Skip to content

Commit

Permalink
Merge pull request #273 from hollaex/testnet
Browse files Browse the repository at this point in the history
HollaEx CLI v2.6.1 Release
  • Loading branch information
kycfeel authored Apr 21, 2023
2 parents 2d6dcbf + 8876efc commit 0aeb0bd
Show file tree
Hide file tree
Showing 4 changed files with 41 additions and 4 deletions.
26 changes: 24 additions & 2 deletions hollaex
Original file line number Diff line number Diff line change
Expand Up @@ -2983,6 +2983,28 @@ elif [[ "$1" == "pull" ]]; then
fi

fi

# Avoid running cloud exchange as DIY
if [[ "$HOLLAEX_IS_SETUP" ]]; then

export VERIFICATION_STATUS_CHECK=$(curl -s -H "Content-Type: application/json" -H "Authorization: Bearer $BITHOLLA_ACCOUNT_TOKEN" -w "=%{http_code}" \
--request POST \
-d '{"activation_code": "'$HOLLAEX_SECRET_ACTIVATION_CODE'"}' \
$hollaexAPIURL/v2/exchange/activate)

VERIFICATION_STATUS_CHECK_RESPOND=$(echo $VERIFICATION_STATUS_CHECK | cut -f1 -d "=")
VERIFICATION_STATUS_CHECK_RESPOND_HTTP_CODE=$(echo $VERIFICATION_STATUS_CHECK | cut -f2 -d "=")

if [[ ! "$VERIFICATION_STATUS_CHECK_RESPOND_HTTP_CODE" == "200" ]]; then

printf "\n\033[91mError: Exchange owner is not verified yet!\033[39m\n"
printf "Please visit https://dash.hollaex.com/verifyAgree and verify your account first.\n\n"

exit 1;

fi

fi

# Avoid running multiple setup
if [[ "$HOLLAEX_IS_SETUP" ]] && [[ ! "$HOLLAEX_SETUP_FORCE" ]]; then
Expand Down Expand Up @@ -6007,7 +6029,7 @@ elif [[ "$1" == "web" ]]; then


# Create docker registry secret on Kubernetes.
if ! command kubectl get secret docker-registry-secret --namespace $ENVIRONMENT_EXCHANGE_NAME > /dev/null && [[ ! "$ENVIRONMENT_USER_HOLLAEX_CORE_IMAGE_REGISTRY" == "hollaex/hollaex-kit" ]]; then
if ! command kubectl get secret docker-registry-secret --namespace $ENVIRONMENT_EXCHANGE_NAME > /dev/null && [[ ! "$ENVIRONMENT_USER_HOLLAEX_WEB_IMAGE_REGISTRY" == "hollaex/hollaex-kit" ]]; then

create_kubernetes_docker_registry_secret;

Expand Down Expand Up @@ -8989,7 +9011,7 @@ elif [[ "$1" == "logs" ]]; then

function hollaex_log_target_whitelist() {

local whitelist=("api" "stream" "db" "redis")
local whitelist=("api" "stream" "db" "redis" "plugins")

if ! command printf '%s\n' ${whitelist[@]} | grep $HOLLAEX_LOGS_TARGET > /dev/null; then

Expand Down
2 changes: 1 addition & 1 deletion kubernetes/helm-chart/bitholla-hollaex-server/Chart.yaml
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
apiVersion: v1
description: A Helm chart for HollaEx Kit
name: hollaex-kit
version: 2.5.3
version: 2.6.1
15 changes: 15 additions & 0 deletions tools_generator.sh
Original file line number Diff line number Diff line change
Expand Up @@ -1586,6 +1586,8 @@ metadata:
internal;
return 503;
}
real_ip_header X-Forwarded-For;
nginx.ingress.kubernetes.io/configuration-snippet: |
$(if [[ "$ENVIRONMENT_KUBERNETES_INGRESS_OPTIMIZED_RATE_LIMIT" ]]; then echo 'limit_req zone=api burst=10 nodelay;
limit_req_log_level notice;
Expand Down Expand Up @@ -1623,6 +1625,8 @@ metadata:
internal;
return 503;
}
real_ip_header X-Forwarded-For;
nginx.ingress.kubernetes.io/configuration-snippet: |
#error_page 403 @maintenance_503;
Expand Down Expand Up @@ -1655,6 +1659,8 @@ metadata:
internal;
return 503;
}
real_ip_header X-Forwarded-For;
nginx.ingress.kubernetes.io/proxy-body-size: "6m"
nginx.ingress.kubernetes.io/configuration-snippet: |
#error_page 403 @maintenance_503;
Expand Down Expand Up @@ -1689,6 +1695,8 @@ metadata:
internal;
return 503;
}
real_ip_header X-Forwarded-For;
nginx.ingress.kubernetes.io/proxy-body-size: "6m"
nginx.ingress.kubernetes.io/configuration-snippet: |
#error_page 403 @maintenance_503;
Expand Down Expand Up @@ -1726,6 +1734,8 @@ metadata:
internal;
return 503;
}
real_ip_header X-Forwarded-For;
nginx.ingress.kubernetes.io/proxy-body-size: "6m"
nginx.org/websocket-services: "${ENVIRONMENT_EXCHANGE_NAME}-server-stream"
nginx.ingress.kubernetes.io/upstream-hash-by: "\$binary_remote_addr"
Expand Down Expand Up @@ -1776,6 +1786,7 @@ metadata:
internal;
return 503;
}
real_ip_header X-Forwarded-For;
nginx.ingress.kubernetes.io/proxy-body-size: "6m"
spec:
rules:
Expand Down Expand Up @@ -1822,6 +1833,7 @@ metadata:
internal;
return 503;
}
real_ip_header X-Forwarded-For;
nginx.ingress.kubernetes.io/configuration-snippet: |
$(if [[ "$ENVIRONMENT_KUBERNETES_INGRESS_OPTIMIZED_RATE_LIMIT" ]]; then echo 'limit_req zone=api burst=10 nodelay;
limit_req_log_level notice;
Expand Down Expand Up @@ -1858,6 +1870,7 @@ metadata:
internal;
return 503;
}
real_ip_header X-Forwarded-For;
nginx.ingress.kubernetes.io/proxy-body-size: "6m"
nginx.ingress.kubernetes.io/rewrite-target: /plugins/\$2
nginx.ingress.kubernetes.io/configuration-snippet: |
Expand Down Expand Up @@ -1893,6 +1906,7 @@ metadata:
internal;
return 503;
}
real_ip_header X-Forwarded-For;
nginx.ingress.kubernetes.io/proxy-body-size: "6m"
nginx.ingress.kubernetes.io/rewrite-target: /plugins/sms/verify/\$2
nginx.ingress.kubernetes.io/configuration-snippet: |
Expand Down Expand Up @@ -1931,6 +1945,7 @@ metadata:
internal;
return 503;
}
real_ip_header X-Forwarded-For;
nginx.ingress.kubernetes.io/proxy-body-size: "6m"
nginx.org/websocket-services: "${ENVIRONMENT_EXCHANGE_NAME}-server-stream"
nginx.ingress.kubernetes.io/upstream-hash-by: "\$binary_remote_addr"
Expand Down
2 changes: 1 addition & 1 deletion version
Original file line number Diff line number Diff line change
@@ -1 +1 @@
2.6.0
2.6.1

0 comments on commit 0aeb0bd

Please sign in to comment.