Armory Config
This page describes
spec.spinnakerConfig.config.armory
.spec.spinnakerConfig.config.armory
armory:
dinghy:
enabled:
templateOrg:
templateRepo:
githubToken:
githubEndpoint:
stashUsername:
stashToken:
stashEndpoint:
gitlabToken:
gitlabEndpoint:
dinghyFilename:
autoLockPipelines:
fiatUser:
notifiers:
slack:
enabled:
channel:
webhookValidationEnabledProviders:
webhookValidations:
- enabled:
versionControlProvider:
organization:
repo:
secret:
diagnostics:
enabled:
uuid:
logging:
enabled:
endpoint:
terraform:
enabled:
git:
enabled:
accessToken:
username:
secrets:
vault:
enabled:
url:
path:
role:
authMethod:
Dinghy parameters
enabled
: true or false.templateOrg
: SCM organization or namespace where application and template repositories are located.templateRepo
: SCM repository where module templates are locatedgithubToken
: GitHub token. Supports encrypted value.githubEndpoint
: (Default:https://api.github.com
) Github API endpoint. Useful if you’re using Github Enterprise.stashUsername
: Stash username.stashToken
: Stash token. Supports encrypted value.stashEndpoint
: Stash API endpoint.gitlabToken
: GitLab token. Supports encrypted value.gitlabEndpoint
: GitLab endpoint.dinghyFilename
: (Default:dinghyfile
) Name of the file in application repositories which contains pipelines.autoLockPipelines
: (Default: true) Lock pipelines in the UI before overwriting on change.fiatUser
: Fiat user to use for Dinghy operations.notifiers
:slack
:enabled
: true or false.channel
: Name of channel to send notifications to.
webhookValidationEnabledProviders
: List of enabled providers for Webhook validations.webhookValidations
: Webhook validations listenabled
: true/false flag to enable this validation.versionControlProvider
: Version control provider.organization
: Organization for the repository.repo
: Repository name.secret
: Secret configured.
Diagnostics parameters
enabled
: true or false.uuid
: UUID of the Armory installationlogging
:enabled
: true or false.endpoint
: Example:https://debug.armory.io/v1/logs
Armory Terraform parameters
enabled
: true or false.git
:enabled
: true or false.accessToken
: Git access token. Supports encrypted value.username
: Git username.
Secrets parameters
vault
:enabled
: true or false.url
: URL of the Vault endpoint from Spinnaker services.path
: (Default:kubernetes
) (Applies to Kubernetes authentication method) Path of the Kubernetes authentication backend mount.role
: (Applies to Kubernetes authentication method) Name of the role against which the login is being attempted.authMethod
: Method used to authenticate with the Vault endpoint. Must be eitherKUBERNETES
for Kubernetes service account auth orTOKEN
for Vault token auth. TheTOKEN
method requires aVAULT_TOKEN
environment variable for Operator and the services.
Feedback
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.
Last modified August 13, 2020: (3d6882c)