Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion charts/akeyless-gateway/Chart.yaml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
apiVersion: v2
name: akeyless-gateway
version: 1.18.0
version: 1.18.1
description: A Helm chart for Kubernetes that deploys akeyless-gateway
type: application
keywords:
Expand Down
2 changes: 1 addition & 1 deletion charts/akeyless-gateway/templates/_helpers.tpl
Original file line number Diff line number Diff line change
Expand Up @@ -268,7 +268,7 @@ component: cache
{{- end -}}

{{- define "akeyless-gateway.enableScaleOutOnDisconnectedMode" -}}
{{- if eq (.Values.globalConfig.clusterCache.enableScaleOutOnDisconnectedMode | default false) true -}}
{{- if eq (.Values.globalConfig.clusterCache.enableScaleOutOnDisconnectedMode) true -}}
true
{{- else -}}
false
Expand Down
3 changes: 1 addition & 2 deletions charts/akeyless-gateway/templates/secrets.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -82,13 +82,12 @@ data:
{{ $caCertFile }}: {{ get $tlsExistingSecret $caCertFile | default ($ca.Cert | b64enc) }}
{{- end }}

---
{{- if and
(eq "true" (include "akeyless-gateway.clusterCache.enabled" .))
(ne "true" (include "akeyless-gateway.useEncryptionKeyExistingSecret" .))
(eq "true" (include "akeyless-gateway.enableScaleOutOnDisconnectedMode" .))
-}}

---
{{- $cacheEncryptionSecretName := (include "akeyless-gateway.clusterCacheEncryptionKeySecret" .) }}
{{ $cacheEncryptionSecretKey := printf "cluster-cache-encryption-key" }}
apiVersion: v1
Expand Down
20 changes: 10 additions & 10 deletions charts/akeyless-gateway/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -94,14 +94,14 @@ globalConfig:
##
clusterCache:
enabled: true
## In case Cache is enabled in the Gateway, and the encryptionKeyExistingSecret parameter has a value
## Akeyless will use this specified encryption key and store it securely within Akeyless Gateway.
## If the encryptionKeyExistingSecret parameter is empty or not specified,
## Akeyless will automatically generate a new encryption key and a new ServiceAccount for K8s.
## for more information: https://docs.akeyless.io/docs/advanced-chart-configuration#cache-configuration
##
## If enableScaleOutOnDisconnectedMode is set to true, and the encryptionKeyExistingSecret parameter has a value
## Akeyless will use this specified encryption key for offline scaling support.
## If enableScaleOutOnDisconnectedMode is set to true, and the encryptionKeyExistingSecret parameter is empty or not specified,
## Akeyless will automatically generate a new encryption key and a new k8s secret
encryptionKeyExistingSecret:

enableScaleOutOnDisconnectedMode: false

# Enable/Disable TLS between the Gateway and the cluster cache service
# using generated certificates and keys
enableTls: false
Expand Down Expand Up @@ -222,11 +222,11 @@ gateway:
labels: {}

replicaCount: 2
## Gateway image settings: repository and tag to deploy
## Default: akeyless/base. Alternative mirror registry: docker.registry-2.akeyless.io/base
image:
# repository: akeyless/base
## Alternative mirror registry
# repository: docker.registry-2.akeyless.io/base
# tag: latest
# repository: akeyless/base
# tag: latest
pullPolicy: IfNotPresent

pod:
Expand Down