Skip to content

Commit 22bc280

Browse files
committed
Merge remote-tracking branch 'origin/candidate-9.14.x' into candidate-10.0.x
Signed-off-by: Gavin Halliday <gavin.halliday@lexisnexis.com> # Conflicts: # helm/hpcc/Chart.yaml # helm/hpcc/templates/_helpers.tpl # version.cmake
2 parents 1d50fae + 4be69c9 commit 22bc280

File tree

4 files changed

+546
-93
lines changed

4 files changed

+546
-93
lines changed

docs/EN_US/ContainerizedHPCC/ContainerizedMods/CustomConfig.xml

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1478,6 +1478,30 @@ thor: []
14781478
credentials.</para>
14791479
</sect3>
14801480

1481+
<sect3 id="Deploying_AkeylessVault">
1482+
<title>Deploy the Akeyless Vaultless Platform</title>
1483+
1484+
<para>To use Akeyless, set the vault type to <emphasis>akeyless</emphasis>
1485+
and the kind to <emphasis>akeyless</emphasis>. The URL should point to
1486+
the Akeyless API endpoint or your gateway. Provide an access ID and
1487+
access key, typically from environment variables or a secure secret.
1488+
A token can also be supplied via the client-secret if desired.</para>
1489+
1490+
<programlisting lang="YAML"> vaults:
1491+
authn:
1492+
- name: my-authn-akeyless
1493+
type: akeyless
1494+
kind: akeyless
1495+
url: https://api.akeyless.io
1496+
accessId: ${env.AKEYLESS_ACCESS_ID}
1497+
accessKey: ${env.AKEYLESS_ACCESS_KEY}
1498+
</programlisting>
1499+
1500+
<para>The secret name referenced by HPCC (for example, in LDAP settings)
1501+
is passed to Akeyless as the secret name in the get-secret-value API.
1502+
If a version is provided, it will be used when retrieving the secret.</para>
1503+
</sect3>
1504+
14811505
<sect3 id="REF_HASHICORPVault_LDAP">
14821506
<title>Referencing Vault Stored Authentication</title>
14831507

helm/hpcc/templates/_helpers.tpl

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -781,6 +781,9 @@ vaults:
781781
{{- range $vault := . }}
782782
- name: {{ $vault.name }}
783783
kind: {{ $vault.kind }}
784+
{{- if $vault.type }}
785+
type: {{ $vault.type }}
786+
{{- end }}
784787
{{- if $vault.namespace }}
785788
namespace: {{ $vault.namespace }}
786789
{{- end }}
@@ -797,6 +800,15 @@ vaults:
797800
{{- if index $vault "appRoleSecret" }}
798801
appRoleSecret: {{ index $vault "appRoleSecret" }}
799802
{{- end -}}
803+
{{- if index $vault "accessId" }}
804+
accessId: {{ index $vault "accessId" }}
805+
{{- end -}}
806+
{{- if index $vault "accessKey" }}
807+
accessKey: {{ index $vault "accessKey" }}
808+
{{- end }}
809+
{{- if index $vault "accessType" }}
810+
accessType: {{ index $vault "accessType" }}
811+
{{- end -}}
800812
{{- if $vaultClientIssuerEnabled }}
801813
{{- if not (index $vault "client-secret") }}
802814
{{- if not (index $vault "appRoleId") }}

helm/hpcc/values.schema.json

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1041,6 +1041,19 @@
10411041
"type": "string",
10421042
"enum": ["kv-v2", "kv-v1"]
10431043
},
1044+
"type": {
1045+
"description": "The vault provider type (e.g. 'akeyless' or kv backend)",
1046+
"type": "string",
1047+
"enum": ["kv-v2", "kv-v1", "akeyless"]
1048+
},
1049+
"accessId": {
1050+
"description": "Access ID used by Akeyless-style vaults",
1051+
"type": "string"
1052+
},
1053+
"accessKey": {
1054+
"description": "Access Key used by Akeyless-style vaults",
1055+
"type": "string"
1056+
},
10441057
"client-secret": {
10451058
"description": "optional name of kubernetes secret that will provide the vault client token",
10461059
"type": "string"

0 commit comments

Comments
 (0)