feat: update cluster key handling for KEDA compatibility in authorization middleware and Helm chart

This commit is contained in:
Simon Larsen
2025-07-31 19:50:25 +01:00
parent 43e2ccf51a
commit 9fcb3dc2e0
2 changed files with 9 additions and 6 deletions

View File

@@ -38,6 +38,9 @@ export default class ClusterKeyAuthorization {
} else if (req.headers && req.headers["clusterkey"]) {
// Header keys are automatically transformed to lowercase
clusterKey = req.headers["clusterkey"] as string;
} else if (req.headers && req.headers["x-clusterkey"]) {
// KEDA TriggerAuthentication sends headers with X- prefix
clusterKey = req.headers["x-clusterkey"] as string;
} else if (req.body && req.body.clusterKey) {
clusterKey = req.body.clusterKey;
} else {

View File

@@ -750,14 +750,14 @@ metadata:
appname: oneuptime
spec:
secretTargetRef:
{{- if .Values.oneuptimeSecret }}
- parameter: clusterkey
name: {{ printf "%s-%s" .Release.Name "secrets" }}
key: oneuptime-secret
{{- else if .Values.externalSecrets.oneuptimeSecret.existingSecret.name }}
- parameter: clusterkey
{{- if .Values.externalSecrets.oneuptimeSecret.existingSecret.name }}
- parameter: X-clusterkey
name: {{ .Values.externalSecrets.oneuptimeSecret.existingSecret.name }}
key: {{ .Values.externalSecrets.oneuptimeSecret.existingSecret.passwordKey }}
{{- else }}
- parameter: X-clusterkey
name: {{ printf "%s-%s" .Release.Name "secrets" }}
key: oneuptime-secret
{{- end }}
{{- end }}
{{- end }}