Skip to content

Commit 4be69c9

Browse files
committed
Merge remote-tracking branch 'origin/candidate-9.12.x' into candidate-9.14.x
Signed-off-by: Gavin Halliday <gavin.halliday@lexisnexis.com> # Conflicts: # helm/hpcc/Chart.yaml # helm/hpcc/templates/_helpers.tpl # version.cmake
2 parents cbd0a68 + aa37782 commit 4be69c9

File tree

4 files changed

+546
-93
lines changed

4 files changed

+546
-93
lines changed

docs/EN_US/ContainerizedHPCC/ContainerizedMods/CustomConfig.xml

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1478,6 +1478,30 @@ thor: []
14781478
credentials.</para>
14791479
</sect3>
14801480

1481+
<sect3 id="Deploying_AkeylessVault">
1482+
<title>Deploy the Akeyless Vaultless Platform</title>
1483+
1484+
<para>To use Akeyless, set the vault type to <emphasis>akeyless</emphasis>
1485+
and the kind to <emphasis>akeyless</emphasis>. The URL should point to
1486+
the Akeyless API endpoint or your gateway. Provide an access ID and
1487+
access key, typically from environment variables or a secure secret.
1488+
A token can also be supplied via the client-secret if desired.</para>
1489+
1490+
<programlisting lang="YAML"> vaults:
1491+
authn:
1492+
- name: my-authn-akeyless
1493+
type: akeyless
1494+
kind: akeyless
1495+
url: https://api.akeyless.io
1496+
accessId: ${env.AKEYLESS_ACCESS_ID}
1497+
accessKey: ${env.AKEYLESS_ACCESS_KEY}
1498+
</programlisting>
1499+
1500+
<para>The secret name referenced by HPCC (for example, in LDAP settings)
1501+
is passed to Akeyless as the secret name in the get-secret-value API.
1502+
If a version is provided, it will be used when retrieving the secret.</para>
1503+
</sect3>
1504+
14811505
<sect3 id="REF_HASHICORPVault_LDAP">
14821506
<title>Referencing Vault Stored Authentication</title>
14831507

helm/hpcc/templates/_helpers.tpl

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -718,6 +718,9 @@ vaults:
718718
{{- range $vault := . }}
719719
- name: {{ $vault.name }}
720720
kind: {{ $vault.kind }}
721+
{{- if $vault.type }}
722+
type: {{ $vault.type }}
723+
{{- end }}
721724
{{- if $vault.namespace }}
722725
namespace: {{ $vault.namespace }}
723726
{{- end }}
@@ -734,6 +737,15 @@ vaults:
734737
{{- if index $vault "appRoleSecret" }}
735738
appRoleSecret: {{ index $vault "appRoleSecret" }}
736739
{{- end -}}
740+
{{- if index $vault "accessId" }}
741+
accessId: {{ index $vault "accessId" }}
742+
{{- end -}}
743+
{{- if index $vault "accessKey" }}
744+
accessKey: {{ index $vault "accessKey" }}
745+
{{- end }}
746+
{{- if index $vault "accessType" }}
747+
accessType: {{ index $vault "accessType" }}
748+
{{- end -}}
737749
{{- if $vaultClientIssuerEnabled }}
738750
{{- if not (index $vault "client-secret") }}
739751
{{- if not (index $vault "appRoleId") }}

helm/hpcc/values.schema.json

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1022,6 +1022,19 @@
10221022
"type": "string",
10231023
"enum": ["kv-v2", "kv-v1"]
10241024
},
1025+
"type": {
1026+
"description": "The vault provider type (e.g. 'akeyless' or kv backend)",
1027+
"type": "string",
1028+
"enum": ["kv-v2", "kv-v1", "akeyless"]
1029+
},
1030+
"accessId": {
1031+
"description": "Access ID used by Akeyless-style vaults",
1032+
"type": "string"
1033+
},
1034+
"accessKey": {
1035+
"description": "Access Key used by Akeyless-style vaults",
1036+
"type": "string"
1037+
},
10251038
"client-secret": {
10261039
"description": "optional name of kubernetes secret that will provide the vault client token",
10271040
"type": "string"

0 commit comments

Comments
 (0)