From 339885c8c6b042c8d894802f3db1453806c4f369 Mon Sep 17 00:00:00 2001 From: Kevin Leyow Date: Mon, 4 Mar 2024 03:49:22 -0500 Subject: [PATCH] chore(mojaloop/#3759): update charts for fixing bug #3759 (#607) chore: update charts for fixing bug #3759 --- .../chart-admin/values.yaml | 10 +- .../chart-service/values.yaml | 8 +- account-lookup-service/values.yaml | 58 +-- ml-testing-toolkit/chart-backend/values.yaml | 2 +- mojaloop/values.yaml | 336 +++++++++--------- 5 files changed, 207 insertions(+), 207 deletions(-) diff --git a/account-lookup-service/chart-admin/values.yaml b/account-lookup-service/chart-admin/values.yaml index 574f25cc9..049959787 100644 --- a/account-lookup-service/chart-admin/values.yaml +++ b/account-lookup-service/chart-admin/values.yaml @@ -5,7 +5,7 @@ image: registry: docker.io repository: mojaloop/account-lookup-service - tag: v15.2.1 + tag: v15.2.2 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: http://kubernetes.io/docs/user-guide/images/#pre-pulling-images @@ -214,7 +214,7 @@ config: # If `jwsSigningKeySecret` is not null, then the `jwsSigningKey` value will be ignored. # Expected properties of `jwsSigningKeySecret` are `name` and `key`. jwsSigningKeySecret: null - jwsSigningKey: null + jwsSigningKey: null # To generate this key: # Private: # ssh-keygen -t rsa -b 4096 -m PEM -f jwtRS256.key @@ -259,13 +259,13 @@ initContainers: | - sh - -c - | - until mysql -h ${DB_HOST} -P ${DB_PORT} -u ${DB_USER} --password=${DB_PASSWORD} ${DB_DATABASE} -e 'select version()' ; + until mysql -h ${DB_HOST} -P ${DB_PORT} -u ${DB_USER} --password=${DB_PASSWORD} ${DB_DATABASE} -e 'select version()' ; do echo --------------------; echo Waiting for MySQL...; - sleep 2; + sleep 2; done; - echo ====================; + echo ====================; echo MySQL ok!; env: - name: DB_HOST diff --git a/account-lookup-service/chart-service/values.yaml b/account-lookup-service/chart-service/values.yaml index 57626e4a0..33c52e060 100644 --- a/account-lookup-service/chart-service/values.yaml +++ b/account-lookup-service/chart-service/values.yaml @@ -5,7 +5,7 @@ image: registry: docker.io repository: mojaloop/account-lookup-service - tag: v15.2.1 + tag: v15.2.2 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: http://kubernetes.io/docs/user-guide/images/#pre-pulling-images @@ -216,7 +216,7 @@ config: # If `jwsSigningKeySecret` is not null, then the `jwsSigningKey` value will be ignored. # Expected properties of `jwsSigningKeySecret` are `name` and `key`. jwsSigningKeySecret: null - jwsSigningKey: null + jwsSigningKey: null # To generate this key: # Private: # ssh-keygen -t rsa -b 4096 -m PEM -f jwtRS256.key @@ -264,9 +264,9 @@ initContainers: | do echo --------------------; echo Waiting for MySQL...; - sleep 2; + sleep 2; done; - echo ====================; + echo ====================; echo MySQL ok!; env: - name: DB_HOST diff --git a/account-lookup-service/values.yaml b/account-lookup-service/values.yaml index d228b8fd3..79fc4a7e0 100644 --- a/account-lookup-service/values.yaml +++ b/account-lookup-service/values.yaml @@ -7,7 +7,7 @@ account-lookup-service: image: registry: docker.io repository: mojaloop/account-lookup-service - tag: v15.2.1 + tag: v15.2.2 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: http://kubernetes.io/docs/user-guide/images/#pre-pulling-images @@ -137,7 +137,7 @@ account-lookup-service: # If `jwsSigningKeySecret` is not null, then the `jwsSigningKey` value will be ignored. # Expected properties of `jwsSigningKeySecret` are `name` and `key`. jwsSigningKeySecret: null - jwsSigningKey: null + jwsSigningKey: null # To generate this key: # Private: # ssh-keygen -t rsa -b 4096 -m PEM -f jwtRS256.key @@ -174,9 +174,9 @@ account-lookup-service: do echo --------------------; echo Waiting for MySQL...; - sleep 2; + sleep 2; done; - echo ====================; + echo ====================; echo MySQL ok!; env: - name: DB_HOST @@ -215,16 +215,16 @@ account-lookup-service: ## nodePorts: http: null - https: null + https: null ## @param service.clusterIP %%MAIN_CONTAINER_NAME%% service Cluster IP ## e.g.: ## clusterIP: None ## - clusterIP: null + clusterIP: null ## @param service.loadBalancerIP %%MAIN_CONTAINER_NAME%% service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## - loadBalancerIP: null + loadBalancerIP: null ## @param service.loadBalancerSourceRanges %%MAIN_CONTAINER_NAME%% service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: @@ -258,7 +258,7 @@ account-lookup-service: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: account-lookup-service.local @@ -271,7 +271,7 @@ account-lookup-service: ## @param ingress.annotations Additional custom annotations for the ingress record ## NOTE: If `ingress.certManager=true`, annotation `kubernetes.io/tls-acme: "true"` will automatically be added ## - annotations: null + annotations: null ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: @@ -321,7 +321,7 @@ account-lookup-service-admin: image: registry: docker.io repository: mojaloop/account-lookup-service - tag: v15.2.1 + tag: v15.2.2 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: http://kubernetes.io/docs/user-guide/images/#pre-pulling-images @@ -447,7 +447,7 @@ account-lookup-service-admin: # If `jwsSigningKeySecret` is not null, then the `jwsSigningKey` value will be ignored. # Expected properties of `jwsSigningKeySecret` are `name` and `key`. jwsSigningKeySecret: null - jwsSigningKey: null + jwsSigningKey: null # To generate this key: # Private: # ssh-keygen -t rsa -b 4096 -m PEM -f jwtRS256.key @@ -485,13 +485,13 @@ account-lookup-service-admin: - sh - -c - | - until mysql -h ${DB_HOST} -P ${DB_PORT} -u ${DB_USER} --password=${DB_PASSWORD} ${DB_DATABASE} -e 'select version()' ; + until mysql -h ${DB_HOST} -P ${DB_PORT} -u ${DB_USER} --password=${DB_PASSWORD} ${DB_DATABASE} -e 'select version()' ; do echo --------------------; echo Waiting for MySQL...; - sleep 2; + sleep 2; done; - echo ====================; + echo ====================; echo MySQL ok!; env: - name: DB_HOST @@ -552,16 +552,16 @@ account-lookup-service-admin: ## nodePorts: http: null - https: null + https: null ## @param service.clusterIP %%MAIN_CONTAINER_NAME%% service Cluster IP ## e.g.: ## clusterIP: None ## - clusterIP: null + clusterIP: null ## @param service.loadBalancerIP %%MAIN_CONTAINER_NAME%% service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## - loadBalancerIP: null + loadBalancerIP: null ## @param service.loadBalancerSourceRanges %%MAIN_CONTAINER_NAME%% service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: @@ -595,7 +595,7 @@ account-lookup-service-admin: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: account-lookup-service-admin.local @@ -608,7 +608,7 @@ account-lookup-service-admin: ## @param ingress.annotations Additional custom annotations for the ingress record ## NOTE: If `ingress.certManager=true`, annotation `kubernetes.io/tls-acme: "true"` will automatically be added ## - annotations: null + annotations: null ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: @@ -875,13 +875,13 @@ als-oracle-pathfinder: - sh - -c - | - until mysql -h ${DB_HOST} -P ${DB_PORT} -u ${DB_USER} --password=${DB_PASSWORD} ${DB_DATABASE} -e 'select version()' ; + until mysql -h ${DB_HOST} -P ${DB_PORT} -u ${DB_USER} --password=${DB_PASSWORD} ${DB_DATABASE} -e 'select version()' ; do echo --------------------; echo Waiting for MySQL...; - sleep 2; + sleep 2; done; - echo ====================; + echo ====================; echo MySQL ok!; env: - name: DB_HOST @@ -910,7 +910,7 @@ als-oracle-pathfinder: - | echo Running MySQL init scripts; mysql -h ${DB_HOST} -P ${DB_PORT} -u ${DB_USER} --password=${DB_PASSWORD} ${DB_DATABASE} -e "SET @service_name='${SERVICE_NAME}'; source /opt/app/init-central-ledger.sql;"; - echo ====================; + echo ====================; echo MySQL ok!; env: - name: DB_HOST @@ -939,13 +939,13 @@ als-oracle-pathfinder: - sh - -c - | - until mysql -h ${DB_HOST} -P ${DB_PORT} -u ${DB_USER} --password=${DB_PASSWORD} ${DB_DATABASE} -e 'select version()' ; + until mysql -h ${DB_HOST} -P ${DB_PORT} -u ${DB_USER} --password=${DB_PASSWORD} ${DB_DATABASE} -e 'select version()' ; do echo --------------------; echo Waiting for MySQL...; - sleep 2; + sleep 2; done; - echo ====================; + echo ====================; echo MySQL ok!; env: - name: DB_HOST @@ -974,7 +974,7 @@ als-oracle-pathfinder: - | echo Running MySQL init scripts; mysql -h ${DB_HOST} -P ${DB_PORT} -u ${DB_USER} --password=${DB_PASSWORD} ${DB_DATABASE} -e "SET @service_name='${SERVICE_NAME}'; source /opt/app/init-account-lookup.sql;"; - echo ====================; + echo ====================; echo MySQL ok!; env: - name: DB_HOST @@ -1024,7 +1024,7 @@ als-oracle-pathfinder: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: als-oracle-pathfinder.local @@ -1037,7 +1037,7 @@ als-oracle-pathfinder: ## @param ingress.annotations Additional custom annotations for the ingress record ## NOTE: If `ingress.certManager=true`, annotation `kubernetes.io/tls-acme: "true"` will automatically be added ## - annotations: null + annotations: null ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: diff --git a/ml-testing-toolkit/chart-backend/values.yaml b/ml-testing-toolkit/chart-backend/values.yaml index 6a23cf2cb..63c97ab63 100644 --- a/ml-testing-toolkit/chart-backend/values.yaml +++ b/ml-testing-toolkit/chart-backend/values.yaml @@ -9,7 +9,7 @@ enabled: true image: repository: mojaloop/ml-testing-toolkit - tag: v17.0.0 + tag: v17.1.1 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: http://kubernetes.io/docs/user-guide/images/#pre-pulling-images diff --git a/mojaloop/values.yaml b/mojaloop/values.yaml index 6629d6dc7..5df23314d 100644 --- a/mojaloop/values.yaml +++ b/mojaloop/values.yaml @@ -95,7 +95,7 @@ account-lookup-service: image: registry: docker.io repository: mojaloop/account-lookup-service - tag: v15.2.1 + tag: v15.2.2 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: http://kubernetes.io/docs/user-guide/images/#pre-pulling-images @@ -354,16 +354,16 @@ account-lookup-service: ## nodePorts: http: null - https: null + https: null ## @param service.clusterIP %%MAIN_CONTAINER_NAME%% service Cluster IP ## e.g.: ## clusterIP: None ## - clusterIP: null + clusterIP: null ## @param service.loadBalancerIP %%MAIN_CONTAINER_NAME%% service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## - loadBalancerIP: null + loadBalancerIP: null ## @param service.loadBalancerSourceRanges %%MAIN_CONTAINER_NAME%% service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: @@ -397,7 +397,7 @@ account-lookup-service: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: account-lookup-service.local @@ -410,7 +410,7 @@ account-lookup-service: ## @param ingress.annotations Additional custom annotations for the ingress record ## NOTE: If `ingress.certManager=true`, annotation `kubernetes.io/tls-acme: "true"` will automatically be added ## - annotations: null + annotations: null ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: @@ -469,7 +469,7 @@ account-lookup-service: image: registry: docker.io repository: mojaloop/account-lookup-service - tag: v15.2.1 + tag: v15.2.2 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: http://kubernetes.io/docs/user-guide/images/#pre-pulling-images @@ -626,7 +626,7 @@ account-lookup-service: # mBynFpdjO0D3PnLKjnBDn1vFAfANOwVpGXCw5mn+484A/SIXYebWruFd03g4 # -----END RSA PRIVATE KEY----- # The following is an example key and shouldn't be used in production - jwsSigningKey: null + jwsSigningKey: null # To generate this key: # Private: # ssh-keygen -t rsa -b 4096 -m PEM -f jwtRS256.key @@ -733,16 +733,16 @@ account-lookup-service: ## nodePorts: http: null - https: null + https: null ## @param service.clusterIP %%MAIN_CONTAINER_NAME%% service Cluster IP ## e.g.: ## clusterIP: None ## - clusterIP: null + clusterIP: null ## @param service.loadBalancerIP %%MAIN_CONTAINER_NAME%% service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## - loadBalancerIP: null + loadBalancerIP: null ## @param service.loadBalancerSourceRanges %%MAIN_CONTAINER_NAME%% service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: @@ -776,7 +776,7 @@ account-lookup-service: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: account-lookup-service-admin.local @@ -789,7 +789,7 @@ account-lookup-service: ## @param ingress.annotations Additional custom annotations for the ingress record ## NOTE: If `ingress.certManager=true`, annotation `kubernetes.io/tls-acme: "true"` will automatically be added ## - annotations: null + annotations: null ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: @@ -1217,7 +1217,7 @@ account-lookup-service: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: als-oracle-pathfinder.local @@ -1230,7 +1230,7 @@ account-lookup-service: ## @param ingress.annotations Additional custom annotations for the ingress record ## NOTE: If `ingress.certManager=true`, annotation `kubernetes.io/tls-acme: "true"` will automatically be added ## - annotations: null + annotations: null ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: @@ -1273,7 +1273,7 @@ quoting-service: registry: docker.io repository: mojaloop/quoting-service tag: v15.6.0 - + config: ## DB Configuration # db_type can either be 'postgres' or 'mysql'. Ensure the correct DB is enabled and configured below: postgresql.enabled or mysql.enabled @@ -1321,11 +1321,11 @@ quoting-service: error_handling: include_cause_extension: false truncate_extensions: true - + endpointSecurity: jwsSign: false fspiopSourceSigningName: 'switch' - jwsSigningKey: null + jwsSigningKey: null # To generate this key: # Private: # ssh-keygen -t rsa -b 4096 -m PEM -f jwtRS256.key @@ -1367,14 +1367,14 @@ quoting-service: prefix: moja_ defaultLabels: serviceName: quoting-service - + quoting-service-handler: enabled: true image: registry: docker.io repository: mojaloop/quoting-service tag: v15.6.0 - + config: ## DB Configuration # db_type can either be 'postgres' or 'mysql'. Ensure the correct DB is enabled and configured below: postgresql.enabled or mysql.enabled @@ -1481,7 +1481,7 @@ quoting-service: prefix: moja_ defaultLabels: serviceName: quoting-service - + # Sidecar configuration sidecar: enabled: true @@ -1595,7 +1595,7 @@ ml-api-adapter: - name: wait-for-kafka image: solsson/kafka:2.8.1 imagePullPolicy: IfNotPresent - command: + command: - sh - -c - until ./bin/kafka-broker-api-versions.sh --bootstrap-server ${KAFKA_HOST}:${KAFKA_PORT}; @@ -1687,16 +1687,16 @@ ml-api-adapter: ## nodePorts: http: null - https: null + https: null ## @param service.clusterIP %%MAIN_CONTAINER_NAME%% service Cluster IP ## e.g.: ## clusterIP: None ## - clusterIP: null + clusterIP: null ## @param service.loadBalancerIP %%MAIN_CONTAINER_NAME%% service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## - loadBalancerIP: null + loadBalancerIP: null ## @param service.loadBalancerSourceRanges %%MAIN_CONTAINER_NAME%% service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: @@ -1730,7 +1730,7 @@ ml-api-adapter: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: ml-api-adapter.local @@ -1743,7 +1743,7 @@ ml-api-adapter: ## @param ingress.annotations Additional custom annotations for the ingress record ## NOTE: If `ingress.certManager=true`, annotation `kubernetes.io/tls-acme: "true"` will automatically be added ## - annotations: null + annotations: null ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: @@ -1875,7 +1875,7 @@ ml-api-adapter: - name: wait-for-kafka image: solsson/kafka:2.8.1 imagePullPolicy: IfNotPresent - command: + command: - sh - -c - until ./bin/kafka-broker-api-versions.sh --bootstrap-server ${KAFKA_HOST}:${KAFKA_PORT}; @@ -2026,16 +2026,16 @@ ml-api-adapter: ## nodePorts: http: null - https: null + https: null ## @param service.clusterIP %%MAIN_CONTAINER_NAME%% service Cluster IP ## e.g.: ## clusterIP: None ## - clusterIP: null + clusterIP: null ## @param service.loadBalancerIP %%MAIN_CONTAINER_NAME%% service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## - loadBalancerIP: null + loadBalancerIP: null ## @param service.loadBalancerSourceRanges %%MAIN_CONTAINER_NAME%% service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: @@ -2069,7 +2069,7 @@ ml-api-adapter: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: ml-api-adapter-notification.local @@ -2082,7 +2082,7 @@ ml-api-adapter: ## @param ingress.annotations Additional custom annotations for the ingress record ## NOTE: If `ingress.certManager=true`, annotation `kubernetes.io/tls-acme: "true"` will automatically be added ## - annotations: null + annotations: null ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: @@ -2367,16 +2367,16 @@ centralledger: ## nodePorts: http: null - https: null + https: null ## @param service.clusterIP %%MAIN_CONTAINER_NAME%% service Cluster IP ## e.g.: ## clusterIP: None ## - clusterIP: null + clusterIP: null ## @param service.loadBalancerIP %%MAIN_CONTAINER_NAME%% service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## - loadBalancerIP: null + loadBalancerIP: null ## @param service.loadBalancerSourceRanges %%MAIN_CONTAINER_NAME%% service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: @@ -2410,7 +2410,7 @@ centralledger: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: central-ledger.local @@ -2423,7 +2423,7 @@ centralledger: ## @param ingress.annotations Additional custom annotations for the ingress record ## NOTE: If `ingress.certManager=true`, annotation `kubernetes.io/tls-acme: "true"` will automatically be added ## - annotations: null + annotations: null ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: @@ -2707,16 +2707,16 @@ centralledger: ## nodePorts: http: null - https: null + https: null ## @param service.clusterIP %%MAIN_CONTAINER_NAME%% service Cluster IP ## e.g.: ## clusterIP: None ## - clusterIP: null + clusterIP: null ## @param service.loadBalancerIP %%MAIN_CONTAINER_NAME%% service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## - loadBalancerIP: null + loadBalancerIP: null ## @param service.loadBalancerSourceRanges %%MAIN_CONTAINER_NAME%% service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: @@ -2750,7 +2750,7 @@ centralledger: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: central-ledger-transfer-prepare.local @@ -2763,7 +2763,7 @@ centralledger: ## @param ingress.annotations Additional custom annotations for the ingress record ## NOTE: If `ingress.certManager=true`, annotation `kubernetes.io/tls-acme: "true"` will automatically be added ## - annotations: null + annotations: null ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: @@ -3041,16 +3041,16 @@ centralledger: ## nodePorts: http: null - https: null + https: null ## @param service.clusterIP %%MAIN_CONTAINER_NAME%% service Cluster IP ## e.g.: ## clusterIP: None ## - clusterIP: null + clusterIP: null ## @param service.loadBalancerIP %%MAIN_CONTAINER_NAME%% service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## - loadBalancerIP: null + loadBalancerIP: null ## @param service.loadBalancerSourceRanges %%MAIN_CONTAINER_NAME%% service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: @@ -3084,7 +3084,7 @@ centralledger: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: central-ledger-transfer-position.local @@ -3097,7 +3097,7 @@ centralledger: ## @param ingress.annotations Additional custom annotations for the ingress record ## NOTE: If `ingress.certManager=true`, annotation `kubernetes.io/tls-acme: "true"` will automatically be added ## - annotations: null + annotations: null ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: @@ -3383,16 +3383,16 @@ centralledger: ## nodePorts: http: null - https: null + https: null ## @param service.clusterIP %%MAIN_CONTAINER_NAME%% service Cluster IP ## e.g.: ## clusterIP: None ## - clusterIP: null + clusterIP: null ## @param service.loadBalancerIP %%MAIN_CONTAINER_NAME%% service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## - loadBalancerIP: null + loadBalancerIP: null ## @param service.loadBalancerSourceRanges %%MAIN_CONTAINER_NAME%% service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: @@ -3426,7 +3426,7 @@ centralledger: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: central-ledger-transfer-position.local @@ -3439,7 +3439,7 @@ centralledger: ## @param ingress.annotations Additional custom annotations for the ingress record ## NOTE: If `ingress.certManager=true`, annotation `kubernetes.io/tls-acme: "true"` will automatically be added ## - annotations: null + annotations: null ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: @@ -3717,16 +3717,16 @@ centralledger: ## nodePorts: http: null - https: null + https: null ## @param service.clusterIP %%MAIN_CONTAINER_NAME%% service Cluster IP ## e.g.: ## clusterIP: None ## - clusterIP: null + clusterIP: null ## @param service.loadBalancerIP %%MAIN_CONTAINER_NAME%% service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## - loadBalancerIP: null + loadBalancerIP: null ## @param service.loadBalancerSourceRanges %%MAIN_CONTAINER_NAME%% service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: @@ -3760,7 +3760,7 @@ centralledger: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: central-ledger-transfer-get.local @@ -3773,7 +3773,7 @@ centralledger: ## @param ingress.annotations Additional custom annotations for the ingress record ## NOTE: If `ingress.certManager=true`, annotation `kubernetes.io/tls-acme: "true"` will automatically be added ## - annotations: null + annotations: null ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: @@ -4054,16 +4054,16 @@ centralledger: ## nodePorts: http: null - https: null + https: null ## @param service.clusterIP %%MAIN_CONTAINER_NAME%% service Cluster IP ## e.g.: ## clusterIP: None ## - clusterIP: null + clusterIP: null ## @param service.loadBalancerIP %%MAIN_CONTAINER_NAME%% service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## - loadBalancerIP: null + loadBalancerIP: null ## @param service.loadBalancerSourceRanges %%MAIN_CONTAINER_NAME%% service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: @@ -4097,7 +4097,7 @@ centralledger: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: central-ledger-transfer-fulfil.local @@ -4110,7 +4110,7 @@ centralledger: ## @param ingress.annotations Additional custom annotations for the ingress record ## NOTE: If `ingress.certManager=true`, annotation `kubernetes.io/tls-acme: "true"` will automatically be added ## - annotations: null + annotations: null ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: @@ -4393,16 +4393,16 @@ centralledger: ## nodePorts: http: null - https: null + https: null ## @param service.clusterIP %%MAIN_CONTAINER_NAME%% service Cluster IP ## e.g.: ## clusterIP: None ## - clusterIP: null + clusterIP: null ## @param service.loadBalancerIP %%MAIN_CONTAINER_NAME%% service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## - loadBalancerIP: null + loadBalancerIP: null ## @param service.loadBalancerSourceRanges %%MAIN_CONTAINER_NAME%% service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: @@ -4436,7 +4436,7 @@ centralledger: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: central-ledger-timeout.local @@ -4449,7 +4449,7 @@ centralledger: ## @param ingress.annotations Additional custom annotations for the ingress record ## NOTE: If `ingress.certManager=true`, annotation `kubernetes.io/tls-acme: "true"` will automatically be added ## - annotations: null + annotations: null ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: @@ -4727,16 +4727,16 @@ centralledger: ## nodePorts: http: null - https: null + https: null ## @param service.clusterIP %%MAIN_CONTAINER_NAME%% service Cluster IP ## e.g.: ## clusterIP: None ## - clusterIP: null + clusterIP: null ## @param service.loadBalancerIP %%MAIN_CONTAINER_NAME%% service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## - loadBalancerIP: null + loadBalancerIP: null ## @param service.loadBalancerSourceRanges %%MAIN_CONTAINER_NAME%% service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: @@ -4770,7 +4770,7 @@ centralledger: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: central-ledger-admin-transfer.local @@ -4783,7 +4783,7 @@ centralledger: ## @param ingress.annotations Additional custom annotations for the ingress record ## NOTE: If `ingress.certManager=true`, annotation `kubernetes.io/tls-acme: "true"` will automatically be added ## - annotations: null + annotations: null ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: @@ -5160,16 +5160,16 @@ centralsettlement: ## nodePorts: http: null - https: null + https: null ## @param service.clusterIP %%MAIN_CONTAINER_NAME%% service Cluster IP ## e.g.: ## clusterIP: None ## - clusterIP: null + clusterIP: null ## @param service.loadBalancerIP %%MAIN_CONTAINER_NAME%% service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## - loadBalancerIP: null + loadBalancerIP: null ## @param service.loadBalancerSourceRanges %%MAIN_CONTAINER_NAME%% service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: @@ -5203,7 +5203,7 @@ centralsettlement: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: central-settlement-service.local @@ -5216,7 +5216,7 @@ centralsettlement: ## @param ingress.annotations Additional custom annotations for the ingress record ## NOTE: If `ingress.certManager=true`, annotation `kubernetes.io/tls-acme: "true"` will automatically be added ## - annotations: null + annotations: null ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: @@ -5592,16 +5592,16 @@ centralsettlement: ## nodePorts: http: null - https: null + https: null ## @param service.clusterIP %%MAIN_CONTAINER_NAME%% service Cluster IP ## e.g.: ## clusterIP: None ## - clusterIP: null + clusterIP: null ## @param service.loadBalancerIP %%MAIN_CONTAINER_NAME%% service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## - loadBalancerIP: null + loadBalancerIP: null ## @param service.loadBalancerSourceRanges %%MAIN_CONTAINER_NAME%% service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: @@ -5635,7 +5635,7 @@ centralsettlement: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: central-settlement-deferredsettlement.local @@ -5648,7 +5648,7 @@ centralsettlement: ## @param ingress.annotations Additional custom annotations for the ingress record ## NOTE: If `ingress.certManager=true`, annotation `kubernetes.io/tls-acme: "true"` will automatically be added ## - annotations: null + annotations: null ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: @@ -6026,16 +6026,16 @@ centralsettlement: ## nodePorts: http: null - https: null + https: null ## @param service.clusterIP %%MAIN_CONTAINER_NAME%% service Cluster IP ## e.g.: ## clusterIP: None ## - clusterIP: null + clusterIP: null ## @param service.loadBalancerIP %%MAIN_CONTAINER_NAME%% service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## - loadBalancerIP: null + loadBalancerIP: null ## @param service.loadBalancerSourceRanges %%MAIN_CONTAINER_NAME%% service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: @@ -6069,7 +6069,7 @@ centralsettlement: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: central-settlement-rules.local @@ -6082,7 +6082,7 @@ centralsettlement: ## @param ingress.annotations Additional custom annotations for the ingress record ## NOTE: If `ingress.certManager=true`, annotation `kubernetes.io/tls-acme: "true"` will automatically be added ## - annotations: null + annotations: null ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: @@ -6550,16 +6550,16 @@ centralsettlement: ## nodePorts: http: null - https: null + https: null ## @param service.clusterIP %%MAIN_CONTAINER_NAME%% service Cluster IP ## e.g.: ## clusterIP: None ## - clusterIP: null + clusterIP: null ## @param service.loadBalancerIP %%MAIN_CONTAINER_NAME%% service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## - loadBalancerIP: null + loadBalancerIP: null ## @param service.loadBalancerSourceRanges %%MAIN_CONTAINER_NAME%% service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: @@ -6593,7 +6593,7 @@ centralsettlement: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: central-settlement-grosssettlement.local @@ -6606,7 +6606,7 @@ centralsettlement: ## @param ingress.annotations Additional custom annotations for the ingress record ## NOTE: If `ingress.certManager=true`, annotation `kubernetes.io/tls-acme: "true"` will automatically be added ## - annotations: null + annotations: null ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: @@ -6821,16 +6821,16 @@ transaction-requests-service: ## nodePorts: http: null - https: null + https: null ## @param service.clusterIP %%MAIN_CONTAINER_NAME%% service Cluster IP ## e.g.: ## clusterIP: None ## - clusterIP: null + clusterIP: null ## @param service.loadBalancerIP %%MAIN_CONTAINER_NAME%% service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## - loadBalancerIP: null + loadBalancerIP: null ## @param service.loadBalancerSourceRanges %%MAIN_CONTAINER_NAME%% service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: @@ -6864,7 +6864,7 @@ transaction-requests-service: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: transaction-request-service.local @@ -6877,7 +6877,7 @@ transaction-requests-service: ## @param ingress.annotations Additional custom annotations for the ingress record ## NOTE: If `ingress.certManager=true`, annotation `kubernetes.io/tls-acme: "true"` will automatically be added ## - annotations: null + annotations: null ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: @@ -7206,16 +7206,16 @@ thirdparty: ## nodePorts: http: null - https: null + https: null ## @param service.clusterIP %%MAIN_CONTAINER_NAME%% service Cluster IP ## e.g.: ## clusterIP: None ## - clusterIP: null + clusterIP: null ## @param service.loadBalancerIP %%MAIN_CONTAINER_NAME%% service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## - loadBalancerIP: null + loadBalancerIP: null ## @param service.loadBalancerSourceRanges %%MAIN_CONTAINER_NAME%% service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: @@ -7251,7 +7251,7 @@ thirdparty: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: auth-service.local @@ -7465,16 +7465,16 @@ thirdparty: ## nodePorts: http: null - https: null + https: null ## @param service.clusterIP %%MAIN_CONTAINER_NAME%% service Cluster IP ## e.g.: ## clusterIP: None ## - clusterIP: null + clusterIP: null ## @param service.loadBalancerIP %%MAIN_CONTAINER_NAME%% service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## - loadBalancerIP: null + loadBalancerIP: null ## @param service.loadBalancerSourceRanges %%MAIN_CONTAINER_NAME%% service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: @@ -7510,7 +7510,7 @@ thirdparty: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: consent-oracle.local @@ -7739,16 +7739,16 @@ thirdparty: ## nodePorts: http: null - https: null + https: null ## @param service.clusterIP %%MAIN_CONTAINER_NAME%% service Cluster IP ## e.g.: ## clusterIP: None ## - clusterIP: null + clusterIP: null ## @param service.loadBalancerIP %%MAIN_CONTAINER_NAME%% service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## - loadBalancerIP: null + loadBalancerIP: null ## @param service.loadBalancerSourceRanges %%MAIN_CONTAINER_NAME%% service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: @@ -7784,7 +7784,7 @@ thirdparty: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: tp-api-svc.local @@ -8691,7 +8691,7 @@ thirdparty: # your switch is using `FSPIOP-Source: peter` you will need a property `peter` in the following # object. Do not add the public keys of your simulators to this object. Instead, put them in # `mojaloop-simulator.simulators.$yourSimName.config.schemeAdapter.secrets.jws.publicKey`. - sharedJWSPubKeys: null + sharedJWSPubKeys: null # switch: |- # -----BEGIN PUBLIC KEY----- # blah blah blah @@ -8705,7 +8705,7 @@ thirdparty: waitForCache: enabled: true imagePullSecretName: dock-casa-secret - cache: + cache: # These will be supplied directly to the init containers array in the deployment for the # scheme adapter. They should look exactly as you'd declare them inside the deployment. # Example: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/#init-containers-in-use @@ -8735,10 +8735,10 @@ thirdparty: jws: # Use the privateKeySecret field if you would like to supply a JWS private key external # to this chart. - # For example, if you create a private key called `sim-payerfsp-jws-signing-key` with data property `private.key` - # external to this chart, you would supply - # `privateKeySecret: - # name: sim-payerfsp-jws-signing-key` + # For example, if you create a private key called `sim-payerfsp-jws-signing-key` with data property `private.key` + # external to this chart, you would supply + # `privateKeySecret: + # name: sim-payerfsp-jws-signing-key` # key: private.key # here. # These fields will take precedence over `privateKey` and `publicKey` below. @@ -9030,10 +9030,10 @@ thirdparty: jws: # Use the privateKeySecret field if you would like to supply a JWS private key external # to this chart. - # For example, if you create a private key called `sim-payerfsp-jws-signing-key` with data property `private.key` - # external to this chart, you would supply - # `privateKeySecret: - # name: sim-payerfsp-jws-signing-key` + # For example, if you create a private key called `sim-payerfsp-jws-signing-key` with data property `private.key` + # external to this chart, you would supply + # `privateKeySecret: + # name: sim-payerfsp-jws-signing-key` # key: private.key # here. # These fields will take precedence over `privateKey` and `publicKey` below. @@ -9237,16 +9237,16 @@ simulator: ## nodePorts: http: null - https: null + https: null ## @param service.clusterIP %%MAIN_CONTAINER_NAME%% service Cluster IP ## e.g.: ## clusterIP: None ## - clusterIP: null + clusterIP: null ## @param service.loadBalancerIP %%MAIN_CONTAINER_NAME%% service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## - loadBalancerIP: null + loadBalancerIP: null ## @param service.loadBalancerSourceRanges %%MAIN_CONTAINER_NAME%% service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: @@ -9280,7 +9280,7 @@ simulator: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: moja-simulator.local @@ -9293,7 +9293,7 @@ simulator: ## @param ingress.annotations Additional custom annotations for the ingress record ## NOTE: If `ingress.certManager=true`, annotation `kubernetes.io/tls-acme: "true"` will automatically be added ## - annotations: null + annotations: null ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: @@ -9808,7 +9808,7 @@ mojaloop-simulator: # your switch is using `FSPIOP-Source: peter` you will need a property `peter` in the following # object. Do not add the public keys of your simulators to this object. Instead, put them in # `mojaloop-simulator.simulators.$yourSimName.config.schemeAdapter.secrets.jws.publicKey`. - sharedJWSPubKeys: null + sharedJWSPubKeys: null # switch: |- # -----BEGIN PUBLIC KEY----- # blah blah blah @@ -9852,10 +9852,10 @@ mojaloop-simulator: jws: # Use the privateKeySecret field if you would like to supply a JWS private key external # to this chart. - # For example, if you create a private key called `sim-payerfsp-jws-signing-key` with data property `private.key` - # external to this chart, you would supply - # `privateKeySecret: - # name: sim-payerfsp-jws-signing-key` + # For example, if you create a private key called `sim-payerfsp-jws-signing-key` with data property `private.key` + # external to this chart, you would supply + # `privateKeySecret: + # name: sim-payerfsp-jws-signing-key` # key: private.key # here. # These fields will take precedence over `privateKey` and `publicKey` below. @@ -10145,10 +10145,10 @@ mojaloop-simulator: jws: # Use the privateKeySecret field if you would like to supply a JWS private key external # to this chart. - # For example, if you create a private key called `sim-payerfsp-jws-signing-key` with data property `private.key` - # external to this chart, you would supply - # `privateKeySecret: - # name: sim-payerfsp-jws-signing-key` + # For example, if you create a private key called `sim-payerfsp-jws-signing-key` with data property `private.key` + # external to this chart, you would supply + # `privateKeySecret: + # name: sim-payerfsp-jws-signing-key` # key: private.key # here. # These fields will take precedence over `privateKey` and `publicKey` below. @@ -10258,7 +10258,7 @@ mojaloop-ttk-simulators: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: ttksim1-sdk-scheme-adapter.local @@ -10496,7 +10496,7 @@ mojaloop-ttk-simulators: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: ttksim2-sdk-scheme-adapter.local @@ -10673,7 +10673,7 @@ mojaloop-ttk-simulators: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: ttksim3-sdk-scheme-adapter.local @@ -11040,7 +11040,7 @@ mojaloop-bulk: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: bulk-api-adapter.local @@ -11053,7 +11053,7 @@ mojaloop-bulk: ## @param ingress.annotations Additional custom annotations for the ingress record ## NOTE: If `ingress.certManager=true`, annotation `kubernetes.io/tls-acme: "true"` will automatically be added ## - annotations: null + annotations: null ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: @@ -11216,7 +11216,7 @@ mojaloop-bulk: ] } } - + # Parameters for JWS signing requests endpointSecurity: jwsSign: false @@ -11322,16 +11322,16 @@ mojaloop-bulk: ## nodePorts: http: null - https: null + https: null ## @param service.clusterIP %%MAIN_CONTAINER_NAME%% service Cluster IP ## e.g.: ## clusterIP: None ## - clusterIP: null + clusterIP: null ## @param service.loadBalancerIP %%MAIN_CONTAINER_NAME%% service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## - loadBalancerIP: null + loadBalancerIP: null ## @param service.loadBalancerSourceRanges %%MAIN_CONTAINER_NAME%% service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: @@ -11365,7 +11365,7 @@ mojaloop-bulk: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: bulk-api-adapter-notification.local @@ -11378,7 +11378,7 @@ mojaloop-bulk: ## @param ingress.annotations Additional custom annotations for the ingress record ## NOTE: If `ingress.certManager=true`, annotation `kubernetes.io/tls-acme: "true"` will automatically be added ## - annotations: null + annotations: null ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: @@ -11689,16 +11689,16 @@ mojaloop-bulk: ## nodePorts: http: null - https: null + https: null ## @param service.clusterIP %%MAIN_CONTAINER_NAME%% service Cluster IP ## e.g.: ## clusterIP: None ## - clusterIP: null + clusterIP: null ## @param service.loadBalancerIP %%MAIN_CONTAINER_NAME%% service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## - loadBalancerIP: null + loadBalancerIP: null ## @param service.loadBalancerSourceRanges %%MAIN_CONTAINER_NAME%% service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: @@ -11732,7 +11732,7 @@ mojaloop-bulk: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: central-ledger-transfer-bulkprepare.local @@ -11745,7 +11745,7 @@ mojaloop-bulk: ## @param ingress.annotations Additional custom annotations for the ingress record ## NOTE: If `ingress.certManager=true`, annotation `kubernetes.io/tls-acme: "true"` will automatically be added ## - annotations: null + annotations: null ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: @@ -12050,16 +12050,16 @@ mojaloop-bulk: ## nodePorts: http: null - https: null + https: null ## @param service.clusterIP %%MAIN_CONTAINER_NAME%% service Cluster IP ## e.g.: ## clusterIP: None ## - clusterIP: null + clusterIP: null ## @param service.loadBalancerIP %%MAIN_CONTAINER_NAME%% service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## - loadBalancerIP: null + loadBalancerIP: null ## @param service.loadBalancerSourceRanges %%MAIN_CONTAINER_NAME%% service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: @@ -12093,7 +12093,7 @@ mojaloop-bulk: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: central-ledger-transfer-bulkfulfil.local @@ -12106,7 +12106,7 @@ mojaloop-bulk: ## @param ingress.annotations Additional custom annotations for the ingress record ## NOTE: If `ingress.certManager=true`, annotation `kubernetes.io/tls-acme: "true"` will automatically be added ## - annotations: null + annotations: null ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: @@ -12411,16 +12411,16 @@ mojaloop-bulk: ## nodePorts: http: null - https: null + https: null ## @param service.clusterIP %%MAIN_CONTAINER_NAME%% service Cluster IP ## e.g.: ## clusterIP: None ## - clusterIP: null + clusterIP: null ## @param service.loadBalancerIP %%MAIN_CONTAINER_NAME%% service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## - loadBalancerIP: null + loadBalancerIP: null ## @param service.loadBalancerSourceRanges %%MAIN_CONTAINER_NAME%% service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: @@ -12454,7 +12454,7 @@ mojaloop-bulk: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: central-ledger-transfer-bulkprocessing.local @@ -12467,7 +12467,7 @@ mojaloop-bulk: ## @param ingress.annotations Additional custom annotations for the ingress record ## NOTE: If `ingress.certManager=true`, annotation `kubernetes.io/tls-acme: "true"` will automatically be added ## - annotations: null + annotations: null ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: @@ -12772,16 +12772,16 @@ mojaloop-bulk: ## nodePorts: http: null - https: null + https: null ## @param service.clusterIP %%MAIN_CONTAINER_NAME%% service Cluster IP ## e.g.: ## clusterIP: None ## - clusterIP: null + clusterIP: null ## @param service.loadBalancerIP %%MAIN_CONTAINER_NAME%% service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## - loadBalancerIP: null + loadBalancerIP: null ## @param service.loadBalancerSourceRanges %%MAIN_CONTAINER_NAME%% service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: @@ -12815,7 +12815,7 @@ mojaloop-bulk: pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## - apiVersion: null + apiVersion: null ## @param ingress.hostname Default host for the ingress record ## hostname: central-ledger-transfer-bulkget.local @@ -12828,7 +12828,7 @@ mojaloop-bulk: ## @param ingress.annotations Additional custom annotations for the ingress record ## NOTE: If `ingress.certManager=true`, annotation `kubernetes.io/tls-acme: "true"` will automatically be added ## - annotations: null + annotations: null ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: @@ -12955,9 +12955,9 @@ ml-testing-toolkit: ## We can pass the JSON content as the value for the parameters ## Or we can pass a http/https URL for the JSON file as the value for the parameters. Then the file will be downloaded and replaced in the corresponding location. ## Ex: rules_callback__default.json: "https://raw.githubusercontent.com/mojaloop/ml-testing-toolkit/master/spec_files/rules_callback/default.json" - rules_callback__default.json: "https://github.com/mojaloop/testing-toolkit-test-cases/raw/v16.0.0/rules/mojaloop/ml-testing-toolkit/spec_files/rules_callback/default.json" - rules_response__default.json: "https://github.com/mojaloop/testing-toolkit-test-cases/raw/v16.0.0/rules/mojaloop/ml-testing-toolkit/spec_files/rules_response/default.json" - rules_validation__default.json: "https://github.com/mojaloop/testing-toolkit-test-cases/raw/v16.0.0/rules/mojaloop/ml-testing-toolkit/spec_files/rules_validation/default.json" + rules_callback__default.json: "https://github.com/mojaloop/testing-toolkit-test-cases/raw/v16.0.1/rules/mojaloop/ml-testing-toolkit/spec_files/rules_callback/default.json" + rules_response__default.json: "https://github.com/mojaloop/testing-toolkit-test-cases/raw/v16.0.1/rules/mojaloop/ml-testing-toolkit/spec_files/rules_response/default.json" + rules_validation__default.json: "https://github.com/mojaloop/testing-toolkit-test-cases/raw/v16.0.1/rules/mojaloop/ml-testing-toolkit/spec_files/rules_validation/default.json" # We can change the names of the simulators to configure the environment files for the testing toolkit. # If you change these values, you need to change the simulator names in the mojaloop-simulats->simulators section parameters: &simNames