Skip to content

Commit

Permalink
chore: removal of transferProxyTokenEncryptionAesKey setting
Browse files Browse the repository at this point in the history
  • Loading branch information
wolf4ood committed May 28, 2024
1 parent a9542d4 commit a30d230
Show file tree
Hide file tree
Showing 8 changed files with 1 addition and 9 deletions.
1 change: 0 additions & 1 deletion charts/tractusx-connector-azure-vault/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -286,7 +286,6 @@ helm install my-release tractusx-edc/tractusx-connector-azure-vault --version 0.
| vault.azure.name | string | `"<AZURE_NAME>"` | |
| vault.azure.secret | string | `nil` | |
| vault.azure.tenant | string | `nil` | |
| vault.secretNames.transferProxyTokenEncryptionAesKey | string | `"transfer-proxy-token-encryption-aes-key"` | |
| vault.secretNames.transferProxyTokenSignerPrivateKey | string | `nil` | |
| vault.secretNames.transferProxyTokenSignerPublicKey | string | `nil` | |

Expand Down
1 change: 0 additions & 1 deletion charts/tractusx-connector-azure-vault/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -541,7 +541,6 @@ vault:
secretNames:
transferProxyTokenSignerPrivateKey:
transferProxyTokenSignerPublicKey:
transferProxyTokenEncryptionAesKey: transfer-proxy-token-encryption-aes-key

networkPolicy:
# -- If `true` network policy will be created to restrict access to control- and dataplane
Expand Down
2 changes: 1 addition & 1 deletion charts/tractusx-connector-memory/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -175,7 +175,7 @@ helm install my-release tractusx-edc/tractusx-connector-memory --version 0.7.2 \
| serviceAccount.name | string | `""` | |
| tests | object | `{"hookDeletePolicy":"before-hook-creation,hook-succeeded"}` | Configurations for Helm tests |
| tests.hookDeletePolicy | string | `"before-hook-creation,hook-succeeded"` | Configure the hook-delete-policy for Helm tests |
| vault.secretNames.transferProxyTokenEncryptionAesKey | string | `"transfer-proxy-token-encryption-aes-key"` | |
| vault.secretNames | string | `nil` | |
| vault.secrets | string | `""` | |
| vault.server.postStart | string | `""` | |

Expand Down
1 change: 0 additions & 1 deletion charts/tractusx-connector-memory/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -313,7 +313,6 @@ vault:
# secrets can be seeded by supplying them in a semicolon separated list key1:secret2;key2:secret2
secrets: ""
secretNames:
transferProxyTokenEncryptionAesKey: transfer-proxy-token-encryption-aes-key
server:
postStart: |-
backendService:
Expand Down
1 change: 0 additions & 1 deletion charts/tractusx-connector/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -287,7 +287,6 @@ helm install my-release tractusx-edc/tractusx-connector --version 0.7.2 \
| vault.hashicorp.token | string | `"root"` | |
| vault.hashicorp.url | string | `"http://{{ .Release.Name }}-vault:8200"` | |
| vault.injector.enabled | bool | `false` | |
| vault.secretNames.transferProxyTokenEncryptionAesKey | string | `"transfer-proxy-token-encryption-aes-key"` | |
| vault.secretNames.transferProxyTokenSignerPrivateKey | string | `nil` | |
| vault.secretNames.transferProxyTokenSignerPublicKey | string | `nil` | |
| vault.server.dev.devRootToken | string | `"root"` | |
Expand Down
2 changes: 0 additions & 2 deletions charts/tractusx-connector/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -547,8 +547,6 @@ vault:
secretNames:
transferProxyTokenSignerPrivateKey:
transferProxyTokenSignerPublicKey:
transferProxyTokenEncryptionAesKey: transfer-proxy-token-encryption-aes-key

networkPolicy:
# -- If `true` network policy will be created to restrict access to control- and dataplane
enabled: false
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -85,7 +85,6 @@ vault:
secret:
certificate:
secretNames:
transferProxyTokenEncryptionAesKey: aes-keys
# this must be set through CLI args: --set vault.secrets=$YOUR_VAULT_SECRETS where YOUR_VAULT_SECRETS should
# be a string in the format "key1:secret1;key2:secret2;..."
secrets:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -94,7 +94,6 @@ vault:
url: http://{{ .Release.Name }}-vault:8200
token: root
secretNames:
transferProxyTokenEncryptionAesKey: aes-keys
# this must be set through CLI args: --set vault.secrets=$YOUR_VAULT_SECRETS where YOUR_VAULT_SECRETS should
# be a string in the format "key1:secret1;key2:secret2;..."
secrets:
Expand Down

0 comments on commit a30d230

Please sign in to comment.