Skip to content

Commit

Permalink
Allow configmaps to read saml.useExistingSecret flag (#109)
Browse files Browse the repository at this point in the history
* Allow configmaps to read saml.useExistingSecret flag

There is currently a bug that requires the saml.secret value to be set
regardless of the value of saml.useExistingSecret. This changes
addresses this issue.

fixes: #108

Signed-off-by: Adam Wallis <[email protected]>

* Always pull saml secret from ENVIRONMENT

Signed-off-by: Adam Wallis <[email protected]>
  • Loading branch information
adawalli authored Jan 16, 2021
1 parent deeb382 commit 421b4d2
Show file tree
Hide file tree
Showing 4 changed files with 4 additions and 4 deletions.
2 changes: 1 addition & 1 deletion stable/anchore-engine/Chart.yaml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
apiVersion: v2
name: anchore-engine
version: 1.11.2
version: 1.11.3
appVersion: 0.9.0
description: Anchore container analysis and policy evaluation engine service
keywords:
Expand Down
2 changes: 1 addition & 1 deletion stable/anchore-engine/templates/engine_configmap.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -99,7 +99,7 @@ data:
# Locations for keys used for signing and encryption. Only one of 'secret' or 'public_key_path'/'private_key_path' needs to be set. If all are set then the keys take precedence over the secret value
# Secret is for a shared secret and if set, all components in anchore should have the exact same value in their configs.
keys:
{{- if .Values.anchoreGlobal.saml.secret }}
{{- if or .Values.anchoreGlobal.saml.secret .Values.anchoreGlobal.saml.useExistingSecret }}
secret: ${ANCHORE_SAML_SECRET}
{{- end }}
{{- with .Values.anchoreGlobal.saml.publicKeyName }}
Expand Down
2 changes: 1 addition & 1 deletion stable/anchore-engine/templates/enterprise_configmap.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -41,7 +41,7 @@ data:
# Locations for keys used for signing and encryption. Only one of 'secret' or 'public_key_path'/'private_key_path' needs to be set. If all are set then the keys take precedence over the secret value
# Secret is for a shared secret and if set, all components in anchore should have the exact same value in their configs.
keys:
{{- if .Values.anchoreGlobal.saml.secret }}
{{- if or .Values.anchoreGlobal.saml.secret .Values.anchoreGlobal.saml.useExistingSecret }}
secret: ${ANCHORE_SAML_SECRET}
{{- end }}
{{- with .Values.anchoreGlobal.saml.publicKeyName }}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@ data:
# Locations for keys used for signing and encryption. Only one of 'secret' or 'public_key_path'/'private_key_path' needs to be set. If all are set then the keys take precedence over the secret value
# Secret is for a shared secret and if set, all components in anchore should have the exact same value in their configs.
keys:
{{- if .Values.anchoreGlobal.saml.secret }}
{{- if or .Values.anchoreGlobal.saml.secret .Values.anchoreGlobal.saml.useExistingSecret }}
secret: ${ANCHORE_SAML_SECRET}
{{- end }}
{{- with .Values.anchoreGlobal.saml.publicKeyName }}
Expand Down

0 comments on commit 421b4d2

Please sign in to comment.