" . }}{{ end }} -o jsonpath="{.data.mariadb-password}" | base64 -d) {{ end }}--set db.name={{ .Values.db.name }} \
|
||||
--set galera.mariabackup.password=$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ if .Values.existingSecret }}{{ .Values.existingSecret }}{{ else }}{{ template "common.names.fullname" . }}{{ end }} -o jsonpath="{.data.mariadb-galera-mariabackup-password}" | base64 -d)
|
||||
|
||||
{{- end }}
|
||||
|
||||
|
||||
@@ -26,4 +26,4 @@ sources:
|
||||
- https://github.com/bitnami/bitnami-docker-mariadb
|
||||
- https://github.com/prometheus/mysqld_exporter
|
||||
- https://mariadb.org
|
||||
version: 11.0.8
|
||||
version: 11.0.9
|
||||
|
||||
@@ -38,7 +38,7 @@ Services:
|
||||
Administrator credentials:
|
||||
|
||||
Username: root
|
||||
Password : $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "mariadb.secretName" . }} -o jsonpath="{.data.mariadb-root-password}" | base64 --decode)
|
||||
Password : $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "mariadb.secretName" . }} -o jsonpath="{.data.mariadb-root-password}" | base64 -d)
|
||||
|
||||
To connect to your database:
|
||||
|
||||
@@ -61,7 +61,7 @@ To upgrade this helm chart:
|
||||
|
||||
1. Obtain the password as described on the 'Administrator credentials' section and set the 'auth.rootPassword' parameter as shown below:
|
||||
|
||||
ROOT_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "mariadb.secretName" . }} -o jsonpath="{.data.mariadb-root-password}" | base64 --decode)
|
||||
ROOT_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "mariadb.secretName" . }} -o jsonpath="{.data.mariadb-root-password}" | base64 -d)
|
||||
helm upgrade --namespace {{ .Release.Namespace }} {{ .Release.Name }} bitnami/mariadb --set auth.rootPassword=$ROOT_PASSWORD
|
||||
|
||||
{{- include "common.warnings.rollingTag" .Values.image }}
|
||||
|
||||
@@ -32,4 +32,4 @@ name: mediawiki
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-mediawiki
|
||||
- https://www.mediawiki.org/
|
||||
version: 14.2.5
|
||||
version: 14.2.6
|
||||
|
||||
@@ -7,7 +7,7 @@ MediaWiki is the free and open source wiki software that powers Wikipedia. Used
|
||||
[Overview of MediaWiki](http://www.mediawiki.org/wiki/MediaWiki)
|
||||
|
||||
Trademarks: This software listing is packaged by Bitnami. The respective trademarks mentioned in the offering are owned by the respective companies, and use of them does not imply any affiliation or endorsement.
|
||||
|
||||
|
||||
## TL;DR
|
||||
|
||||
```console
|
||||
@@ -398,9 +398,9 @@ Consequences:
|
||||
|
||||
```console
|
||||
$ export APP_HOST=$(kubectl get svc --namespace default mediawiki --template "{{ range (index .status.loadBalancer.ingress 0) }}{{ . }}{{ end }}")
|
||||
$ export APP_PASSWORD=$(kubectl get secret --namespace default mediawiki -o jsonpath="{.data.mediawiki-password}" | base64 --decode)
|
||||
$ export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default mediawiki-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 --decode)
|
||||
$ export MARIADB_PASSWORD=$(kubectl get secret --namespace default mediawiki-mariadb -o jsonpath="{.data.mariadb-password}" | base64 --decode)
|
||||
$ export APP_PASSWORD=$(kubectl get secret --namespace default mediawiki -o jsonpath="{.data.mediawiki-password}" | base64 -d)
|
||||
$ export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default mediawiki-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 -d)
|
||||
$ export MARIADB_PASSWORD=$(kubectl get secret --namespace default mediawiki-mariadb -o jsonpath="{.data.mariadb-password}" | base64 -d)
|
||||
$ kubectl delete deployments.apps mediawiki
|
||||
$ helm upgrade mediawiki bitnami/mediawiki --set mediawikiHost=$APP_HOST,mediawikiPassword=$APP_PASSWORD,mariadb.auth.rootPassword=$MARIADB_ROOT_PASSWORD,mariadb.auth.password=$MARIADB_PASSWORD
|
||||
```
|
||||
@@ -449,9 +449,9 @@ Obtain the credentials and the names of the PVCs used to hold both the MariaDB a
|
||||
|
||||
```console
|
||||
export MEDIAWIKI_HOST=$(kubectl get svc --namespace default mediawiki --template "{{ range (index .status.loadBalancer.ingress 0) }}{{ . }}{{ end }}")
|
||||
export MEDIAWIKI_PASSWORD=$(kubectl get secret --namespace default mediawiki -o jsonpath="{.data.mediawiki-password}" | base64 --decode)
|
||||
export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default mediawiki-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 --decode)
|
||||
export MARIADB_PASSWORD=$(kubectl get secret --namespace default mediawiki-mariadb -o jsonpath="{.data.mariadb-password}" | base64 --decode)
|
||||
export MEDIAWIKI_PASSWORD=$(kubectl get secret --namespace default mediawiki -o jsonpath="{.data.mediawiki-password}" | base64 -d)
|
||||
export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default mediawiki-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 -d)
|
||||
export MARIADB_PASSWORD=$(kubectl get secret --namespace default mediawiki-mariadb -o jsonpath="{.data.mariadb-password}" | base64 -d)
|
||||
export MARIADB_PVC=$(kubectl get pvc -l app=mariadb,component=master,release=mediawiki -o jsonpath="{.items[0].metadata.name}")
|
||||
```
|
||||
|
||||
@@ -536,4 +536,4 @@ Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
limitations under the License.
|
||||
|
||||
@@ -27,9 +27,9 @@ host. To configure Mediawiki with the URL of your service:
|
||||
Watch the status with: 'kubectl get svc --namespace {{ .Release.Namespace }} -w {{ template "common.names.fullname" . }}'
|
||||
|
||||
export APP_HOST=$(kubectl get svc --namespace {{ .Release.Namespace }} {{ template "common.names.fullname" . }} --template "{{ "{{ range (index .status.loadBalancer.ingress 0) }}{{ . }}{{ end }}" }}")
|
||||
export APP_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "common.names.fullname" . }} -o jsonpath="{.data.mediawiki-password}" | base64 --decode)
|
||||
export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "mediawiki.mariadb.fullname" . }} -o jsonpath="{.data.mariadb-root-password}" | base64 --decode) {{- end }}
|
||||
export MARIADB_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "mediawiki.mariadb.fullname" . }} -o jsonpath="{.data.mariadb-password}" | base64 --decode)
|
||||
export APP_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "common.names.fullname" . }} -o jsonpath="{.data.mediawiki-password}" | base64 -d)
|
||||
export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "mediawiki.mariadb.fullname" . }} -o jsonpath="{.data.mariadb-root-password}" | base64 -d) {{- end }}
|
||||
export MARIADB_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "mediawiki.mariadb.fullname" . }} -o jsonpath="{.data.mariadb-password}" | base64 -d)
|
||||
|
||||
2. Complete your Mediawiki deployment by running:
|
||||
|
||||
@@ -87,7 +87,7 @@ host. To configure Mediawiki with the URL of your service:
|
||||
2. Get your MediaWiki login credentials by running:
|
||||
|
||||
echo Username: {{ .Values.mediawikiUser }}
|
||||
echo Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "common.names.fullname" . }} -o jsonpath="{.data.mediawiki-password}" | base64 --decode)
|
||||
echo Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "common.names.fullname" . }} -o jsonpath="{.data.mediawiki-password}" | base64 -d)
|
||||
|
||||
{{- else -}}
|
||||
|
||||
|
||||
@@ -25,4 +25,4 @@ name: minio
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-minio
|
||||
- https://min.io
|
||||
version: 11.6.1
|
||||
version: 11.6.2
|
||||
|
||||
@@ -14,8 +14,8 @@ MinIO® can be accessed via port {{ .Values.service.port }} on the following
|
||||
|
||||
To get your credentials run:
|
||||
|
||||
export ROOT_USER=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "minio.secretName" . }} -o jsonpath="{.data.root-user}" | base64 --decode)
|
||||
export ROOT_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "minio.secretName" . }} -o jsonpath="{.data.root-password}" | base64 --decode)
|
||||
export ROOT_USER=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "minio.secretName" . }} -o jsonpath="{.data.root-user}" | base64 -d)
|
||||
export ROOT_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "minio.secretName" . }} -o jsonpath="{.data.root-password}" | base64 -d)
|
||||
|
||||
To connect to your MinIO® server using a client:
|
||||
|
||||
|
||||
@@ -26,4 +26,4 @@ name: mongodb-sharded
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-mongodb-sharded
|
||||
- https://mongodb.org
|
||||
version: 5.0.6
|
||||
version: 5.0.7
|
||||
|
||||
@@ -30,7 +30,7 @@ The MongoDB® Sharded cluster can be accessed via the Mongos instances in por
|
||||
|
||||
To get the {{ .Values.auth.rootUser }} password run:
|
||||
|
||||
export MONGODB_ROOT_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "common.names.fullname" . }} -o jsonpath="{.data.mongodb-root-password}" | base64 --decode)
|
||||
export MONGODB_ROOT_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "common.names.fullname" . }} -o jsonpath="{.data.mongodb-root-password}" | base64 -d)
|
||||
|
||||
To connect to your database run the following command:
|
||||
|
||||
|
||||
@@ -26,4 +26,4 @@ name: mongodb
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-mongodb
|
||||
- https://mongodb.org
|
||||
version: 12.1.14
|
||||
version: 12.1.15
|
||||
|
||||
@@ -94,7 +94,7 @@ MongoDB® can be accessed on the following DNS name(s) and ports from within
|
||||
|
||||
To get the root password run:
|
||||
|
||||
export MONGODB_ROOT_PASSWORD=$(kubectl get secret --namespace {{ template "mongodb.namespace" . }} {{ template "mongodb.secretName" . }} -o jsonpath="{.data.mongodb-root-password}" | base64 --decode)
|
||||
export MONGODB_ROOT_PASSWORD=$(kubectl get secret --namespace {{ template "mongodb.namespace" . }} {{ template "mongodb.secretName" . }} -o jsonpath="{.data.mongodb-root-password}" | base64 -d)
|
||||
|
||||
{{- end }}
|
||||
{{- $customUsers := include "mongodb.customUsers" . -}}
|
||||
@@ -105,7 +105,7 @@ To get the root password run:
|
||||
|
||||
To get the password for "{{ $user }}" run:
|
||||
|
||||
export MONGODB_PASSWORD=$(kubectl get secret --namespace {{ include "mongodb.namespace" $ }} {{ include "mongodb.secretName" $ }} -o jsonpath="{.data.mongodb-passwords}" | base64 --decode | awk -F',' '{print ${{ add 1 $index }}}')
|
||||
export MONGODB_PASSWORD=$(kubectl get secret --namespace {{ include "mongodb.namespace" $ }} {{ include "mongodb.secretName" $ }} -o jsonpath="{.data.mongodb-passwords}" | base64 -d | awk -F',' '{print ${{ add 1 $index }}}')
|
||||
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
@@ -199,4 +199,4 @@ Then, open the obtained URL in a browser.
|
||||
{{- include "common.warnings.rollingTag" .Values.externalAccess.autoDiscovery.image }}
|
||||
{{- include "common.warnings.rollingTag" .Values.volumePermissions.image }}
|
||||
{{- include "common.warnings.rollingTag" .Values.tls.image }}
|
||||
{{- include "mongodb.validateValues" . }}
|
||||
{{- include "mongodb.validateValues" . }}
|
||||
|
||||
@@ -25,4 +25,4 @@ name: moodle
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-moodle
|
||||
- https://www.moodle.org/
|
||||
version: 14.1.5
|
||||
version: 14.1.6
|
||||
|
||||
@@ -7,7 +7,7 @@ Moodle(TM) LMS is an open source online Learning Management System widely used a
|
||||
[Overview of Bitnami LMS powered by Moodle™ LMS](http://moodle.org/)
|
||||
|
||||
Disclaimer: The respective trademarks mentioned in the offering are owned by the respective companies. We do not provide commercial license of any of these products. This listing has an open source license. Moodle(TM) LMS is run and maintained by Moodle HQ, that is a completely and separate project from Bitnami.
|
||||
|
||||
|
||||
## TL;DR
|
||||
|
||||
```console
|
||||
@@ -449,9 +449,9 @@ To upgrade to `9.0.0`, it should be done reusing the PVCs used to hold both the
|
||||
Obtain the credentials and the names of the PVCs used to hold both the MariaDB and Moodle™ data on your current release:
|
||||
|
||||
```console
|
||||
export MOODLE_PASSWORD=$(kubectl get secret --namespace default moodle -o jsonpath="{.data.moodle-password}" | base64 --decode)
|
||||
export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default moodle-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 --decode)
|
||||
export MARIADB_PASSWORD=$(kubectl get secret --namespace default moodle-mariadb -o jsonpath="{.data.mariadb-password}" | base64 --decode)
|
||||
export MOODLE_PASSWORD=$(kubectl get secret --namespace default moodle -o jsonpath="{.data.moodle-password}" | base64 -d)
|
||||
export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default moodle-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 -d)
|
||||
export MARIADB_PASSWORD=$(kubectl get secret --namespace default moodle-mariadb -o jsonpath="{.data.mariadb-password}" | base64 -d)
|
||||
export MARIADB_PVC=$(kubectl get pvc -l app=mariadb,component=master,release=moodle -o jsonpath="{.items[0].metadata.name}")
|
||||
```
|
||||
|
||||
@@ -525,4 +525,4 @@ Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
limitations under the License.
|
||||
|
||||
@@ -44,7 +44,7 @@ APP VERSION: {{ .Chart.AppVersion }}
|
||||
2. Get your Moodle™ login credentials by running:
|
||||
|
||||
echo Username: {{ .Values.moodleUsername }}
|
||||
echo Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "moodle.secretName" . }} -o jsonpath="{.data.moodle-password}" | base64 --decode)
|
||||
echo Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "moodle.secretName" . }} -o jsonpath="{.data.moodle-password}" | base64 -d)
|
||||
|
||||
{{- else -}}
|
||||
|
||||
@@ -57,7 +57,7 @@ host. To configure Moodle™ to use and external database host:
|
||||
|
||||
1. Complete your Moodle™ deployment by running:
|
||||
|
||||
export APP_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "moodle.secretName" . }} -o jsonpath="{.data.moodle-password}" | base64 --decode)
|
||||
export APP_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "moodle.secretName" . }} -o jsonpath="{.data.moodle-password}" | base64 -d)
|
||||
|
||||
## PLEASE UPDATE THE EXTERNAL DATABASE CONNECTION PARAMETERS IN THE FOLLOWING COMMAND AS NEEDED ##
|
||||
|
||||
|
||||
@@ -25,4 +25,4 @@ name: mysql
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-mysql
|
||||
- https://mysql.com
|
||||
version: 9.1.1
|
||||
version: 9.1.2
|
||||
|
||||
@@ -38,7 +38,7 @@ Services:
|
||||
Execute the following to get the administrator credentials:
|
||||
|
||||
echo Username: root
|
||||
MYSQL_ROOT_PASSWORD=$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ template "mysql.secretName" . }} -o jsonpath="{.data.mysql-root-password}" | base64 --decode)
|
||||
MYSQL_ROOT_PASSWORD=$(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ template "mysql.secretName" . }} -o jsonpath="{.data.mysql-root-password}" | base64 -d)
|
||||
|
||||
To connect to your database:
|
||||
|
||||
|
||||
@@ -24,4 +24,4 @@ name: nats
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-nats
|
||||
- https://nats.io/
|
||||
version: 7.3.1
|
||||
version: 7.3.2
|
||||
|
||||
@@ -52,8 +52,8 @@ NATS can be accessed via port {{ .Values.service.ports.client }} on the followin
|
||||
|
||||
To get the authentication credentials, run:
|
||||
|
||||
export NATS_USER=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "common.names.fullname" . }} -o jsonpath='{.data.*}' | base64 --decode | grep -m 1 user | awk '{print $2}' | tr -d '"')
|
||||
export NATS_PASS=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "common.names.fullname" . }} -o jsonpath='{.data.*}' | base64 --decode | grep -m 1 password | awk '{print $2}' | tr -d '"')
|
||||
export NATS_USER=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "common.names.fullname" . }} -o jsonpath='{.data.*}' | base64 -d | grep -m 1 user | awk '{print $2}' | tr -d '"')
|
||||
export NATS_PASS=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "common.names.fullname" . }} -o jsonpath='{.data.*}' | base64 -d | grep -m 1 password | awk '{print $2}' | tr -d '"')
|
||||
echo -e "Client credentials:\n\tUser: $NATS_USER\n\tPassword: $NATS_PASS"
|
||||
|
||||
{{- end }}
|
||||
|
||||
@@ -29,4 +29,4 @@ name: opencart
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-opencart
|
||||
- https://opencart.com/
|
||||
version: 12.2.5
|
||||
version: 12.2.6
|
||||
|
||||
@@ -7,7 +7,7 @@ OpenCart is free open source ecommerce platform for online merchants. OpenCart p
|
||||
[Overview of OpenCart](http://www.opencart.com)
|
||||
|
||||
Trademarks: This software listing is packaged by Bitnami. The respective trademarks mentioned in the offering are owned by the respective companies, and use of them does not imply any affiliation or endorsement.
|
||||
|
||||
|
||||
## TL;DR
|
||||
|
||||
```console
|
||||
@@ -455,9 +455,9 @@ This release includes several breaking changes which are listed below. To upgrad
|
||||
Obtain the credentials and the name of the PVC used to hold the MariaDB data on your current release:
|
||||
|
||||
```console
|
||||
export OPENCART_PASSWORD=$(kubectl get secret --namespace default opencart -o jsonpath="{.data.opencart-password}" | base64 --decode)
|
||||
export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default opencart-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 --decode)
|
||||
export MARIADB_PASSWORD=$(kubectl get secret --namespace default opencart-mariadb -o jsonpath="{.data.mariadb-password}" | base64 --decode)
|
||||
export OPENCART_PASSWORD=$(kubectl get secret --namespace default opencart -o jsonpath="{.data.opencart-password}" | base64 -d)
|
||||
export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default opencart-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 -d)
|
||||
export MARIADB_PASSWORD=$(kubectl get secret --namespace default opencart-mariadb -o jsonpath="{.data.mariadb-password}" | base64 -d)
|
||||
export MARIADB_PVC=$(kubectl get pvc -l app.kubernetes.io/instance=opencart,app.kubernetes.io/name=mariadb,app.kubernetes.io/component=primary -o jsonpath="{.items[0].metadata.name}")
|
||||
```
|
||||
|
||||
@@ -522,4 +522,4 @@ Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
limitations under the License.
|
||||
|
||||
@@ -27,10 +27,10 @@ host. To configure OpenCart with the URL of your service:
|
||||
Watch the status with: 'kubectl get svc --namespace {{ .Release.Namespace }} -w {{ include "common.names.fullname" . }}'
|
||||
|
||||
export APP_HOST=$(kubectl get svc --namespace {{ .Release.Namespace }} {{ include "common.names.fullname" . }} --template "{{ "{{ range (index .status.loadBalancer.ingress 0) }}{{ . }}{{ end }}" }}")
|
||||
export APP_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "opencart.secretName" . }} -o jsonpath="{.data.opencart-password}" | base64 --decode)
|
||||
export DATABASE_ROOT_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "opencart.databaseSecretName" . }} -o jsonpath="{.data.mariadb-root-password}" | base64 --decode)
|
||||
export APP_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "opencart.secretName" . }} -o jsonpath="{.data.opencart-password}" | base64 -d)
|
||||
export DATABASE_ROOT_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "opencart.databaseSecretName" . }} -o jsonpath="{.data.mariadb-root-password}" | base64 -d)
|
||||
{{- end }}
|
||||
export APP_DATABASE_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "opencart.databaseSecretName" . }} -o jsonpath="{.data.mariadb-password}" | base64 --decode)
|
||||
export APP_DATABASE_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "opencart.databaseSecretName" . }} -o jsonpath="{.data.mariadb-password}" | base64 -d)
|
||||
|
||||
2. Complete your OpenCart deployment by running:
|
||||
|
||||
@@ -67,7 +67,7 @@ host. To configure OpenCart with the URL of your service:
|
||||
2. Get your OpenCart login credentials by running:
|
||||
|
||||
echo Admin Username: {{ .Values.opencartUsername }}
|
||||
echo Admin Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "opencart.secretName" . }} -o jsonpath="{.data.opencart-password}" | base64 --decode)
|
||||
echo Admin Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "opencart.secretName" . }} -o jsonpath="{.data.opencart-password}" | base64 -d)
|
||||
{{- end }}
|
||||
|
||||
{{- else -}}
|
||||
@@ -92,7 +92,7 @@ host. To configure OpenCart to use and external database host:
|
||||
|
||||
export APP_HOST=127.0.0.1
|
||||
{{- end }}
|
||||
export APP_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "opencart.secretName" . }} -o jsonpath="{.data.opencart-password}" | base64 --decode)
|
||||
export APP_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "opencart.secretName" . }} -o jsonpath="{.data.opencart-password}" | base64 -d)
|
||||
|
||||
## PLEASE UPDATE THE EXTERNAL DATABASE CONNECTION PARAMETERS IN THE FOLLOWING COMMAND AS NEEDED ##
|
||||
|
||||
|
||||
@@ -31,4 +31,4 @@ name: osclass
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-osclass
|
||||
- https://osclass.org/
|
||||
version: 14.1.6
|
||||
version: 14.1.8
|
||||
|
||||
@@ -7,7 +7,7 @@ Osclass allows you to easily create a classifieds site without any technical kno
|
||||
[Overview of Osclass](https://osclass-classifieds.com)
|
||||
|
||||
Trademarks: This software listing is packaged by Bitnami. The respective trademarks mentioned in the offering are owned by the respective companies, and use of them does not imply any affiliation or endorsement.
|
||||
|
||||
|
||||
## TL;DR
|
||||
|
||||
```console
|
||||
@@ -458,9 +458,9 @@ Consequences:
|
||||
|
||||
```console
|
||||
$ export APP_HOST=$(kubectl get svc --namespace default osclass --template "{{ range (index .status.loadBalancer.ingress 0) }}{{ . }}{{ end }}")
|
||||
$ export APP_PASSWORD=$(kubectl get secret --namespace default osclass -o jsonpath="{.data.osclass-password}" | base64 --decode)
|
||||
$ export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default osclass-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 --decode)
|
||||
$ export MARIADB_PASSWORD=$(kubectl get secret --namespace default osclass-mariadb -o jsonpath="{.data.mariadb-password}" | base64 --decode)
|
||||
$ export APP_PASSWORD=$(kubectl get secret --namespace default osclass -o jsonpath="{.data.osclass-password}" | base64 -d)
|
||||
$ export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default osclass-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 -d)
|
||||
$ export MARIADB_PASSWORD=$(kubectl get secret --namespace default osclass-mariadb -o jsonpath="{.data.mariadb-password}" | base64 -d)
|
||||
$ kubectl delete deployments.apps osclass
|
||||
$ helm upgrade osclass bitnami/osclass --set osclassHost=$APP_HOST,osclassPassword=$APP_PASSWORD,mariadb.auth.rootPassword=$MARIADB_ROOT_PASSWORD,mariadb.auth.password=$MARIADB_PASSWORD
|
||||
```
|
||||
@@ -509,9 +509,9 @@ Obtain the credentials and the names of the PVCs used to hold both the MariaDB a
|
||||
|
||||
```console
|
||||
export OSCLASS_HOST=$(kubectl get svc --namespace default osclass --template "{{ range (index .status.loadBalancer.ingress 0) }}{{ . }}{{ end }}")
|
||||
export OSCLASS_PASSWORD=$(kubectl get secret --namespace default osclass -o jsonpath="{.data.osclass-password}" | base64 --decode)
|
||||
export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default osclass-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 --decode)
|
||||
export MARIADB_PASSWORD=$(kubectl get secret --namespace default osclass-mariadb -o jsonpath="{.data.mariadb-password}" | base64 --decode)
|
||||
export OSCLASS_PASSWORD=$(kubectl get secret --namespace default osclass -o jsonpath="{.data.osclass-password}" | base64 -d)
|
||||
export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default osclass-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 -d)
|
||||
export MARIADB_PASSWORD=$(kubectl get secret --namespace default osclass-mariadb -o jsonpath="{.data.mariadb-password}" | base64 -d)
|
||||
export MARIADB_PVC=$(kubectl get pvc -l app=mariadb,component=master,release=osclass -o jsonpath="{.items[0].metadata.name}")
|
||||
```
|
||||
|
||||
@@ -585,4 +585,4 @@ Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
limitations under the License.
|
||||
|
||||
@@ -44,7 +44,7 @@ APP VERSION: {{ .Chart.AppVersion }}
|
||||
2. Get your Osclass login credentials by running:
|
||||
|
||||
echo Username: {{ .Values.osclassUsername }}
|
||||
echo Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "osclass.secretName" . }} -o jsonpath="{.data.osclass-password}" | base64 --decode)
|
||||
echo Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "osclass.secretName" . }} -o jsonpath="{.data.osclass-password}" | base64 -d)
|
||||
|
||||
{{- else -}}
|
||||
|
||||
@@ -57,7 +57,7 @@ host. To configure Osclass to use and external database host:
|
||||
|
||||
1. Complete your Osclass deployment by running:
|
||||
|
||||
export APP_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "osclass.secretName" . }} -o jsonpath="{.data.osclass-password}" | base64 --decode)
|
||||
export APP_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "osclass.secretName" . }} -o jsonpath="{.data.osclass-password}" | base64 -d)
|
||||
|
||||
## PLEASE UPDATE THE EXTERNAL DATABASE CONNECTION PARAMETERS IN THE FOLLOWING COMMAND AS NEEDED ##
|
||||
|
||||
|
||||
@@ -31,4 +31,4 @@ name: owncloud
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-owncloud
|
||||
- https://owncloud.org/
|
||||
version: 12.1.5
|
||||
version: 12.1.6
|
||||
|
||||
@@ -7,7 +7,7 @@ ownCloud is an open source content collaboration platform used to store and shar
|
||||
[Overview of ownCloud](http://owncloud.org)
|
||||
|
||||
Trademarks: This software listing is packaged by Bitnami. The respective trademarks mentioned in the offering are owned by the respective companies, and use of them does not imply any affiliation or endorsement.
|
||||
|
||||
|
||||
## TL;DR
|
||||
|
||||
```console
|
||||
@@ -518,9 +518,9 @@ Obtain the credentials and the names of the PVCs used to hold both the MariaDB a
|
||||
|
||||
```console
|
||||
export OWNCLOUD_HOST=$(kubectl get svc --namespace default owncloud --template "{{ range (index .status.loadBalancer.ingress 0) }}{{ . }}{{ end }}")
|
||||
export OWNCLOUD_PASSWORD=$(kubectl get secret --namespace default owncloud -o jsonpath="{.data.owncloud-password}" | base64 --decode)
|
||||
export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default owncloud-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 --decode)
|
||||
export MARIADB_PASSWORD=$(kubectl get secret --namespace default owncloud-mariadb -o jsonpath="{.data.mariadb-password}" | base64 --decode)
|
||||
export OWNCLOUD_PASSWORD=$(kubectl get secret --namespace default owncloud -o jsonpath="{.data.owncloud-password}" | base64 -d)
|
||||
export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default owncloud-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 -d)
|
||||
export MARIADB_PASSWORD=$(kubectl get secret --namespace default owncloud-mariadb -o jsonpath="{.data.mariadb-password}" | base64 -d)
|
||||
export MARIADB_PVC=$(kubectl get pvc -l app=mariadb,component=master,release=owncloud -o jsonpath="{.items[0].metadata.name}")
|
||||
```
|
||||
|
||||
@@ -594,4 +594,4 @@ Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
limitations under the License.
|
||||
|
||||
@@ -27,10 +27,10 @@ host. To configure ownCloud with the URL of your service:
|
||||
Watch the status with: 'kubectl get svc --namespace {{ .Release.Namespace }} -w {{ include "common.names.fullname" . }}'
|
||||
|
||||
export APP_HOST=$(kubectl get svc --namespace {{ .Release.Namespace }} {{ include "common.names.fullname" . }} --template "{{ "{{ range (index .status.loadBalancer.ingress 0) }}{{ . }}{{ end }}" }}")
|
||||
export APP_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "owncloud.secretName" . }} -o jsonpath="{.data.owncloud-password}" | base64 --decode)
|
||||
export DATABASE_ROOT_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "owncloud.databaseSecretName" . }} -o jsonpath="{.data.mariadb-root-password}" | base64 --decode)
|
||||
export APP_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "owncloud.secretName" . }} -o jsonpath="{.data.owncloud-password}" | base64 -d)
|
||||
export DATABASE_ROOT_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "owncloud.databaseSecretName" . }} -o jsonpath="{.data.mariadb-root-password}" | base64 -d)
|
||||
{{- end }}
|
||||
export APP_DATABASE_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "owncloud.databaseSecretName" . }} -o jsonpath="{.data.mariadb-password}" | base64 --decode)
|
||||
export APP_DATABASE_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "owncloud.databaseSecretName" . }} -o jsonpath="{.data.mariadb-password}" | base64 -d)
|
||||
|
||||
2. Complete your ownCloud deployment by running:
|
||||
|
||||
@@ -65,7 +65,7 @@ host. To configure ownCloud with the URL of your service:
|
||||
2. Get your ownCloud login credentials by running:
|
||||
|
||||
echo Username : {{ .Values.owncloudUsername }}
|
||||
echo Password : $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "owncloud.secretName" . }} -o jsonpath="{.data.owncloud-password}" | base64 --decode)
|
||||
echo Password : $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "owncloud.secretName" . }} -o jsonpath="{.data.owncloud-password}" | base64 -d)
|
||||
{{- end }}
|
||||
|
||||
{{- else -}}
|
||||
@@ -90,7 +90,7 @@ host. To configure ownCloud to use and external database host:
|
||||
|
||||
export APP_HOST=127.0.0.1
|
||||
{{- end }}
|
||||
export APP_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "owncloud.secretName" . }} -o jsonpath="{.data.owncloud-password}" | base64 --decode)
|
||||
export APP_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "owncloud.secretName" . }} -o jsonpath="{.data.owncloud-password}" | base64 -d)
|
||||
|
||||
## PLEASE UPDATE THE EXTERNAL DATABASE CONNECTION PARAMETERS IN THE FOLLOWING COMMAND AS NEEDED ##
|
||||
|
||||
|
||||
@@ -30,4 +30,4 @@ sources:
|
||||
- https://github.com/bitnami/bitnami-docker-parse
|
||||
- https://github.com/bitnami/bitnami-docker-parse-dashboard
|
||||
- https://parse.com/
|
||||
version: 18.1.6
|
||||
version: 18.1.7
|
||||
|
||||
@@ -89,7 +89,7 @@ service:
|
||||
2. Complete your Parse Dashboard deployment by running:
|
||||
|
||||
helm upgrade --namespace {{ .Release.Namespace }} {{ .Release.Name }} bitnami/{{ .Chart.Name }} \
|
||||
--set server.host=$APP_HOST,server.containerPorts.http={{ .Values.server.containerPorts.http }},server.masterKey=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "common.names.fullname" . }} -o jsonpath="{.data.master-key}" | base64 --decode),dashboard.username={{ .Values.dashboard.username }},dashboard.password=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "common.names.fullname" . }} -o jsonpath="{.data.parse-dashboard-password}" | base64 --decode){{- if .Values.global }}{{- if .Values.global.imagePullSecrets }},global.imagePullSecrets={{ .Values.global.imagePullSecrets }}{{- end }}{{- end }}
|
||||
--set server.host=$APP_HOST,server.containerPorts.http={{ .Values.server.containerPorts.http }},server.masterKey=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "common.names.fullname" . }} -o jsonpath="{.data.master-key}" | base64 -d),dashboard.username={{ .Values.dashboard.username }},dashboard.password=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "common.names.fullname" . }} -o jsonpath="{.data.parse-dashboard-password}" | base64 -d){{- if .Values.global }}{{- if .Values.global.imagePullSecrets }},global.imagePullSecrets={{ .Values.global.imagePullSecrets }}{{- end }}{{- end }}
|
||||
|
||||
{{- else }}
|
||||
|
||||
@@ -114,7 +114,7 @@ service:
|
||||
2. Get your Parse Dashboard login credentials by running:
|
||||
|
||||
echo Username: {{ .Values.dashboard.username }}
|
||||
echo Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "common.names.fullname" . }} -o jsonpath="{.data.parse-dashboard-password}" | base64 --decode)
|
||||
echo Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "common.names.fullname" . }} -o jsonpath="{.data.parse-dashboard-password}" | base64 -d)
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
@@ -26,4 +26,4 @@ name: phpbb
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-phpbb
|
||||
- https://www.phpbb.com/
|
||||
version: 12.2.5
|
||||
version: 12.2.6
|
||||
|
||||
@@ -7,7 +7,7 @@ phpBB is a popular bulletin board that features robust messaging capabilities su
|
||||
[Overview of phpBB](http://www.phpbb.com)
|
||||
|
||||
Trademarks: This software listing is packaged by Bitnami. The respective trademarks mentioned in the offering are owned by the respective companies, and use of them does not imply any affiliation or endorsement.
|
||||
|
||||
|
||||
## TL;DR
|
||||
|
||||
```console
|
||||
@@ -415,9 +415,9 @@ To upgrade to `9.0.0`, it should be done reusing the PVCs used to hold both the
|
||||
Obtain the credentials and the names of the PVCs used to hold both the MariaDB and phpBB data on your current release:
|
||||
|
||||
```console
|
||||
export PHPBB_PASSWORD=$(kubectl get secret --namespace default phpbb -o jsonpath="{.data.phpbb-password}" | base64 --decode)
|
||||
export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default phpbb-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 --decode)
|
||||
export MARIADB_PASSWORD=$(kubectl get secret --namespace default phpbb-mariadb -o jsonpath="{.data.mariadb-password}" | base64 --decode)
|
||||
export PHPBB_PASSWORD=$(kubectl get secret --namespace default phpbb -o jsonpath="{.data.phpbb-password}" | base64 -d)
|
||||
export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default phpbb-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 -d)
|
||||
export MARIADB_PASSWORD=$(kubectl get secret --namespace default phpbb-mariadb -o jsonpath="{.data.mariadb-password}" | base64 -d)
|
||||
export MARIADB_PVC=$(kubectl get pvc -l app=mariadb,component=master,release=phpbb -o jsonpath="{.items[0].metadata.name}")
|
||||
```
|
||||
|
||||
@@ -496,4 +496,4 @@ Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
limitations under the License.
|
||||
|
||||
@@ -44,7 +44,7 @@ APP VERSION: {{ .Chart.AppVersion }}
|
||||
2. Login with the following credentials
|
||||
|
||||
echo Username: {{ .Values.phpbbUsername }}
|
||||
echo Password: $(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ template "phpbb.secretName" . }} -o jsonpath="{.data.phpbb-password}" | base64 --decode)
|
||||
echo Password: $(kubectl get secret --namespace {{ include "common.names.namespace" . }} {{ template "phpbb.secretName" . }} -o jsonpath="{.data.phpbb-password}" | base64 -d)
|
||||
|
||||
{{- else -}}
|
||||
|
||||
|
||||
@@ -29,4 +29,4 @@ name: phpmyadmin
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-phpmyadmin
|
||||
- https://www.phpmyadmin.net/
|
||||
version: 10.1.5
|
||||
version: 10.1.6
|
||||
|
||||
@@ -7,7 +7,7 @@ phpMyAdmin is a free software tool written in PHP, intended to handle the admini
|
||||
[Overview of phpMyAdmin](https://www.phpmyadmin.net/)
|
||||
|
||||
Trademarks: This software listing is packaged by Bitnami. The respective trademarks mentioned in the offering are owned by the respective companies, and use of them does not imply any affiliation or endorsement.
|
||||
|
||||
|
||||
## TL;DR
|
||||
|
||||
```console
|
||||
@@ -409,8 +409,8 @@ Consequences:
|
||||
- Backwards compatibility is not guaranteed. However, you can easily workaround this issue by removing PhpMyAdmin deployment before upgrading (the following example assumes that the release name is `phpmyadmin`):
|
||||
|
||||
```console
|
||||
$ export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default phpmyadmin-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 --decode)
|
||||
$ export MARIADB_PASSWORD=$(kubectl get secret --namespace default phpmyadmin-mariadb -o jsonpath="{.data.mariadb-password}" | base64 --decode)
|
||||
$ export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default phpmyadmin-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 -d)
|
||||
$ export MARIADB_PASSWORD=$(kubectl get secret --namespace default phpmyadmin-mariadb -o jsonpath="{.data.mariadb-password}" | base64 -d)
|
||||
$ kubectl delete deployments.apps phpmyadmin
|
||||
$ helm upgrade phpmyadmin bitnami/phpmyadmin --set mariadb.auth.rootPassword=$MARIADB_ROOT_PASSWORD,mariadb.auth.password=$MARIADB_PASSWORD
|
||||
```
|
||||
@@ -458,8 +458,8 @@ To upgrade to `7.0.0`, it should be done reusing the PVCs used to hold both the
|
||||
Obtain the credentials and the names of the PVCs used to hold both the MariaDB and phpMyAdmin data on your current release:
|
||||
|
||||
```console
|
||||
export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default phpmyadmin-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 --decode)
|
||||
export MARIADB_PASSWORD=$(kubectl get secret --namespace default phpmyadmin-mariadb -o jsonpath="{.data.mariadb-password}" | base64 --decode)
|
||||
export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default phpmyadmin-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 -d)
|
||||
export MARIADB_PASSWORD=$(kubectl get secret --namespace default phpmyadmin-mariadb -o jsonpath="{.data.mariadb-password}" | base64 -d)
|
||||
export MARIADB_PVC=$(kubectl get pvc -l app=mariadb,component=master,release=phpmyadmin -o jsonpath="{.items[0].metadata.name}")
|
||||
```
|
||||
|
||||
@@ -536,4 +536,4 @@ Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
limitations under the License.
|
||||
|
||||
@@ -45,7 +45,7 @@ For testing purposes, phpMyAdmin has been configured to point to a test MariaDB
|
||||
instance. Please login using the following credentials:
|
||||
|
||||
Username: root
|
||||
Password : $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "phpmyadmin.mariadb.fullname" . }} -o jsonpath="{.data.mariadb-root-password}" | base64 --decode)
|
||||
Password : $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "phpmyadmin.mariadb.fullname" . }} -o jsonpath="{.data.mariadb-root-password}" | base64 -d)
|
||||
|
||||
{{- else }}
|
||||
phpMyAdmin has not been configure to point to a specific database. Please provide the db host,
|
||||
|
||||
@@ -27,4 +27,4 @@ name: postgresql-ha
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-postgresql
|
||||
- https://www.postgresql.org/
|
||||
version: 9.0.13
|
||||
version: 9.0.14
|
||||
|
||||
@@ -38,11 +38,11 @@ Pgpool acts as a load balancer for PostgreSQL and forward read/write connections
|
||||
|
||||
To get the password for {{ (include "postgresql-ha.postgresqlUsername" .) | quote }} run:
|
||||
|
||||
export POSTGRES_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "postgresql-ha.postgresqlSecretName" . }} -o jsonpath="{.data.postgresql-password}" | base64 --decode)
|
||||
export POSTGRES_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "postgresql-ha.postgresqlSecretName" . }} -o jsonpath="{.data.postgresql-password}" | base64 -d)
|
||||
|
||||
To get the password for {{ (include "postgresql-ha.postgresqlRepmgrUsername" .) | quote }} run:
|
||||
|
||||
export REPMGR_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "postgresql-ha.postgresqlSecretName" . }} -o jsonpath="{.data.repmgr-password}" | base64 --decode)
|
||||
export REPMGR_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "postgresql-ha.postgresqlSecretName" . }} -o jsonpath="{.data.repmgr-password}" | base64 -d)
|
||||
|
||||
To connect to your database run the following command:
|
||||
|
||||
|
||||
@@ -26,4 +26,4 @@ name: postgresql
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-postgresql
|
||||
- https://www.postgresql.org/
|
||||
version: 11.5.1
|
||||
version: 11.5.2
|
||||
|
||||
@@ -39,17 +39,17 @@ PostgreSQL can be accessed via port {{ include "postgresql.service.port" . }} on
|
||||
|
||||
To get the password for "postgres" run:
|
||||
|
||||
export POSTGRES_ADMIN_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "postgresql.secretName" . }} -o jsonpath="{.data.postgres-password}" | base64 --decode)
|
||||
export POSTGRES_ADMIN_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "postgresql.secretName" . }} -o jsonpath="{.data.postgres-password}" | base64 -d)
|
||||
|
||||
To get the password for "{{ $customUser }}" run:
|
||||
|
||||
export POSTGRES_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "postgresql.secretName" . }} -o jsonpath="{.data.password}" | base64 --decode)
|
||||
export POSTGRES_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "postgresql.secretName" . }} -o jsonpath="{.data.password}" | base64 -d)
|
||||
|
||||
{{- else }}
|
||||
|
||||
To get the password for "{{ default "postgres" $customUser }}" run:
|
||||
|
||||
export POSTGRES_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "postgresql.secretName" . }} -o jsonpath="{.data.{{ ternary "password" "postgres-password" (and (not (empty $customUser)) (ne $customUser "postgres")) }}}" | base64 --decode)
|
||||
export POSTGRES_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "postgresql.secretName" . }} -o jsonpath="{.data.{{ ternary "password" "postgres-password" (and (not (empty $customUser)) (ne $customUser "postgres")) }}}" | base64 -d)
|
||||
|
||||
{{- end }}
|
||||
|
||||
|
||||
@@ -29,4 +29,4 @@ name: prestashop
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-prestashop
|
||||
- https://prestashop.com/
|
||||
version: 15.2.5
|
||||
version: 15.2.6
|
||||
|
||||
@@ -7,7 +7,7 @@ PrestaShop is a powerful open source eCommerce platform used by over 250,000 onl
|
||||
[Overview of PrestaShop](http://www.prestashop.com)
|
||||
|
||||
Trademarks: This software listing is packaged by Bitnami. The respective trademarks mentioned in the offering are owned by the respective companies, and use of them does not imply any affiliation or endorsement.
|
||||
|
||||
|
||||
## TL;DR
|
||||
|
||||
```console
|
||||
@@ -480,9 +480,9 @@ To upgrade to `11.0.0`, you have two alternatives:
|
||||
Obtain the credentials and the name of the PVC used to hold the MariaDB data on your current release:
|
||||
|
||||
```console
|
||||
export PRESTASHOP_PASSWORD=$(kubectl get secret --namespace default prestashop -o jsonpath="{.data.prestashop-password}" | base64 --decode)
|
||||
export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default prestashop-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 --decode)
|
||||
export MARIADB_PASSWORD=$(kubectl get secret --namespace default prestashop-mariadb -o jsonpath="{.data.mariadb-password}" | base64 --decode)
|
||||
export PRESTASHOP_PASSWORD=$(kubectl get secret --namespace default prestashop -o jsonpath="{.data.prestashop-password}" | base64 -d)
|
||||
export MARIADB_ROOT_PASSWORD=$(kubectl get secret --namespace default prestashop-mariadb -o jsonpath="{.data.mariadb-root-password}" | base64 -d)
|
||||
export MARIADB_PASSWORD=$(kubectl get secret --namespace default prestashop-mariadb -o jsonpath="{.data.mariadb-password}" | base64 -d)
|
||||
export MARIADB_PVC=$(kubectl get pvc -l app.kubernetes.io/instance=prestashop,app.kubernetes.io/name=mariadb,app.kubernetes.io/component=primary -o jsonpath="{.items[0].metadata.name}")
|
||||
```
|
||||
|
||||
@@ -556,4 +556,4 @@ Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
limitations under the License.
|
||||
|
||||
@@ -27,10 +27,10 @@ host. To configure PrestaShop with the URL of your service:
|
||||
Watch the status with: 'kubectl get svc --namespace {{ .Release.Namespace }} -w {{ include "common.names.fullname" . }}'
|
||||
|
||||
export APP_HOST=$(kubectl get svc --namespace {{ .Release.Namespace }} {{ include "common.names.fullname" . }} --template "{{ "{{ range (index .status.loadBalancer.ingress 0) }}{{ . }}{{ end }}" }}")
|
||||
export APP_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "prestashop.secretName" . }} -o jsonpath="{.data.prestashop-password}" | base64 --decode)
|
||||
export DATABASE_ROOT_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "prestashop.databaseSecretName" . }} -o jsonpath="{.data.mariadb-root-password}" | base64 --decode)
|
||||
export APP_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "prestashop.secretName" . }} -o jsonpath="{.data.prestashop-password}" | base64 -d)
|
||||
export DATABASE_ROOT_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "prestashop.databaseSecretName" . }} -o jsonpath="{.data.mariadb-root-password}" | base64 -d)
|
||||
{{- end }}
|
||||
export APP_DATABASE_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "prestashop.databaseSecretName" . }} -o jsonpath="{.data.{{- include "prestashop.databasePasswordKey" . -}}}" | base64 --decode)
|
||||
export APP_DATABASE_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "prestashop.databaseSecretName" . }} -o jsonpath="{.data.{{- include "prestashop.databasePasswordKey" . -}}}" | base64 -d)
|
||||
|
||||
2. Complete your PrestaShop deployment by running:
|
||||
|
||||
@@ -68,7 +68,7 @@ host. To configure PrestaShop with the URL of your service:
|
||||
|
||||
echo Admin Email : {{ .Values.prestashopEmail }}
|
||||
echo Admin Username: {{ .Values.prestashopUsername }}
|
||||
echo Admin Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "prestashop.secretName" . }} -o jsonpath="{.data.prestashop-password}" | base64 --decode)
|
||||
echo Admin Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "prestashop.secretName" . }} -o jsonpath="{.data.prestashop-password}" | base64 -d)
|
||||
{{- end }}
|
||||
|
||||
{{- else -}}
|
||||
@@ -93,7 +93,7 @@ host. To configure PrestaShop to use and external database host:
|
||||
|
||||
export APP_HOST=127.0.0.1
|
||||
{{- end }}
|
||||
export APP_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "prestashop.secretName" . }} -o jsonpath="{.data.prestashop-password}" | base64 --decode)
|
||||
export APP_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "prestashop.secretName" . }} -o jsonpath="{.data.prestashop-password}" | base64 -d)
|
||||
|
||||
## PLEASE UPDATE THE EXTERNAL DATABASE CONNECTION PARAMETERS IN THE FOLLOWING COMMAND AS NEEDED ##
|
||||
|
||||
|
||||
@@ -23,4 +23,4 @@ name: rabbitmq
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-rabbitmq
|
||||
- https://www.rabbitmq.com
|
||||
version: 10.1.0
|
||||
version: 10.1.1
|
||||
|
||||
@@ -31,9 +31,9 @@ Credentials:
|
||||
|
||||
{{- if not .Values.loadDefinition.enabled }}
|
||||
echo "Username : {{ .Values.auth.username }}"
|
||||
echo "Password : $(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "rabbitmq.secretPasswordName" . }} -o jsonpath="{.data.rabbitmq-password}" | base64 --decode)"
|
||||
echo "Password : $(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "rabbitmq.secretPasswordName" . }} -o jsonpath="{.data.rabbitmq-password}" | base64 -d)"
|
||||
{{- end }}
|
||||
echo "ErLang Cookie : $(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "rabbitmq.secretErlangName" . }} -o jsonpath="{.data.rabbitmq-erlang-cookie}" | base64 --decode)"
|
||||
echo "ErLang Cookie : $(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "rabbitmq.secretErlangName" . }} -o jsonpath="{.data.rabbitmq-erlang-cookie}" | base64 -d)"
|
||||
|
||||
Note that the credentials are saved in persistent volume claims and will not be changed upon upgrade or reinstallation unless the persistent volume claim has been deleted. If this is not the first installation of this chart, the credentials may not be valid.
|
||||
This is applicable when no passwords are set and therefore the random password is autogenerated. In case of using a fixed password, you should specify it when upgrading.
|
||||
|
||||
@@ -24,4 +24,4 @@ maintainers:
|
||||
name: redis
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-redis
|
||||
version: 16.10.0
|
||||
version: 16.10.1
|
||||
|
||||
@@ -82,7 +82,7 @@ Redis™ can be accessed via port {{ .Values.master.service.ports.redis }} o
|
||||
|
||||
To get your password run:
|
||||
|
||||
export REDIS_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "redis.secretName" . }} -o jsonpath="{.data.redis-password}" | base64 --decode)
|
||||
export REDIS_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "redis.secretName" . }} -o jsonpath="{.data.redis-password}" | base64 -d)
|
||||
|
||||
{{- end }}
|
||||
|
||||
|
||||
@@ -27,4 +27,4 @@ name: solr
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-solr
|
||||
- https://lucene.apache.org/solr/
|
||||
version: 5.1.0
|
||||
version: 5.1.1
|
||||
|
||||
@@ -28,7 +28,7 @@ Solr can be accessed via port {{ .Values.service.ports.http }} on the following
|
||||
To get the Solr credentials execute the following commands:
|
||||
|
||||
echo Username: {{ .Values.auth.adminUsername }}
|
||||
echo Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "solr.secretName" . }} -o jsonpath="{.data.solr-password}" | base64 --decode)
|
||||
echo Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ include "solr.secretName" . }} -o jsonpath="{.data.solr-password}" | base64 -d)
|
||||
|
||||
{{- end }}
|
||||
|
||||
|
||||
@@ -28,4 +28,4 @@ name: sonarqube
|
||||
sources:
|
||||
- https://github.com/bitnami/bitnami-docker-sonarqube
|
||||
- https://github.com/SonarSource/sonarqube
|
||||
version: 1.4.0
|
||||
version: 1.4.1
|
||||
|
||||
@@ -67,7 +67,7 @@ To access your SonarQube site from outside the cluster follow the steps below:
|
||||
3. Login with the following credentials below:
|
||||
|
||||
echo Username: {{ .Values.sonarqubeUsername }}
|
||||
echo Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "common.names.fullname" . }} -o jsonpath="{.data.sonarqube-password}" | base64 --decode)
|
||||
echo Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "common.names.fullname" . }} -o jsonpath="{.data.sonarqube-password}" | base64 -d)
|
||||
|
||||
{{- if .Values.metrics.jmx.enabled }}
|
||||
|
||||
|
||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user