-
Notifications
You must be signed in to change notification settings - Fork 4
/
local-config.template.yaml
103 lines (85 loc) · 3.17 KB
/
local-config.template.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
APPLICATION_NAME: metadata
# switch off ECS json logging in favor of readable localhost logs
LOGSTYLE: plain
#BASIC_AUTH_USERNAME: <YOU MUST ADD ANY USERNAME HERE IF VAULT IS DISABLED - SEE README>
#BASIC_AUTH_PASSWORD: <YOU MUST ADD ANY PASSWORD HERE IF VAULT IS DISABLED - SEE README>
BITBUCKET_USERNAME: <YOU MUST ADD THE USERNAME HERE - SEE README>
#BITBUCKET_PASSWORD: <YOU MUST ADD THE PASSWORD HERE IF VAULT IS DISABLED - SEE README>
BITBUCKET_SERVER: https://bitbucket.subdomain.com
BITBUCKET_CACHE_SIZE: 1000
BITBUCKET_CACHE_RETENTION_SECONDS: 3600
BITBUCKET_REVIEWER_FALLBACK: <ADD YOUR FALLBACK USER HERE>
# Url to this service, used as link in Pull Request validation builds
PULL_REQUEST_BUILD_URL: https://metadata-service.example.com
GIT_COMMITTER_NAME: <YOU MUST ADD SOME COMMITTER NAME HERE - SEE README>
GIT_COMMITTER_EMAIL: <YOU MUST ADD SOME COMMITTER EMAIL HERE - SEE README>
#VAULT_ENABLED: false
VAULT_SERVER: some-vault.de
VAULT_AUTH_TOKEN: <YOU MUST ADD YOUR TOKEN HERE - SEE README>
VAULT_SECRETS_CONFIG: >-
{
"some/path/to/secrets": [
{"vaultKey": "BASIC_AUTH_USERNAME"},
{"vaultKey": "BASIC_AUTH_PASSWORD"},
{"vaultKey": "BITBUCKET_PASSWORD"},
{"vaultKey": "KAFKA_PASSWORD"},
{"vaultKey": "METADATA_CHANGE_EVENTS_CONNECTION_STRING"},
{"vaultKey": "SSH_PRIVATE_KEY"},
{"vaultKey": "SSH_PRIVATE_KEY_PASSWORD"},
{"vaultKey": "BITBUCKET_ACCESS_TOKEN"},
{"vaultKey": "GITHUB_ACCESS_TOKEN"}
]
}
VCS_CONFIGS: |
{
"bitbucket": {
"platform": "BITBUCKET_DATACENTER",
"apiBaseURL": <YOU MUST ADD YOUR BITBUCKET DATACENTER URL>,
"accessTokenEnvVar": "BITBUCKET_ACCESS_TOKEN"
},
"github": {
"platform": "GITHUB",
"apiBaseURL": "https://api.github.com",
"accessTokenEnvVar": "GITHUB_ACCESS_TOKEN"
}
}
WEBHOOKS_PROCESS_ASYNC: false
AUTH_OIDC_KEY_SET_URL: https://login.microsoftonline.com/<YOU MUST ADD CLIENT ID HERE>/discovery/v2.0/keys
AUTH_OIDC_TOKEN_AUDIENCE: <YOU MUST ADD TOKEN AUDIENCE HERE>
METADATA_REPO_URL: https://github.com/Interhyp/service-metadata-example
SSH_METADATA_REPO_URL: ssh://[email protected]/Interhyp/service-metadata-example.git
UPDATE_JOB_INTERVAL_MINUTES: 15
UPDATE_JOB_TIMEOUT_SECONDS: 30
ALERT_TARGET_REGEX: '(^https://domain[.]com/)|(@domain[.]com$)'
OWNER_ALIAS_FILTER_REGEX: '.*'
# The NOTIFICATION_CONSUMER_CONFIGS env below is an example:
#NOTIFICATION_CONSUMER_CONFIGS: >-
# {
# "consumerName": {
# "types": {
# "Owner": ["CREATED", "MODIFIED", "DELETED"],
# "Service": ["CREATED", "MODIFIED", "DELETED"],
# "Repository": ["DELETED"]
# },
# "url": "https://some.url.com/for/the/webhook"
# },
# "anotherConsumer": {
# "types": {
# "Owner": ["MODIFIED"],
# },
# "url": "https://another.url.com/for/another/webhook"
# }
# }
# Enable KAFKA communication (Azure event hub example)
#KAFKA_TOPICS_CONFIG: >-
# {
# "metadata-change-events": {
# "topic": "metadata-change-events",
# "brokers": [
# "example.com:9093"
# ],
# "username": "$ConnectionString",
# "passwordEnvVar": "METADATA_CHANGE_EVENTS_CONNECTION_STRING",
# "authType": "PLAIN"
# }
# }