@@ -146,165 +146,6 @@ secrets:
146146 -----END CERTIFICATE-----
147147` ` `
148148
149- # # Values
150-
151- | Key | Type | Default | Description |
152- |-----|------|---------|-------------|
153- | affinity | object | `{}` | |
154- | annotations | object | `{}` | |
155- | autoscaling.enabled | bool | `false` | |
156- | autoscaling.maxReplicas | int | `3` | |
157- | autoscaling.minReplicas | int | `1` | |
158- | autoscaling.targetCPUUtilizationPercentage | int | `80` | |
159- | configs.certs.root_ca | string | `"sample_cert"` | |
160- | configs.certs.tls_cert | string | `"sample_cert"` | |
161- | configs.certs.tls_key | string | `"sample_cert"` | |
162- | configs.database.min_idle | int | `2` | |
163- | configs.database.pool_size | int | `5` | |
164- | configs.database.root_ca | string | `""` | |
165- | configs.log.log_format | string | `"json"` | |
166- | configs.log.log_level | string | `"debug"` | |
167- | configs.metrics_server.host | string | `"0.0.0.0"` | |
168- | configs.metrics_server.port | int | `6128` | |
169- | configs.multitenancy.tenants.global.cache_prefix | string | `"global"` | |
170- | configs.multitenancy.tenants.global.schema | string | `"global"` | |
171- | configs.multitenancy.tenants.public.cache_prefix | string | `"public"` | |
172- | configs.multitenancy.tenants.public.schema | string | `"public"` | |
173- | configs.pool_config.pool | int | `2` | |
174- | configs.secrets.access_token._secret | string | `"secret123"` | |
175- | configs.secrets.hash_context._secret | string | `"encryption-service:hyperswitch"` | |
176- | configs.secrets.master_key._secret | string | `"6d761d32f1b14ef34cf016d726b29b02b5cfce92a8959f1bfb65995c8100925e"` | |
177- | configs.server.host | string | `"0.0.0.0"` | |
178- | configs.server.port | int | `5000` | |
179- | disableInternalSecrets | bool | `false` | |
180- | externalPostgresql.config.database | string | `"encryption_db"` | |
181- | externalPostgresql.config.host | string | `"localhost"` | |
182- | externalPostgresql.config.password | string | `"db_pass"` | |
183- | externalPostgresql.config.plainpassword | string | `"db_pass"` | |
184- | externalPostgresql.config.port | int | `5432` | |
185- | externalPostgresql.config.username | string | `"db_user"` | |
186- | externalPostgresql.enable_ssl | bool | `false` | |
187- | externalPostgresql.enabled | bool | `false` | |
188- | externalSecretsOperator.enabled | bool | `false` | |
189- | externalSecretsOperator.externalSecrets.secrets[0].creationPolicy | string | `"Owner"` | |
190- | externalSecretsOperator.externalSecrets.secrets[0].dataFrom[0].extract.conversionStrategy | string | `"Default"` | |
191- | externalSecretsOperator.externalSecrets.secrets[0].dataFrom[0].extract.decodingStrategy | string | `"None"` | |
192- | externalSecretsOperator.externalSecrets.secrets[0].dataFrom[0].extract.key | string | `"hyperswitch/encryption-service/secrets"` | |
193- | externalSecretsOperator.externalSecrets.secrets[0].dataFrom[0].extract.metadataPolicy | string | `"None"` | |
194- | externalSecretsOperator.externalSecrets.secrets[0].name | string | `"encryption-service-secrets"` | |
195- | externalSecretsOperator.externalSecrets.secrets[0].refreshInterval | string | `"1h"` | |
196- | externalSecretsOperator.externalSecrets.secrets[0].targetName | string | `"encryption-service-secrets"` | |
197- | externalSecretsOperator.secretStore.name | string | `"encryption-service-secret-store"` | |
198- | externalSecretsOperator.secretStore.provider.aws.auth.jwt.serviceAccountRef.name | string | `"encryption-service-eso-sa"` | |
199- | externalSecretsOperator.secretStore.provider.aws.region | string | `"us-west-2"` | |
200- | externalSecretsOperator.secretStore.provider.aws.service | string | `"SecretsManager"` | |
201- | externalSecretsOperator.serviceAccount.annotations | object | `{}` | |
202- | externalSecretsOperator.serviceAccount.create | bool | `true` | |
203- | externalSecretsOperator.serviceAccount.extraLabels | object | `{}` | |
204- | externalSecretsOperator.serviceAccount.name | string | `""` | |
205- | fullnameOverride | string | `""` | |
206- | global.affinity | object | `{}` | |
207- | global.annotations | object | `{}` | |
208- | global.imageRegistry | string | `nil` | |
209- | image.pullPolicy | string | `"IfNotPresent"` | |
210- | image.registry | string | `"docker.juspay.io"` | |
211- | image.repository | string | `"juspaydotin/hyperswitch-encryption-service"` | |
212- | image.tag | string | `"v0.1.11"` | |
213- | imagePullSecrets | list | `[]` | |
214- | ingress.annotations | object | `{}` | |
215- | ingress.className | string | `""` | |
216- | ingress.enabled | bool | `false` | |
217- | ingress.hosts[0].host | string | `"hyperswitch-encryption-service.local"` | |
218- | ingress.hosts[0].paths[0].path | string | `"/"` | |
219- | ingress.hosts[0].paths[0].pathType | string | `"ImplementationSpecific"` | |
220- | ingress.tls | list | `[]` | |
221- | initDB.checkPGisUp.image | string | `"postgres:16-alpine3.19"` | |
222- | initDB.checkPGisUp.imageRegistry | string | `"docker.io"` | |
223- | initDB.checkPGisUp.maxAttempt | int | `30` | |
224- | initDB.enable | bool | `true` | |
225- | initDB.migration.image | string | `"christophwurst/diesel-cli:latest"` | |
226- | initDB.migration.imageRegistry | string | `"docker.io"` | |
227- | istio.destinationRule.enabled | bool | `false` | |
228- | istio.destinationRule.trafficPolicy | object | `{}` | |
229- | istio.enabled | bool | `false` | |
230- | istio.virtualService.enabled | bool | `false` | |
231- | istio.virtualService.gateways | list | `[]` | |
232- | istio.virtualService.hosts | list | `[]` | |
233- | istio.virtualService.http | list | `[]` | |
234- | livenessProbe.failureThreshold | int | `3` | |
235- | livenessProbe.httpGet.path | string | `"/"` | |
236- | livenessProbe.httpGet.port | string | `"http"` | |
237- | livenessProbe.initialDelaySeconds | int | `30` | |
238- | livenessProbe.periodSeconds | int | `10` | |
239- | livenessProbe.successThreshold | int | `1` | |
240- | livenessProbe.timeoutSeconds | int | `5` | |
241- | nameOverride | string | `""` | |
242- | nodeSelector | object | `{}` | |
243- | podAnnotations | object | `{}` | |
244- | podLabels | object | `{}` | |
245- | podSecurityContext | object | `{}` | |
246- | postgresql.architecture | string | `"standalone"` | |
247- | postgresql.auth.database | string | `"encryption_db"` | |
248- | postgresql.auth.password | string | `"db_pass"` | |
249- | postgresql.auth.username | string | `"db_user"` | |
250- | postgresql.enabled | bool | `true` | |
251- | postgresql.image.repository | string | `"bitnamilegacy/postgresql"` | |
252- | postgresql.nameOverride | string | `"encryption-service-db"` | |
253- | postgresql.primary.name | string | `""` | |
254- | postgresql.primary.resources.requests.cpu | string | `"100m"` | |
255- | progressDeadlineSeconds | int | `600` | |
256- | readinessProbe.failureThreshold | int | `3` | |
257- | readinessProbe.httpGet.path | string | `"/"` | |
258- | readinessProbe.httpGet.port | string | `"http"` | |
259- | readinessProbe.initialDelaySeconds | int | `10` | |
260- | readinessProbe.periodSeconds | int | `5` | |
261- | readinessProbe.successThreshold | int | `1` | |
262- | readinessProbe.timeoutSeconds | int | `3` | |
263- | replicaCount | int | `1` | |
264- | resources.limits.cpu | string | `"1000m"` | |
265- | resources.limits.memory | string | `"1Gi"` | |
266- | resources.requests.cpu | string | `"400m"` | |
267- | resources.requests.memory | string | `"400Mi"` | |
268- | securityContext | object | `{}` | |
269- | service.annotations | object | `{}` | |
270- | service.externalTrafficPolicy | string | `""` | |
271- | service.internalTrafficPolicy | string | `"Cluster"` | |
272- | service.loadBalancerClass | string | `""` | |
273- | service.ports[0].name | string | `"https"` | |
274- | service.ports[0].port | int | `443` | |
275- | service.ports[0].protocol | string | `"TCP"` | |
276- | service.ports[0].targetPort | int | `5000` | |
277- | service.ports[1].name | string | `"metrics"` | |
278- | service.ports[1].port | int | `6128` | |
279- | service.ports[1].protocol | string | `"TCP"` | |
280- | service.ports[1].targetPort | int | `6128` | |
281- | service.sessionAffinity | string | `"None"` | |
282- | service.type | string | `"ClusterIP"` | |
283- | serviceAccount.annotations | object | `{}` | |
284- | serviceAccount.automount | bool | `true` | |
285- | serviceAccount.create | bool | `true` | |
286- | serviceAccount.name | string | `"encryption-service-role"` | |
287- | serviceMonitor.basicAuth | object | `{}` | |
288- | serviceMonitor.enabled | bool | `false` | |
289- | serviceMonitor.interval | string | `"15s"` | |
290- | serviceMonitor.labels | object | `{}` | |
291- | serviceMonitor.metricRelabelings | list | `[]` | |
292- | serviceMonitor.namespace | string | `""` | |
293- | serviceMonitor.path | string | `"/metrics"` | |
294- | serviceMonitor.portName | string | `"metrics"` | |
295- | serviceMonitor.relabelings | list | `[]` | |
296- | serviceMonitor.scheme | string | `"http"` | |
297- | serviceMonitor.scrapeTimeout | string | `"30s"` | |
298- | serviceMonitor.targetLabels | list | `[]` | |
299- | serviceMonitor.tlsConfig | object | `{}` | |
300- | strategy.rollingUpdate.maxSurge | int | `1` | |
301- | strategy.rollingUpdate.maxUnavailable | int | `0` | |
302- | strategy.type | string | `"RollingUpdate"` | |
303- | terminationGracePeriodSeconds | int | `30` | |
304- | tolerations | list | `[]` | |
305- | volumeMounts | list | `[]` | |
306- | volumes | list | `[]` | |
307-
308149# # Examples
309150
310151# ## Example 1: Local Development
@@ -476,5 +317,164 @@ secrets:
476317 -----END CERTIFICATE-----
477318` ` `
478319
320+ # # Values
321+
322+ | Key | Type | Default | Description |
323+ |-----|------|---------|-------------|
324+ | affinity | object | `{}` | |
325+ | annotations | object | `{}` | |
326+ | autoscaling.enabled | bool | `false` | |
327+ | autoscaling.maxReplicas | int | `3` | |
328+ | autoscaling.minReplicas | int | `1` | |
329+ | autoscaling.targetCPUUtilizationPercentage | int | `80` | |
330+ | configs.certs.root_ca | string | `"sample_cert"` | |
331+ | configs.certs.tls_cert | string | `"sample_cert"` | |
332+ | configs.certs.tls_key | string | `"sample_cert"` | |
333+ | configs.database.min_idle | int | `2` | |
334+ | configs.database.pool_size | int | `5` | |
335+ | configs.database.root_ca | string | `""` | |
336+ | configs.log.log_format | string | `"json"` | |
337+ | configs.log.log_level | string | `"debug"` | |
338+ | configs.metrics_server.host | string | `"0.0.0.0"` | |
339+ | configs.metrics_server.port | int | `6128` | |
340+ | configs.multitenancy.tenants.global.cache_prefix | string | `"global"` | |
341+ | configs.multitenancy.tenants.global.schema | string | `"global"` | |
342+ | configs.multitenancy.tenants.public.cache_prefix | string | `"public"` | |
343+ | configs.multitenancy.tenants.public.schema | string | `"public"` | |
344+ | configs.pool_config.pool | int | `2` | |
345+ | configs.secrets.access_token._secret | string | `"secret123"` | |
346+ | configs.secrets.hash_context._secret | string | `"encryption-service:hyperswitch"` | |
347+ | configs.secrets.master_key._secret | string | `"6d761d32f1b14ef34cf016d726b29b02b5cfce92a8959f1bfb65995c8100925e"` | |
348+ | configs.server.host | string | `"0.0.0.0"` | |
349+ | configs.server.port | int | `5000` | |
350+ | disableInternalSecrets | bool | `false` | |
351+ | externalPostgresql.config.database | string | `"encryption_db"` | |
352+ | externalPostgresql.config.host | string | `"localhost"` | |
353+ | externalPostgresql.config.password | string | `"db_pass"` | |
354+ | externalPostgresql.config.plainpassword | string | `"db_pass"` | |
355+ | externalPostgresql.config.port | int | `5432` | |
356+ | externalPostgresql.config.username | string | `"db_user"` | |
357+ | externalPostgresql.enable_ssl | bool | `false` | |
358+ | externalPostgresql.enabled | bool | `false` | |
359+ | externalSecretsOperator.enabled | bool | `false` | |
360+ | externalSecretsOperator.externalSecrets.secrets[0].creationPolicy | string | `"Owner"` | |
361+ | externalSecretsOperator.externalSecrets.secrets[0].dataFrom[0].extract.conversionStrategy | string | `"Default"` | |
362+ | externalSecretsOperator.externalSecrets.secrets[0].dataFrom[0].extract.decodingStrategy | string | `"None"` | |
363+ | externalSecretsOperator.externalSecrets.secrets[0].dataFrom[0].extract.key | string | `"hyperswitch/encryption-service/secrets"` | |
364+ | externalSecretsOperator.externalSecrets.secrets[0].dataFrom[0].extract.metadataPolicy | string | `"None"` | |
365+ | externalSecretsOperator.externalSecrets.secrets[0].name | string | `"encryption-service-secrets"` | |
366+ | externalSecretsOperator.externalSecrets.secrets[0].refreshInterval | string | `"1h"` | |
367+ | externalSecretsOperator.externalSecrets.secrets[0].targetName | string | `"encryption-service-secrets"` | |
368+ | externalSecretsOperator.secretStore.name | string | `"encryption-service-secret-store"` | |
369+ | externalSecretsOperator.secretStore.provider.aws.auth.jwt.serviceAccountRef.name | string | `"encryption-service-eso-sa"` | |
370+ | externalSecretsOperator.secretStore.provider.aws.region | string | `"us-west-2"` | |
371+ | externalSecretsOperator.secretStore.provider.aws.service | string | `"SecretsManager"` | |
372+ | externalSecretsOperator.serviceAccount.annotations | object | `{}` | |
373+ | externalSecretsOperator.serviceAccount.create | bool | `true` | |
374+ | externalSecretsOperator.serviceAccount.extraLabels | object | `{}` | |
375+ | externalSecretsOperator.serviceAccount.name | string | `""` | |
376+ | fullnameOverride | string | `""` | |
377+ | global.affinity | object | `{}` | |
378+ | global.annotations | object | `{}` | |
379+ | global.imageRegistry | string | `nil` | |
380+ | image.pullPolicy | string | `"IfNotPresent"` | |
381+ | image.registry | string | `"docker.juspay.io"` | |
382+ | image.repository | string | `"juspaydotin/hyperswitch-encryption-service"` | |
383+ | image.tag | string | `"v0.1.11"` | |
384+ | imagePullSecrets | list | `[]` | |
385+ | ingress.annotations | object | `{}` | |
386+ | ingress.className | string | `""` | |
387+ | ingress.enabled | bool | `false` | |
388+ | ingress.hosts[0].host | string | `"hyperswitch-encryption-service.local"` | |
389+ | ingress.hosts[0].paths[0].path | string | `"/"` | |
390+ | ingress.hosts[0].paths[0].pathType | string | `"ImplementationSpecific"` | |
391+ | ingress.tls | list | `[]` | |
392+ | initDB.checkPGisUp.image | string | `"postgres:16-alpine3.19"` | |
393+ | initDB.checkPGisUp.imageRegistry | string | `"docker.io"` | |
394+ | initDB.checkPGisUp.maxAttempt | int | `30` | |
395+ | initDB.enable | bool | `true` | |
396+ | initDB.migration.image | string | `"christophwurst/diesel-cli:latest"` | |
397+ | initDB.migration.imageRegistry | string | `"docker.io"` | |
398+ | istio.destinationRule.enabled | bool | `false` | |
399+ | istio.destinationRule.trafficPolicy | object | `{}` | |
400+ | istio.enabled | bool | `false` | |
401+ | istio.virtualService.enabled | bool | `false` | |
402+ | istio.virtualService.gateways | list | `[]` | |
403+ | istio.virtualService.hosts | list | `[]` | |
404+ | istio.virtualService.http | list | `[]` | |
405+ | livenessProbe.failureThreshold | int | `3` | |
406+ | livenessProbe.httpGet.path | string | `"/"` | |
407+ | livenessProbe.httpGet.port | string | `"http"` | |
408+ | livenessProbe.initialDelaySeconds | int | `30` | |
409+ | livenessProbe.periodSeconds | int | `10` | |
410+ | livenessProbe.successThreshold | int | `1` | |
411+ | livenessProbe.timeoutSeconds | int | `5` | |
412+ | nameOverride | string | `""` | |
413+ | nodeSelector | object | `{}` | |
414+ | podAnnotations | object | `{}` | |
415+ | podLabels | object | `{}` | |
416+ | podSecurityContext | object | `{}` | |
417+ | postgresql.architecture | string | `"standalone"` | |
418+ | postgresql.auth.database | string | `"encryption_db"` | |
419+ | postgresql.auth.password | string | `"db_pass"` | |
420+ | postgresql.auth.username | string | `"db_user"` | |
421+ | postgresql.enabled | bool | `true` | |
422+ | postgresql.image.repository | string | `"bitnamilegacy/postgresql"` | |
423+ | postgresql.nameOverride | string | `"encryption-service-db"` | |
424+ | postgresql.primary.name | string | `""` | |
425+ | postgresql.primary.resources.requests.cpu | string | `"100m"` | |
426+ | progressDeadlineSeconds | int | `600` | |
427+ | readinessProbe.failureThreshold | int | `3` | |
428+ | readinessProbe.httpGet.path | string | `"/"` | |
429+ | readinessProbe.httpGet.port | string | `"http"` | |
430+ | readinessProbe.initialDelaySeconds | int | `10` | |
431+ | readinessProbe.periodSeconds | int | `5` | |
432+ | readinessProbe.successThreshold | int | `1` | |
433+ | readinessProbe.timeoutSeconds | int | `3` | |
434+ | replicaCount | int | `1` | |
435+ | resources.limits.cpu | string | `"1000m"` | |
436+ | resources.limits.memory | string | `"1Gi"` | |
437+ | resources.requests.cpu | string | `"400m"` | |
438+ | resources.requests.memory | string | `"400Mi"` | |
439+ | securityContext | object | `{}` | |
440+ | service.annotations | object | `{}` | |
441+ | service.externalTrafficPolicy | string | `""` | |
442+ | service.internalTrafficPolicy | string | `"Cluster"` | |
443+ | service.loadBalancerClass | string | `""` | |
444+ | service.ports[0].name | string | `"https"` | |
445+ | service.ports[0].port | int | `443` | |
446+ | service.ports[0].protocol | string | `"TCP"` | |
447+ | service.ports[0].targetPort | int | `5000` | |
448+ | service.ports[1].name | string | `"metrics"` | |
449+ | service.ports[1].port | int | `6128` | |
450+ | service.ports[1].protocol | string | `"TCP"` | |
451+ | service.ports[1].targetPort | int | `6128` | |
452+ | service.sessionAffinity | string | `"None"` | |
453+ | service.type | string | `"ClusterIP"` | |
454+ | serviceAccount.annotations | object | `{}` | |
455+ | serviceAccount.automount | bool | `true` | |
456+ | serviceAccount.create | bool | `true` | |
457+ | serviceAccount.name | string | `"encryption-service-role"` | |
458+ | serviceMonitor.basicAuth | object | `{}` | |
459+ | serviceMonitor.enabled | bool | `false` | |
460+ | serviceMonitor.interval | string | `"15s"` | |
461+ | serviceMonitor.labels | object | `{}` | |
462+ | serviceMonitor.metricRelabelings | list | `[]` | |
463+ | serviceMonitor.namespace | string | `""` | |
464+ | serviceMonitor.path | string | `"/metrics"` | |
465+ | serviceMonitor.portName | string | `"metrics"` | |
466+ | serviceMonitor.relabelings | list | `[]` | |
467+ | serviceMonitor.scheme | string | `"http"` | |
468+ | serviceMonitor.scrapeTimeout | string | `"30s"` | |
469+ | serviceMonitor.targetLabels | list | `[]` | |
470+ | serviceMonitor.tlsConfig | object | `{}` | |
471+ | strategy.rollingUpdate.maxSurge | int | `1` | |
472+ | strategy.rollingUpdate.maxUnavailable | int | `0` | |
473+ | strategy.type | string | `"RollingUpdate"` | |
474+ | terminationGracePeriodSeconds | int | `30` | |
475+ | tolerations | list | `[]` | |
476+ | volumeMounts | list | `[]` | |
477+ | volumes | list | `[]` | |
478+
479479----------------------------------------------
480480Autogenerated from chart metadata using [helm-docs v1.14.2](https://github.com/norwoodj/helm-docs/releases/v1.14.2)
0 commit comments