Armory Config
This page describes the
spec.spinnakerConfig.config.armory
section, which is used to configure features in Armory Enterprise for Spinnaker.spec.spinnakerConfig.config.armory
armory:
dinghy:
enabled:
templateOrg:
templateRepo:
githubToken:
githubEndpoint:
stashUsername:
stashToken:
stashEndpoint:
gitlabToken:
gitlabEndpoint:
dinghyFilename:
autoLockPipelines:
fiatUser:
notifiers:
slack:
enabled:
channel:
github:
enabled:
webhookValidationEnabledProviders:
webhookValidations:
- enabled:
versionControlProvider:
organization:
repo:
secret:
diagnostics:
enabled:
uuid:
logging:
enabled:
endpoint:
terraform:
enabled:
git:
enabled:
accessToken:
username:
secrets:
vault:
enabled:
url:
path:
role:
authMethod:
Dinghy parameters
enabled
: true or false.templateOrg
: SCM organization or namespace where application and template repositories are located.templateRepo
: SCM repository where module templates are locatedgithubToken
: GitHub token. Supports encrypted value.githubEndpoint
: (Default:https://api.github.com
) Github API endpoint. Useful if you’re using Github Enterprise.stashUsername
: Stash username.stashToken
: Stash token. Supports encrypted value.stashEndpoint
: Stash API endpoint.gitlabToken
: GitLab token. Supports encrypted value.gitlabEndpoint
: GitLab endpoint.dinghyFilename
: (Default:dinghyfile
) Name of the file in application repositories which contains pipelines.autoLockPipelines
: (Default: true) Lock pipelines in the UI before overwriting on change.fiatUser
: Fiat user to use for Dinghy operations.notifiers
:slack
:enabled
: true or false.channel
: Name of channel to send notifications to.
github
:enabled
: true or false. This enables comments to the PR to allow for more robust feedback information from Dinghy. May cause issues with those using custom GitHub endpoints, as detailed in this KB article.
webhookValidationEnabledProviders
: List of enabled providers for Webhook validations.webhookValidations
: Webhook validations listenabled
: true/false flag to enable this validation.versionControlProvider
: Version control provider.organization
: Organization for the repository.repo
: Repository name.secret
: Secret configured.
Diagnostics parameters
enabled
: true or false.uuid
: UUID of the Armory installationlogging
:enabled
: true or false.endpoint
: Example:https://debug.armory.io/v1/logs
Armory Terraform parameters
enabled
: true or false.git
:enabled
: true or false.accessToken
: Git access token. Supports encrypted value.username
: Git username.
Secrets parameters
vault
:enabled
: true or false.url
: URL of the Vault endpoint from Spinnaker services.path
: (Default:kubernetes
) (Applies to Kubernetes authentication method) Path of the Kubernetes authentication backend mount.role
: (Applies to Kubernetes authentication method) Name of the role against which the login is being attempted.authMethod
: Method used to authenticate with the Vault endpoint. Must be eitherKUBERNETES
for Kubernetes service account auth orTOKEN
for Vault token auth. TheTOKEN
method requires aVAULT_TOKEN
environment variable for Operator and the services.
Kustomize patch examples
You can see examples in the spinnaker-kustomize-patches
repo’s armory
folder.
Feedback
Was this page helpful?
Thank you for letting us know!
Sorry to hear that. Please tell us how we can improve.
Last modified May 12, 2021: (13e9295)