[bitnami/mariadb] Release 10.4.29-debian-11-r0 (#33385)

Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com>
This commit is contained in:
Bitnami Bot 2023-05-10 23:39:58 +01:00 committed by GitHub
parent c19054bfb5
commit 806eae7ee1
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
4 changed files with 8 additions and 8 deletions

View File

@ -3,13 +3,13 @@ FROM docker.io/bitnami/minideb:bullseye
ARG TARGETARCH
LABEL org.opencontainers.image.base.name="docker.io/bitnami/minideb:bullseye" \
org.opencontainers.image.created="2023-05-09T08:43:00Z" \
org.opencontainers.image.created="2023-05-10T22:15:06Z" \
org.opencontainers.image.description="Application packaged by VMware, Inc" \
org.opencontainers.image.licenses="Apache-2.0" \
org.opencontainers.image.ref.name="10.4.28-debian-11-r27" \
org.opencontainers.image.ref.name="10.4.29-debian-11-r0" \
org.opencontainers.image.title="mariadb" \
org.opencontainers.image.vendor="VMware, Inc." \
org.opencontainers.image.version="10.4.28"
org.opencontainers.image.version="10.4.29"
ENV HOME="/" \
OS_ARCH="${TARGETARCH:-amd64}" \
@ -23,7 +23,7 @@ RUN install_packages ca-certificates curl libaio1 libaudit1 libcap-ng0 libcrypt1
RUN mkdir -p /tmp/bitnami/pkg/cache/ && cd /tmp/bitnami/pkg/cache/ && \
COMPONENTS=( \
"ini-file-1.4.5-5-linux-${OS_ARCH}-debian-11" \
"mariadb-10.4.28-4-linux-${OS_ARCH}-debian-11" \
"mariadb-10.4.29-0-linux-${OS_ARCH}-debian-11" \
) && \
for COMPONENT in "${COMPONENTS[@]}"; do \
if [ ! -f "${COMPONENT}.tar.gz" ]; then \
@ -42,7 +42,7 @@ RUN mkdir /docker-entrypoint-initdb.d
COPY rootfs /
RUN /opt/bitnami/scripts/mariadb/postunpack.sh
ENV APP_VERSION="10.4.28" \
ENV APP_VERSION="10.4.29" \
BITNAMI_APP_NAME="mariadb" \
PATH="/opt/bitnami/common/bin:/opt/bitnami/common/sbin:/opt/bitnami/mariadb/bin:/opt/bitnami/mariadb/sbin:$PATH"

View File

@ -9,6 +9,6 @@
"arch": "amd64",
"distro": "debian-11",
"type": "NAMI",
"version": "10.4.28-4"
"version": "10.4.29-0"
}
}

View File

@ -421,7 +421,7 @@ generate_random_string() {
alphanumeric+special|special+alphanumeric)
# Limit variety of special characters, so there is a higher chance of containing more alphanumeric characters
# Special characters are harder to write, and it could impact the overall UX if most passwords are too complex
filter='a-zA-Z0-9!@#$%^'
filter='a-zA-Z0-9:@.,/+!='
;;
*)
echo "Invalid type ${type}" >&2

View File

@ -1,4 +1,4 @@
rolling-tags:
- "10.4"
- 10.4-debian-11
- 10.4.28
- 10.4.29