Skip to content

Commit

Permalink
Merge pull request #224 from gouglhupf/fix-echo-examples
Browse files Browse the repository at this point in the history
Fix echo/base64 examples commands
  • Loading branch information
tdmanv authored Aug 22, 2019
2 parents 1ab04d6 + 3d33064 commit b88d1b9
Show file tree
Hide file tree
Showing 7 changed files with 8 additions and 8 deletions.
2 changes: 1 addition & 1 deletion docs/tutorial.rst
Original file line number Diff line number Diff line change
Expand Up @@ -296,7 +296,7 @@ Base64 credentials and put them below.

.. code-block:: bash
echo "YOUR_KEY" | base64
echo -n "YOUR_KEY" | base64
.. code-block:: yaml
Expand Down
2 changes: 1 addition & 1 deletion examples/mongo-sidecar/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,7 @@ Next create a Blueprint which describes how backup and restore actions can be ex
```bash
# Get base64 encoded aws keys
$ echo "YOUR_KEY" | base64
$ echo -n "YOUR_KEY" | base64
# Create the ConfigMap with an S3 path
$ kubectl apply -f ./examples/mongo-sidecar/s3-location-configmap.yaml
Expand Down
2 changes: 1 addition & 1 deletion examples/mongo-sidecar/secrets.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ metadata:
namespace: kanister
type: Opaque
# Note: the aws keys below must be base64 encoded:
# echo "YOUR_KEY" | base64
# echo -n "YOUR_KEY" | base64
data:
aws_access_key_id: XXXX
aws_secret_access_key: XXXX
Expand Down
4 changes: 2 additions & 2 deletions examples/postgres-basic-pgdump/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -30,8 +30,8 @@ You should also update secrets.yaml to contain the necessary AWS credentials to

```bash
# Get base64 encoded aws keys
$ echo ${AWS_ACCESS_KEY_ID} | base64
$ echo ${AWS_SECRET_ACCESS_KEY} | base64
$ echo -n ${AWS_ACCESS_KEY_ID} | base64
$ echo -n ${AWS_SECRET_ACCESS_KEY} | base64

# Edit the secret spec and add the base64 encoded AWS keys
$ vim secrets.yaml
Expand Down
2 changes: 1 addition & 1 deletion examples/postgres-basic-pgdump/secrets.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ metadata:
name: aws-creds
type: Opaque
# Note: the aws keys below must be base64 encoded:
# echo "YOUR_KEY" | base64
# echo -n "YOUR_KEY" | base64
data:
aws_access_key_id: XXXX
aws_secret_access_key: XXXX
2 changes: 1 addition & 1 deletion examples/time-log/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ Next create a Blueprint which describes how backup and restore actions can be ex

```bash
# Get base64 encoded aws keys
$ echo "YOUR_KEY" | base64
$ echo -n "YOUR_KEY" | base64

# Create secrets containing the necessary AWS credentials
$ kubectl apply -f examples/time-log/secrets.yaml
Expand Down
2 changes: 1 addition & 1 deletion examples/time-log/secrets.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ metadata:
namespace: kanister
type: Opaque
# Note: the aws keys below must be base64 encoded:
# echo "YOUR_KEY" | base64
# echo -n "YOUR_KEY" | base64
data:
aws_access_key_id: XXXX
aws_secret_access_key: XXXX
Expand Down

0 comments on commit b88d1b9

Please sign in to comment.