@@ -21,7 +21,7 @@ Download a JSON key to use to authenticate your connection.
21211 . Use the information noted in the previous steps:
2222``` bash
2323export GOOGLE_APPLICATION_CREDENTIALS=/path/to/service/account/key.json
24- export CLOUD_SQL_CONNECTION_NAME =' <MY-PROJECT>:<INSTANCE-REGION>:<INSTANCE-NAME>'
24+ export INSTANCE_CONNECTION_NAME =' <MY-PROJECT>:<INSTANCE-REGION>:<INSTANCE-NAME>'
2525export DB_USER=' my-db-user'
2626export DB_PASS=' my-db-pass'
2727export DB_NAME=' my_db'
@@ -85,7 +85,7 @@ mvn clean package com.google.cloud.tools:jib-maven-plugin:2.8.0:build \
8585 --platform managed \
8686 --allow-unauthenticated \
8787 --region [REGION] \
88- --update-env-vars CLOUD_SQL_CONNECTION_NAME=[CLOUD_SQL_CONNECTION_NAME ] \
88+ --update-env-vars INSTANCE_CONNECTION_NAME=[INSTANCE_CONNECTION_NAME ] \
8989 --update-env-vars DB_USER=[MY_DB_USER] \
9090 --update-env-vars DB_PASS=[MY_DB_PASS] \
9191 --update-env-vars DB_NAME=[MY_DB]
@@ -103,14 +103,14 @@ mvn clean package com.google.cloud.tools:jib-maven-plugin:2.8.0:build \
103103 Create secrets via the command line:
104104 ``` sh
105105 echo -n " my-awesome-project:us-central1:my-cloud-sql-instance" | \
106- gcloud secrets versions add CLOUD_SQL_CONNECTION_NAME_SECRET --data-file=-
106+ gcloud secrets versions add INSTANCE_CONNECTION_NAME_SECRET --data-file=-
107107 ```
108108
109109 Deploy the service to Cloud Run specifying the env var name and secret name:
110110 ``` sh
111111 gcloud beta run deploy SERVICE --image gcr.io/[YOUR_PROJECT_ID]/run-sql \
112- --add-cloudsql-instances [CLOUD_SQL_CONNECTION_NAME ] \
113- --update-secrets CLOUD_SQL_CONNECTION_NAME=[CLOUD_SQL_CONNECTION_NAME_SECRET ]:latest,\
112+ --add-cloudsql-instances [INSTANCE_CONNECTION_NAME ] \
113+ --update-secrets INSTANCE_CONNECTION_NAME=[INSTANCE_CONNECTION_NAME_SECRET ]:latest,\
114114 DB_USER=[DB_USER_SECRET]:latest, \
115115 DB_PASS=[DB_PASS_SECRET]:latest, \
116116 DB_NAME=[DB_NAME_SECRET]:latest
0 commit comments