[bitnami/minio] Update README.md - auth.existingSecret error (#8072)

This commit is contained in:
Justin Güse
2021-11-10 10:20:02 +01:00
committed by GitHub
parent 73e7ab6d92
commit ac6addfc22
2 changed files with 29 additions and 29 deletions

View File

@@ -73,34 +73,34 @@ The command removes all the Kubernetes components associated with the chart and
### MinIO® parameters
| Name | Description | Value |
| -------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------ |
| `image.registry` | MinIO® image registry | `docker.io` |
| `image.repository` | MinIO® image repository | `bitnami/minio` |
| `image.tag` | MinIO® image tag (immutable tags are recommended) | `2021.11.9-debian-10-r0` |
| `image.pullPolicy` | Image pull policy | `IfNotPresent` |
| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
| `image.debug` | Specify if debug logs should be enabled | `false` |
| `clientImage.registry` | MinIO® Client image registry | `docker.io` |
| `clientImage.repository` | MinIO® Client image repository | `bitnami/minio-client` |
| `clientImage.tag` | MinIO® Client image tag (immutable tags are recommended) | `2021.11.5-debian-10-r3` |
| `mode` | MinIO® server mode (`standalone` or `distributed`) | `standalone` |
| `auth.rootUser` | MinIO® root username | `admin` |
| `auth.rootPassword` | Password for MinIO® root user | `""` |
| `auth.existingSecret` | Use existing secret for credentials details (`auth.rootUser` and `auth.rootPassword` will be ignored and picked up from this secret). The secret has to contain the keys `root-user` and `mariadb-root-password) | `""` |
| `auth.forcePassword` | Force users to specify required passwords | `false` |
| `auth.useCredentialsFiles` | Mount credentials as a files instead of using an environment variable | `false` |
| `auth.forceNewKeys` | Force root credentials (user and password) to be reconfigured every time they change in the secrets | `false` |
| `defaultBuckets` | Comma, semi-colon or space separated list of buckets to create at initialization (only in standalone mode) | `""` |
| `disableWebUI` | Disable MinIO® Web UI | `false` |
| `tls.enabled` | Enable tls in front of the container | `false` |
| `tls.existingSecret` | Name of an existing secret holding the certificate information | `""` |
| `tls.mountPath` | The mount path where the secret will be located | `""` |
| `extraEnvVars` | Extra environment variables to be set on MinIO® container | `{}` |
| `extraEnvVarsCM` | ConfigMap with extra environment variables | `""` |
| `extraEnvVarsSecret` | Secret with extra environment variables | `""` |
| `command` | Default container command (useful when using custom images). Use array form | `[]` |
| `args` | Default container args (useful when using custom images). Use array form | `[]` |
| Name | Description | Value |
| -------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------ |
| `image.registry` | MinIO® image registry | `docker.io` |
| `image.repository` | MinIO® image repository | `bitnami/minio` |
| `image.tag` | MinIO® image tag (immutable tags are recommended) | `2021.11.9-debian-10-r0` |
| `image.pullPolicy` | Image pull policy | `IfNotPresent` |
| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
| `image.debug` | Specify if debug logs should be enabled | `false` |
| `clientImage.registry` | MinIO® Client image registry | `docker.io` |
| `clientImage.repository` | MinIO® Client image repository | `bitnami/minio-client` |
| `clientImage.tag` | MinIO® Client image tag (immutable tags are recommended) | `2021.11.5-debian-10-r3` |
| `mode` | MinIO® server mode (`standalone` or `distributed`) | `standalone` |
| `auth.rootUser` | MinIO® root username | `admin` |
| `auth.rootPassword` | Password for MinIO® root user | `""` |
| `auth.existingSecret` | Use existing secret for credentials details (`auth.rootUser` and `auth.rootPassword` will be ignored and picked up from this secret). The secret has to contain the keys `root-user` and `root-password`) | `""` |
| `auth.forcePassword` | Force users to specify required passwords | `false` |
| `auth.useCredentialsFiles` | Mount credentials as a files instead of using an environment variable | `false` |
| `auth.forceNewKeys` | Force root credentials (user and password) to be reconfigured every time they change in the secrets | `false` |
| `defaultBuckets` | Comma, semi-colon or space separated list of buckets to create at initialization (only in standalone mode) | `""` |
| `disableWebUI` | Disable MinIO® Web UI | `false` |
| `tls.enabled` | Enable tls in front of the container | `false` |
| `tls.existingSecret` | Name of an existing secret holding the certificate information | `""` |
| `tls.mountPath` | The mount path where the secret will be located | `""` |
| `extraEnvVars` | Extra environment variables to be set on MinIO® container | `{}` |
| `extraEnvVarsCM` | ConfigMap with extra environment variables | `""` |
| `extraEnvVarsSecret` | Secret with extra environment variables | `""` |
| `command` | Default container command (useful when using custom images). Use array form | `[]` |
| `args` | Default container args (useful when using custom images). Use array form | `[]` |
### MinIO® deployment/statefulset parameters

View File

@@ -94,7 +94,7 @@ auth:
## @param auth.rootPassword Password for MinIO® root user
##
rootPassword: ""
## @param auth.existingSecret Use existing secret for credentials details (`auth.rootUser` and `auth.rootPassword` will be ignored and picked up from this secret). The secret has to contain the keys `root-user` and `mariadb-root-password)
## @param auth.existingSecret Use existing secret for credentials details (`auth.rootUser` and `auth.rootPassword` will be ignored and picked up from this secret). The secret has to contain the keys `root-user` and `root-password`)
##
existingSecret: ""
## @param auth.forcePassword Force users to specify required passwords