Skip to content

Commit 7dba2d1

Browse files
committed
fix ci
1 parent bc044f5 commit 7dba2d1

File tree

2 files changed

+161
-161
lines changed

2 files changed

+161
-161
lines changed

charts/incubator/hyperswitch-encryption-service/README.md

Lines changed: 159 additions & 159 deletions
Original file line numberDiff line numberDiff line change
@@ -146,165 +146,6 @@ secrets:
146146
-----END CERTIFICATE-----
147147
```
148148

149-
## Values
150-
151-
| Key | Type | Default | Description |
152-
|-----|------|---------|-------------|
153-
| affinity | object | `{}` | |
154-
| annotations | object | `{}` | |
155-
| autoscaling.enabled | bool | `false` | |
156-
| autoscaling.maxReplicas | int | `3` | |
157-
| autoscaling.minReplicas | int | `1` | |
158-
| autoscaling.targetCPUUtilizationPercentage | int | `80` | |
159-
| configs.certs.root_ca | string | `"sample_cert"` | |
160-
| configs.certs.tls_cert | string | `"sample_cert"` | |
161-
| configs.certs.tls_key | string | `"sample_cert"` | |
162-
| configs.database.min_idle | int | `2` | |
163-
| configs.database.pool_size | int | `5` | |
164-
| configs.database.root_ca | string | `""` | |
165-
| configs.log.log_format | string | `"json"` | |
166-
| configs.log.log_level | string | `"debug"` | |
167-
| configs.metrics_server.host | string | `"0.0.0.0"` | |
168-
| configs.metrics_server.port | int | `6128` | |
169-
| configs.multitenancy.tenants.global.cache_prefix | string | `"global"` | |
170-
| configs.multitenancy.tenants.global.schema | string | `"global"` | |
171-
| configs.multitenancy.tenants.public.cache_prefix | string | `"public"` | |
172-
| configs.multitenancy.tenants.public.schema | string | `"public"` | |
173-
| configs.pool_config.pool | int | `2` | |
174-
| configs.secrets.access_token._secret | string | `"secret123"` | |
175-
| configs.secrets.hash_context._secret | string | `"encryption-service:hyperswitch"` | |
176-
| configs.secrets.master_key._secret | string | `"6d761d32f1b14ef34cf016d726b29b02b5cfce92a8959f1bfb65995c8100925e"` | |
177-
| configs.server.host | string | `"0.0.0.0"` | |
178-
| configs.server.port | int | `5000` | |
179-
| disableInternalSecrets | bool | `false` | |
180-
| externalPostgresql.config.database | string | `"encryption_db"` | |
181-
| externalPostgresql.config.host | string | `"localhost"` | |
182-
| externalPostgresql.config.password | string | `"db_pass"` | |
183-
| externalPostgresql.config.plainpassword | string | `"db_pass"` | |
184-
| externalPostgresql.config.port | int | `5432` | |
185-
| externalPostgresql.config.username | string | `"db_user"` | |
186-
| externalPostgresql.enable_ssl | bool | `false` | |
187-
| externalPostgresql.enabled | bool | `false` | |
188-
| externalSecretsOperator.enabled | bool | `false` | |
189-
| externalSecretsOperator.externalSecrets.secrets[0].creationPolicy | string | `"Owner"` | |
190-
| externalSecretsOperator.externalSecrets.secrets[0].dataFrom[0].extract.conversionStrategy | string | `"Default"` | |
191-
| externalSecretsOperator.externalSecrets.secrets[0].dataFrom[0].extract.decodingStrategy | string | `"None"` | |
192-
| externalSecretsOperator.externalSecrets.secrets[0].dataFrom[0].extract.key | string | `"hyperswitch/encryption-service/secrets"` | |
193-
| externalSecretsOperator.externalSecrets.secrets[0].dataFrom[0].extract.metadataPolicy | string | `"None"` | |
194-
| externalSecretsOperator.externalSecrets.secrets[0].name | string | `"encryption-service-secrets"` | |
195-
| externalSecretsOperator.externalSecrets.secrets[0].refreshInterval | string | `"1h"` | |
196-
| externalSecretsOperator.externalSecrets.secrets[0].targetName | string | `"encryption-service-secrets"` | |
197-
| externalSecretsOperator.secretStore.name | string | `"encryption-service-secret-store"` | |
198-
| externalSecretsOperator.secretStore.provider.aws.auth.jwt.serviceAccountRef.name | string | `"encryption-service-eso-sa"` | |
199-
| externalSecretsOperator.secretStore.provider.aws.region | string | `"us-west-2"` | |
200-
| externalSecretsOperator.secretStore.provider.aws.service | string | `"SecretsManager"` | |
201-
| externalSecretsOperator.serviceAccount.annotations | object | `{}` | |
202-
| externalSecretsOperator.serviceAccount.create | bool | `true` | |
203-
| externalSecretsOperator.serviceAccount.extraLabels | object | `{}` | |
204-
| externalSecretsOperator.serviceAccount.name | string | `""` | |
205-
| fullnameOverride | string | `""` | |
206-
| global.affinity | object | `{}` | |
207-
| global.annotations | object | `{}` | |
208-
| global.imageRegistry | string | `nil` | |
209-
| image.pullPolicy | string | `"IfNotPresent"` | |
210-
| image.registry | string | `"docker.juspay.io"` | |
211-
| image.repository | string | `"juspaydotin/hyperswitch-encryption-service"` | |
212-
| image.tag | string | `"v0.1.11"` | |
213-
| imagePullSecrets | list | `[]` | |
214-
| ingress.annotations | object | `{}` | |
215-
| ingress.className | string | `""` | |
216-
| ingress.enabled | bool | `false` | |
217-
| ingress.hosts[0].host | string | `"hyperswitch-encryption-service.local"` | |
218-
| ingress.hosts[0].paths[0].path | string | `"/"` | |
219-
| ingress.hosts[0].paths[0].pathType | string | `"ImplementationSpecific"` | |
220-
| ingress.tls | list | `[]` | |
221-
| initDB.checkPGisUp.image | string | `"postgres:16-alpine3.19"` | |
222-
| initDB.checkPGisUp.imageRegistry | string | `"docker.io"` | |
223-
| initDB.checkPGisUp.maxAttempt | int | `30` | |
224-
| initDB.enable | bool | `true` | |
225-
| initDB.migration.image | string | `"christophwurst/diesel-cli:latest"` | |
226-
| initDB.migration.imageRegistry | string | `"docker.io"` | |
227-
| istio.destinationRule.enabled | bool | `false` | |
228-
| istio.destinationRule.trafficPolicy | object | `{}` | |
229-
| istio.enabled | bool | `false` | |
230-
| istio.virtualService.enabled | bool | `false` | |
231-
| istio.virtualService.gateways | list | `[]` | |
232-
| istio.virtualService.hosts | list | `[]` | |
233-
| istio.virtualService.http | list | `[]` | |
234-
| livenessProbe.failureThreshold | int | `3` | |
235-
| livenessProbe.httpGet.path | string | `"/"` | |
236-
| livenessProbe.httpGet.port | string | `"http"` | |
237-
| livenessProbe.initialDelaySeconds | int | `30` | |
238-
| livenessProbe.periodSeconds | int | `10` | |
239-
| livenessProbe.successThreshold | int | `1` | |
240-
| livenessProbe.timeoutSeconds | int | `5` | |
241-
| nameOverride | string | `""` | |
242-
| nodeSelector | object | `{}` | |
243-
| podAnnotations | object | `{}` | |
244-
| podLabels | object | `{}` | |
245-
| podSecurityContext | object | `{}` | |
246-
| postgresql.architecture | string | `"standalone"` | |
247-
| postgresql.auth.database | string | `"encryption_db"` | |
248-
| postgresql.auth.password | string | `"db_pass"` | |
249-
| postgresql.auth.username | string | `"db_user"` | |
250-
| postgresql.enabled | bool | `true` | |
251-
| postgresql.image.repository | string | `"bitnamilegacy/postgresql"` | |
252-
| postgresql.nameOverride | string | `"encryption-service-db"` | |
253-
| postgresql.primary.name | string | `""` | |
254-
| postgresql.primary.resources.requests.cpu | string | `"100m"` | |
255-
| progressDeadlineSeconds | int | `600` | |
256-
| readinessProbe.failureThreshold | int | `3` | |
257-
| readinessProbe.httpGet.path | string | `"/"` | |
258-
| readinessProbe.httpGet.port | string | `"http"` | |
259-
| readinessProbe.initialDelaySeconds | int | `10` | |
260-
| readinessProbe.periodSeconds | int | `5` | |
261-
| readinessProbe.successThreshold | int | `1` | |
262-
| readinessProbe.timeoutSeconds | int | `3` | |
263-
| replicaCount | int | `1` | |
264-
| resources.limits.cpu | string | `"1000m"` | |
265-
| resources.limits.memory | string | `"1Gi"` | |
266-
| resources.requests.cpu | string | `"400m"` | |
267-
| resources.requests.memory | string | `"400Mi"` | |
268-
| securityContext | object | `{}` | |
269-
| service.annotations | object | `{}` | |
270-
| service.externalTrafficPolicy | string | `""` | |
271-
| service.internalTrafficPolicy | string | `"Cluster"` | |
272-
| service.loadBalancerClass | string | `""` | |
273-
| service.ports[0].name | string | `"https"` | |
274-
| service.ports[0].port | int | `443` | |
275-
| service.ports[0].protocol | string | `"TCP"` | |
276-
| service.ports[0].targetPort | int | `5000` | |
277-
| service.ports[1].name | string | `"metrics"` | |
278-
| service.ports[1].port | int | `6128` | |
279-
| service.ports[1].protocol | string | `"TCP"` | |
280-
| service.ports[1].targetPort | int | `6128` | |
281-
| service.sessionAffinity | string | `"None"` | |
282-
| service.type | string | `"ClusterIP"` | |
283-
| serviceAccount.annotations | object | `{}` | |
284-
| serviceAccount.automount | bool | `true` | |
285-
| serviceAccount.create | bool | `true` | |
286-
| serviceAccount.name | string | `"encryption-service-role"` | |
287-
| serviceMonitor.basicAuth | object | `{}` | |
288-
| serviceMonitor.enabled | bool | `false` | |
289-
| serviceMonitor.interval | string | `"15s"` | |
290-
| serviceMonitor.labels | object | `{}` | |
291-
| serviceMonitor.metricRelabelings | list | `[]` | |
292-
| serviceMonitor.namespace | string | `""` | |
293-
| serviceMonitor.path | string | `"/metrics"` | |
294-
| serviceMonitor.portName | string | `"metrics"` | |
295-
| serviceMonitor.relabelings | list | `[]` | |
296-
| serviceMonitor.scheme | string | `"http"` | |
297-
| serviceMonitor.scrapeTimeout | string | `"30s"` | |
298-
| serviceMonitor.targetLabels | list | `[]` | |
299-
| serviceMonitor.tlsConfig | object | `{}` | |
300-
| strategy.rollingUpdate.maxSurge | int | `1` | |
301-
| strategy.rollingUpdate.maxUnavailable | int | `0` | |
302-
| strategy.type | string | `"RollingUpdate"` | |
303-
| terminationGracePeriodSeconds | int | `30` | |
304-
| tolerations | list | `[]` | |
305-
| volumeMounts | list | `[]` | |
306-
| volumes | list | `[]` | |
307-
308149
## Examples
309150

310151
### Example 1: Local Development
@@ -476,5 +317,164 @@ secrets:
476317
-----END CERTIFICATE-----
477318
```
478319

320+
## Values
321+
322+
| Key | Type | Default | Description |
323+
|-----|------|---------|-------------|
324+
| affinity | object | `{}` | |
325+
| annotations | object | `{}` | |
326+
| autoscaling.enabled | bool | `false` | |
327+
| autoscaling.maxReplicas | int | `3` | |
328+
| autoscaling.minReplicas | int | `1` | |
329+
| autoscaling.targetCPUUtilizationPercentage | int | `80` | |
330+
| configs.certs.root_ca | string | `"sample_cert"` | |
331+
| configs.certs.tls_cert | string | `"sample_cert"` | |
332+
| configs.certs.tls_key | string | `"sample_cert"` | |
333+
| configs.database.min_idle | int | `2` | |
334+
| configs.database.pool_size | int | `5` | |
335+
| configs.database.root_ca | string | `""` | |
336+
| configs.log.log_format | string | `"json"` | |
337+
| configs.log.log_level | string | `"debug"` | |
338+
| configs.metrics_server.host | string | `"0.0.0.0"` | |
339+
| configs.metrics_server.port | int | `6128` | |
340+
| configs.multitenancy.tenants.global.cache_prefix | string | `"global"` | |
341+
| configs.multitenancy.tenants.global.schema | string | `"global"` | |
342+
| configs.multitenancy.tenants.public.cache_prefix | string | `"public"` | |
343+
| configs.multitenancy.tenants.public.schema | string | `"public"` | |
344+
| configs.pool_config.pool | int | `2` | |
345+
| configs.secrets.access_token._secret | string | `"secret123"` | |
346+
| configs.secrets.hash_context._secret | string | `"encryption-service:hyperswitch"` | |
347+
| configs.secrets.master_key._secret | string | `"6d761d32f1b14ef34cf016d726b29b02b5cfce92a8959f1bfb65995c8100925e"` | |
348+
| configs.server.host | string | `"0.0.0.0"` | |
349+
| configs.server.port | int | `5000` | |
350+
| disableInternalSecrets | bool | `false` | |
351+
| externalPostgresql.config.database | string | `"encryption_db"` | |
352+
| externalPostgresql.config.host | string | `"localhost"` | |
353+
| externalPostgresql.config.password | string | `"db_pass"` | |
354+
| externalPostgresql.config.plainpassword | string | `"db_pass"` | |
355+
| externalPostgresql.config.port | int | `5432` | |
356+
| externalPostgresql.config.username | string | `"db_user"` | |
357+
| externalPostgresql.enable_ssl | bool | `false` | |
358+
| externalPostgresql.enabled | bool | `false` | |
359+
| externalSecretsOperator.enabled | bool | `false` | |
360+
| externalSecretsOperator.externalSecrets.secrets[0].creationPolicy | string | `"Owner"` | |
361+
| externalSecretsOperator.externalSecrets.secrets[0].dataFrom[0].extract.conversionStrategy | string | `"Default"` | |
362+
| externalSecretsOperator.externalSecrets.secrets[0].dataFrom[0].extract.decodingStrategy | string | `"None"` | |
363+
| externalSecretsOperator.externalSecrets.secrets[0].dataFrom[0].extract.key | string | `"hyperswitch/encryption-service/secrets"` | |
364+
| externalSecretsOperator.externalSecrets.secrets[0].dataFrom[0].extract.metadataPolicy | string | `"None"` | |
365+
| externalSecretsOperator.externalSecrets.secrets[0].name | string | `"encryption-service-secrets"` | |
366+
| externalSecretsOperator.externalSecrets.secrets[0].refreshInterval | string | `"1h"` | |
367+
| externalSecretsOperator.externalSecrets.secrets[0].targetName | string | `"encryption-service-secrets"` | |
368+
| externalSecretsOperator.secretStore.name | string | `"encryption-service-secret-store"` | |
369+
| externalSecretsOperator.secretStore.provider.aws.auth.jwt.serviceAccountRef.name | string | `"encryption-service-eso-sa"` | |
370+
| externalSecretsOperator.secretStore.provider.aws.region | string | `"us-west-2"` | |
371+
| externalSecretsOperator.secretStore.provider.aws.service | string | `"SecretsManager"` | |
372+
| externalSecretsOperator.serviceAccount.annotations | object | `{}` | |
373+
| externalSecretsOperator.serviceAccount.create | bool | `true` | |
374+
| externalSecretsOperator.serviceAccount.extraLabels | object | `{}` | |
375+
| externalSecretsOperator.serviceAccount.name | string | `""` | |
376+
| fullnameOverride | string | `""` | |
377+
| global.affinity | object | `{}` | |
378+
| global.annotations | object | `{}` | |
379+
| global.imageRegistry | string | `nil` | |
380+
| image.pullPolicy | string | `"IfNotPresent"` | |
381+
| image.registry | string | `"docker.juspay.io"` | |
382+
| image.repository | string | `"juspaydotin/hyperswitch-encryption-service"` | |
383+
| image.tag | string | `"v0.1.11"` | |
384+
| imagePullSecrets | list | `[]` | |
385+
| ingress.annotations | object | `{}` | |
386+
| ingress.className | string | `""` | |
387+
| ingress.enabled | bool | `false` | |
388+
| ingress.hosts[0].host | string | `"hyperswitch-encryption-service.local"` | |
389+
| ingress.hosts[0].paths[0].path | string | `"/"` | |
390+
| ingress.hosts[0].paths[0].pathType | string | `"ImplementationSpecific"` | |
391+
| ingress.tls | list | `[]` | |
392+
| initDB.checkPGisUp.image | string | `"postgres:16-alpine3.19"` | |
393+
| initDB.checkPGisUp.imageRegistry | string | `"docker.io"` | |
394+
| initDB.checkPGisUp.maxAttempt | int | `30` | |
395+
| initDB.enable | bool | `true` | |
396+
| initDB.migration.image | string | `"christophwurst/diesel-cli:latest"` | |
397+
| initDB.migration.imageRegistry | string | `"docker.io"` | |
398+
| istio.destinationRule.enabled | bool | `false` | |
399+
| istio.destinationRule.trafficPolicy | object | `{}` | |
400+
| istio.enabled | bool | `false` | |
401+
| istio.virtualService.enabled | bool | `false` | |
402+
| istio.virtualService.gateways | list | `[]` | |
403+
| istio.virtualService.hosts | list | `[]` | |
404+
| istio.virtualService.http | list | `[]` | |
405+
| livenessProbe.failureThreshold | int | `3` | |
406+
| livenessProbe.httpGet.path | string | `"/"` | |
407+
| livenessProbe.httpGet.port | string | `"http"` | |
408+
| livenessProbe.initialDelaySeconds | int | `30` | |
409+
| livenessProbe.periodSeconds | int | `10` | |
410+
| livenessProbe.successThreshold | int | `1` | |
411+
| livenessProbe.timeoutSeconds | int | `5` | |
412+
| nameOverride | string | `""` | |
413+
| nodeSelector | object | `{}` | |
414+
| podAnnotations | object | `{}` | |
415+
| podLabels | object | `{}` | |
416+
| podSecurityContext | object | `{}` | |
417+
| postgresql.architecture | string | `"standalone"` | |
418+
| postgresql.auth.database | string | `"encryption_db"` | |
419+
| postgresql.auth.password | string | `"db_pass"` | |
420+
| postgresql.auth.username | string | `"db_user"` | |
421+
| postgresql.enabled | bool | `true` | |
422+
| postgresql.image.repository | string | `"bitnamilegacy/postgresql"` | |
423+
| postgresql.nameOverride | string | `"encryption-service-db"` | |
424+
| postgresql.primary.name | string | `""` | |
425+
| postgresql.primary.resources.requests.cpu | string | `"100m"` | |
426+
| progressDeadlineSeconds | int | `600` | |
427+
| readinessProbe.failureThreshold | int | `3` | |
428+
| readinessProbe.httpGet.path | string | `"/"` | |
429+
| readinessProbe.httpGet.port | string | `"http"` | |
430+
| readinessProbe.initialDelaySeconds | int | `10` | |
431+
| readinessProbe.periodSeconds | int | `5` | |
432+
| readinessProbe.successThreshold | int | `1` | |
433+
| readinessProbe.timeoutSeconds | int | `3` | |
434+
| replicaCount | int | `1` | |
435+
| resources.limits.cpu | string | `"1000m"` | |
436+
| resources.limits.memory | string | `"1Gi"` | |
437+
| resources.requests.cpu | string | `"400m"` | |
438+
| resources.requests.memory | string | `"400Mi"` | |
439+
| securityContext | object | `{}` | |
440+
| service.annotations | object | `{}` | |
441+
| service.externalTrafficPolicy | string | `""` | |
442+
| service.internalTrafficPolicy | string | `"Cluster"` | |
443+
| service.loadBalancerClass | string | `""` | |
444+
| service.ports[0].name | string | `"https"` | |
445+
| service.ports[0].port | int | `443` | |
446+
| service.ports[0].protocol | string | `"TCP"` | |
447+
| service.ports[0].targetPort | int | `5000` | |
448+
| service.ports[1].name | string | `"metrics"` | |
449+
| service.ports[1].port | int | `6128` | |
450+
| service.ports[1].protocol | string | `"TCP"` | |
451+
| service.ports[1].targetPort | int | `6128` | |
452+
| service.sessionAffinity | string | `"None"` | |
453+
| service.type | string | `"ClusterIP"` | |
454+
| serviceAccount.annotations | object | `{}` | |
455+
| serviceAccount.automount | bool | `true` | |
456+
| serviceAccount.create | bool | `true` | |
457+
| serviceAccount.name | string | `"encryption-service-role"` | |
458+
| serviceMonitor.basicAuth | object | `{}` | |
459+
| serviceMonitor.enabled | bool | `false` | |
460+
| serviceMonitor.interval | string | `"15s"` | |
461+
| serviceMonitor.labels | object | `{}` | |
462+
| serviceMonitor.metricRelabelings | list | `[]` | |
463+
| serviceMonitor.namespace | string | `""` | |
464+
| serviceMonitor.path | string | `"/metrics"` | |
465+
| serviceMonitor.portName | string | `"metrics"` | |
466+
| serviceMonitor.relabelings | list | `[]` | |
467+
| serviceMonitor.scheme | string | `"http"` | |
468+
| serviceMonitor.scrapeTimeout | string | `"30s"` | |
469+
| serviceMonitor.targetLabels | list | `[]` | |
470+
| serviceMonitor.tlsConfig | object | `{}` | |
471+
| strategy.rollingUpdate.maxSurge | int | `1` | |
472+
| strategy.rollingUpdate.maxUnavailable | int | `0` | |
473+
| strategy.type | string | `"RollingUpdate"` | |
474+
| terminationGracePeriodSeconds | int | `30` | |
475+
| tolerations | list | `[]` | |
476+
| volumeMounts | list | `[]` | |
477+
| volumes | list | `[]` | |
478+
479479
----------------------------------------------
480480
Autogenerated from chart metadata using [helm-docs v1.14.2](https://github.com/norwoodj/helm-docs/releases/v1.14.2)

charts/incubator/hyperswitch-encryption-service/Readme.md.gotmpl

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -149,8 +149,6 @@ secrets:
149149
-----END CERTIFICATE-----
150150
```
151151

152-
{{ template "chart.valuesSection" . }}
153-
154152
## Examples
155153

156154
### Example 1: Local Development
@@ -323,4 +321,6 @@ secrets:
323321
-----END CERTIFICATE-----
324322
```
325323

324+
{{ template "chart.valuesSection" . }}
325+
326326
{{ template "helm-docs.versionFooter" . }}

0 commit comments

Comments
 (0)