File tree Expand file tree Collapse file tree 5 files changed +44
-1
lines changed Expand file tree Collapse file tree 5 files changed +44
-1
lines changed Original file line number Diff line number Diff line change @@ -2,7 +2,7 @@ apiVersion: v2
2
2
name : lakefs
3
3
description : A Helm chart for running LakeFS on Kubernetes
4
4
type : application
5
- version : 1.5 .0
5
+ version : 1.6 .0
6
6
appVersion : 1.63.0
7
7
8
8
home : https://lakefs.io
Original file line number Diff line number Diff line change @@ -111,6 +111,12 @@ env:
111
111
{ {- if .Values.extraEnvVars } }
112
112
{ {- toYaml .Values.extraEnvVars | nindent 2 } }
113
113
{ {- end } }
114
+ { {- if (.Values.enterprise).enabled } }
115
+ { {- if or (and .Values.secrets .Values.secrets.licenseContents) (and .Values.existingSecret .Values.secretKeys.licenseContentsKey) } }
116
+ - name: LAKEFS_LICENSE_PATH
117
+ value: '/etc/lakefs/license.tkn'
118
+ { {- end } }
119
+ { {- end } }
114
120
{ {- if .Values.extraEnvVarsSecret } }
115
121
envFrom:
116
122
- secretRef:
@@ -137,6 +143,23 @@ envFrom:
137
143
- key: config.yaml
138
144
path: config.yaml
139
145
{ {- end } }
146
+ { {- if (.Values.enterprise).enabled } }
147
+ { {- if and .Values.existingSecret .Values.secretKeys.licenseContentsKey } }
148
+ - name: secret-volume
149
+ secret:
150
+ secretName: { { include " lakefs.fullname" . } }
151
+ items:
152
+ - key: licenseContentsKey
153
+ path: license.tkn
154
+ { {- else if and .Values.secrets .Values.secrets.licenseContents } }
155
+ - name: secret-volume
156
+ secret:
157
+ secretName: { { include " lakefs.fullname" . } }
158
+ items:
159
+ - key: license_contents
160
+ path: license.tkn
161
+ { {- end } }
162
+ { {- end } }
140
163
{ {- if (((.Values.enterprise).auth).saml).enabled } }
141
164
- name: secret-volume
142
165
secret:
Original file line number Diff line number Diff line change @@ -103,6 +103,14 @@ spec:
103
103
readOnly : true
104
104
mountPath : /etc/saml_certs/
105
105
{{- end }}
106
+ {{- if (.Values.enterprise).enabled }}
107
+ {{- if or (and .Values.secrets .Values.secrets.licenseContents) (and .Values.existingSecret .Values.secretKeys.licenseContentsKey) }}
108
+ - name : secret-volume
109
+ mountPath : /etc/lakefs/license.tkn
110
+ subPath : " license.tkn"
111
+ readOnly : true
112
+ {{- end }}
113
+ {{- end }}
106
114
{{- include "lakefs.env" . | nindent 10 }}
107
115
{{- include "lakefs.s3proxyContainer" . | nindent 8}}
108
116
{{- include "lakefs.gcpProxyContainer" . | nindent 8}}
Original file line number Diff line number Diff line change 13
13
{{- if (.Values.secrets).authEncryptSecretKey }}
14
14
auth_encrypt_secret_key : {{ .Values.secrets.authEncryptSecretKey | default "" | b64enc }}
15
15
{{- end }}
16
+
17
+ {{- if (.Values.enterprise).enabled }}
18
+ {{- if .Values.secrets.licenseContents }}
19
+ license_contents : {{ .Values.secrets.licenseContents | default "" | b64enc }}
20
+ {{- end }}
21
+ {{- end }}
22
+
16
23
{{- if (.Values.enterprise).enabled }}
17
24
{{- if (((.Values.enterprise).auth).ldap).enabled }}
18
25
{{- if (((.Values.enterprise).auth).ldap).bindPassword }}
Original file line number Diff line number Diff line change @@ -121,6 +121,8 @@ secretKeys:
121
121
authEncryptSecretKey : auth_encrypt_secret_key
122
122
# Use the following to fetch PostgreSQL connection string from an existing secret:
123
123
databaseConnectionString : null
124
+ # Use to fetch license token from an existing secret:
125
+ licenseContentsKey : null
124
126
# Use the following to fetch LDAP bind password from an existing secret:
125
127
ldapBindPassword : null
126
128
# Use the following to fetch OIDC client secret from an existing secret:
@@ -150,3 +152,6 @@ enterprise:
150
152
# certificates for AD FS IDP (e.g Azure AD)
151
153
samlRsaPublicCert : null
152
154
samlRsaPrivateKey : null
155
+
156
+ secrets :
157
+ licenseContents : null
You can’t perform that action at this time.
0 commit comments