Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ISD-2543 - Update README #246

Merged
merged 9 commits into from
Dec 4, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
15 changes: 12 additions & 3 deletions .trivyignore
Original file line number Diff line number Diff line change
@@ -1,8 +1,17 @@
# openstack-objectstorage-k8s (https://git.launchpad.net/~canonical-sysadmins/wordpress/+git/openstack-objectstorage-k8s)
CVE-2022-24775

Check notice on line 1 in .trivyignore

View workflow job for this annotation

GitHub Actions / Integration Test on Juju3 / Scan Image (ghcr.io-canonical-wordpress-fa0b4b4d3c843bd085465e78fd3b54586e98975b-_1.0_amd64.tar)

CVE-2022-24775 not present anymore, can be safely removed.

Check notice on line 1 in .trivyignore

View workflow job for this annotation

GitHub Actions / Integration Test / Scan Image (ghcr.io-canonical-wordpress-fa0b4b4d3c843bd085465e78fd3b54586e98975b-_1.0_amd64.tar)

CVE-2022-24775 not present anymore, can be safely removed.
swetha1654 marked this conversation as resolved.
Show resolved Hide resolved
CVE-2022-29248

Check notice on line 2 in .trivyignore

View workflow job for this annotation

GitHub Actions / Integration Test on Juju3 / Scan Image (ghcr.io-canonical-wordpress-fa0b4b4d3c843bd085465e78fd3b54586e98975b-_1.0_amd64.tar)

CVE-2022-29248 not present anymore, can be safely removed.

Check notice on line 2 in .trivyignore

View workflow job for this annotation

GitHub Actions / Integration Test / Scan Image (ghcr.io-canonical-wordpress-fa0b4b4d3c843bd085465e78fd3b54586e98975b-_1.0_amd64.tar)

CVE-2022-29248 not present anymore, can be safely removed.
CVE-2022-31042
CVE-2022-31042

Check notice on line 3 in .trivyignore

View workflow job for this annotation

GitHub Actions / Integration Test on Juju3 / Scan Image (ghcr.io-canonical-wordpress-fa0b4b4d3c843bd085465e78fd3b54586e98975b-_1.0_amd64.tar)

CVE-2022-31042 not present anymore, can be safely removed.

Check notice on line 3 in .trivyignore

View workflow job for this annotation

GitHub Actions / Integration Test / Scan Image (ghcr.io-canonical-wordpress-fa0b4b4d3c843bd085465e78fd3b54586e98975b-_1.0_amd64.tar)

CVE-2022-31042 not present anymore, can be safely removed.
swetha1654 marked this conversation as resolved.
Show resolved Hide resolved
CVE-2022-31043

Check notice on line 4 in .trivyignore

View workflow job for this annotation

GitHub Actions / Integration Test on Juju3 / Scan Image (ghcr.io-canonical-wordpress-fa0b4b4d3c843bd085465e78fd3b54586e98975b-_1.0_amd64.tar)

CVE-2022-31043 not present anymore, can be safely removed.

Check notice on line 4 in .trivyignore

View workflow job for this annotation

GitHub Actions / Integration Test / Scan Image (ghcr.io-canonical-wordpress-fa0b4b4d3c843bd085465e78fd3b54586e98975b-_1.0_amd64.tar)

CVE-2022-31043 not present anymore, can be safely removed.
CVE-2022-31090

Check notice on line 5 in .trivyignore

View workflow job for this annotation

GitHub Actions / Integration Test on Juju3 / Scan Image (ghcr.io-canonical-wordpress-fa0b4b4d3c843bd085465e78fd3b54586e98975b-_1.0_amd64.tar)

CVE-2022-31090 not present anymore, can be safely removed.

Check notice on line 5 in .trivyignore

View workflow job for this annotation

GitHub Actions / Integration Test / Scan Image (ghcr.io-canonical-wordpress-fa0b4b4d3c843bd085465e78fd3b54586e98975b-_1.0_amd64.tar)

CVE-2022-31090 not present anymore, can be safely removed.
CVE-2022-31091

Check notice on line 6 in .trivyignore

View workflow job for this annotation

GitHub Actions / Integration Test on Juju3 / Scan Image (ghcr.io-canonical-wordpress-fa0b4b4d3c843bd085465e78fd3b54586e98975b-_1.0_amd64.tar)

CVE-2022-31091 not present anymore, can be safely removed.

Check notice on line 6 in .trivyignore

View workflow job for this annotation

GitHub Actions / Integration Test / Scan Image (ghcr.io-canonical-wordpress-fa0b4b4d3c843bd085465e78fd3b54586e98975b-_1.0_amd64.tar)

CVE-2022-31091 not present anymore, can be safely removed.
CVE-2022-24775
CVE-2023-24539

Check notice on line 7 in .trivyignore

View workflow job for this annotation

GitHub Actions / Integration Test on Juju3 / Scan Image (ghcr.io-canonical-wordpress-fa0b4b4d3c843bd085465e78fd3b54586e98975b-_1.0_amd64.tar)

CVE-2023-24539 not present anymore, can be safely removed.

Check notice on line 7 in .trivyignore

View workflow job for this annotation

GitHub Actions / Integration Test / Scan Image (ghcr.io-canonical-wordpress-fa0b4b4d3c843bd085465e78fd3b54586e98975b-_1.0_amd64.tar)

CVE-2023-24539 not present anymore, can be safely removed.
CVE-2023-24540

Check notice on line 8 in .trivyignore

View workflow job for this annotation

GitHub Actions / Integration Test on Juju3 / Scan Image (ghcr.io-canonical-wordpress-fa0b4b4d3c843bd085465e78fd3b54586e98975b-_1.0_amd64.tar)

CVE-2023-24540 not present anymore, can be safely removed.

Check notice on line 8 in .trivyignore

View workflow job for this annotation

GitHub Actions / Integration Test / Scan Image (ghcr.io-canonical-wordpress-fa0b4b4d3c843bd085465e78fd3b54586e98975b-_1.0_amd64.tar)

CVE-2023-24540 not present anymore, can be safely removed.
CVE-2023-29197

Check notice on line 9 in .trivyignore

View workflow job for this annotation

GitHub Actions / Integration Test on Juju3 / Scan Image (ghcr.io-canonical-wordpress-fa0b4b4d3c843bd085465e78fd3b54586e98975b-_1.0_amd64.tar)

CVE-2023-29197 not present anymore, can be safely removed.

Check notice on line 9 in .trivyignore

View workflow job for this annotation

GitHub Actions / Integration Test / Scan Image (ghcr.io-canonical-wordpress-fa0b4b4d3c843bd085465e78fd3b54586e98975b-_1.0_amd64.tar)

CVE-2023-29197 not present anymore, can be safely removed.
CVE-2023-29400

Check notice on line 10 in .trivyignore

View workflow job for this annotation

GitHub Actions / Integration Test on Juju3 / Scan Image (ghcr.io-canonical-wordpress-fa0b4b4d3c843bd085465e78fd3b54586e98975b-_1.0_amd64.tar)

CVE-2023-29400 not present anymore, can be safely removed.

Check notice on line 10 in .trivyignore

View workflow job for this annotation

GitHub Actions / Integration Test / Scan Image (ghcr.io-canonical-wordpress-fa0b4b4d3c843bd085465e78fd3b54586e98975b-_1.0_amd64.tar)

CVE-2023-29400 not present anymore, can be safely removed.
CVE-2023-29403
CVE-2023-39325
CVE-2023-45283
CVE-2023-45287
CVE-2023-45288
CVE-2024-24790
CVE-2024-34156
44 changes: 38 additions & 6 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@

A [Juju](https://juju.is/) [charm](https://juju.is/docs/olm/charmed-operators) deploying and managing WordPress on Kubernetes. [WordPress](https://wordpress.com) is the world's most popular website builder, and it's free and open-source.

This charm simplifies initial deployment and "day N" operations of WordPress on Kubernetes,
This charm simplifies the deployment and operations of WordPress on Kubernetes,
including scaling the number of instances, integration with SSO,
access to OpenStack Swift object storage for redundant file storage and more.
It allows for deployment on many different Kubernetes platforms,
Expand All @@ -21,14 +21,46 @@ For DevOps or SRE teams this charm will make operating WordPress simple and stra
It will allow easy deployment into multiple environments for testing of changes,
and supports scaling out for enterprise deployments.

For information about how to deploy, integrate, and manage this charm, see the Official [wordpress-k8s-operator Documentation](https://charmhub.io/wordpress-k8s/docs).

## Get Started

To begin, refer to the [Getting Started](https://charmhub.io/wordpress-k8s/docs/tutorial) tutorial for step-by-step instructions.

### Basic Operations

The following actions are available for the charm:
- get-initial-password
- rotate-wordpress-secrets

You can find more information about supported actions in [the Charmhub documentation](https://charmhub.io/wordpress-k8s/actions).

## Integrations

Deployment of WordPress requires a relational database. The integration with the mysql interface is required by the wordpress-k8s charm for which `mysql-k8s` charm can be deployed as follows:

```
juju deploy mysql-k8s --trust
# 'database' interface is required since mysql-k8s charm provides multiple compatible interfaces
juju integrate wordpress-k8s mysql-k8s:database
```

Apart from this required integration, the charm can be integrated with other Juju charms and services as well. You can find the full list of integrations in [the Charmhub documentation](https://charmhub.io/wordpress-k8s/integrations).

## Learn more

- [Read more](https://charmhub.io/wordpress-k8s/docs)
- [Developer documentation](https://codex.wordpress.org/Developer_Documentation)
- [Official webpage](https://wordpress.com)
- [Troubleshooting](https://matrix.to/#/#charmhub-charmdev:ubuntu.com)

swetha1654 marked this conversation as resolved.
Show resolved Hide resolved
## Project and community

The WordPress Operator is a member of the Ubuntu family.
It's an open source project that warmly welcomes community projects, contributions, suggestions, fixes and constructive feedback.

* [Code of conduct](https://ubuntu.com/community/code-of-conduct)
* [Get support](https://discourse.charmhub.io/)
* [Join our online chat](https://chat.charmhub.io/charmhub/channels/charm-dev)
* [Contribute](https://charmhub.io/wordpress-k8s/docs/contributing-hacking)
- [Code of conduct](https://ubuntu.com/community/code-of-conduct)
- [Get support](https://discourse.charmhub.io/)
- [Contribute](https://charmhub.io/wordpress-k8s/docs/how-to-contribute)
- [Matrix](https://matrix.to/#/#charmhub-charmdev:ubuntu.com)

Thinking about using the WordPress Operator for your next project? [Get in touch](https://chat.charmhub.io/charmhub/channels/charm-dev)!
1 change: 1 addition & 0 deletions tox.ini
Original file line number Diff line number Diff line change
Expand Up @@ -110,6 +110,7 @@ commands =
[testenv:integration]
description = Run integration tests
deps =
websockets<14.0
-r{toxinidir}/requirements.txt
-r{toxinidir}/tests/integration/requirements.txt
commands =
Expand Down
Loading