[hotfix] Fix gitea_conarqube_bot config (!61)

Reviewed-on: https://git.avroid.tech/K8s/k8s-configs/pulls/61
This commit is contained in:
Denis Patrakeev
2025-02-26 18:29:58 +03:00
parent 85b81a920e
commit 87cf1a1380

View File

@@ -52,7 +52,7 @@ app:
## User needs "Read project" permissions with access to "Pull Requests" ## User needs "Read project" permissions with access to "Pull Requests"
## @param app.configuration.gitea.token.value Gitea token as plain text. Can be replaced with `file` key containing path to file. ## @param app.configuration.gitea.token.value Gitea token as plain text. Can be replaced with `file` key containing path to file.
token: token:
value: '"${vault:team-devops/data/accounts/bots/sonarqube/avroid.tech/gitea-sonarqube-bot-staging#app.configuration.gitea.token.value}"' value: "${vault:team-devops/data/accounts/bots/sonarqube/avroid.tech/gitea-sonarqube-bot-staging#app.configuration.gitea.token.value}"
# # or path to file containing the plain text secret # # or path to file containing the plain text secret
# file: /bot/secrets/gitea/user-token # file: /bot/secrets/gitea/user-token
@@ -63,7 +63,7 @@ app:
## @param app.configuration.gitea.webhook.secret Secret for signature header (in plaintext) ## @param app.configuration.gitea.webhook.secret Secret for signature header (in plaintext)
## @extra app.configuration.gitea.webhook.secretFile Path to file containing the plain text secret. Alternative to inline `app.configuration.gitea.webhook.secret` ## @extra app.configuration.gitea.webhook.secretFile Path to file containing the plain text secret. Alternative to inline `app.configuration.gitea.webhook.secret`
webhook: webhook:
secret: '"${vault:team-devops/data/accounts/bots/sonarqube/avroid.tech/gitea-sonarqube-bot-staging#app.configuration.gitea.webhook.secret}"' secret: "${vault:team-devops/data/accounts/bots/sonarqube/avroid.tech/gitea-sonarqube-bot-staging#app.configuration.gitea.webhook.secret}"
# # or path to file containing the plain text secret # # or path to file containing the plain text secret
# secretFile: /bot/secrets/gitea/webhook-secret # secretFile: /bot/secrets/gitea/webhook-secret
@@ -76,7 +76,7 @@ app:
## User needs "Browse on project" permissions ## User needs "Browse on project" permissions
## @param app.configuration.sonarqube.token.value SonarQube token as plain text. Can be replaced with `file` key containing path to file. ## @param app.configuration.sonarqube.token.value SonarQube token as plain text. Can be replaced with `file` key containing path to file.
token: token:
value: '"${vault:team-devops/data/accounts/bots/sonarqube/avroid.tech/gitea-sonarqube-bot-staging#app.configuration.sonarqube.token.value}"' value: "${vault:team-devops/data/accounts/bots/sonarqube/avroid.tech/gitea-sonarqube-bot-staging#app.configuration.sonarqube.token.value}"
# # or path to file containing the plain text secret # # or path to file containing the plain text secret
# file: /bot/secrets/sonarqube/user-token # file: /bot/secrets/sonarqube/user-token
@@ -88,7 +88,7 @@ app:
## @param app.configuration.sonarqube.webhook.secret Secret for signature header (in plaintext) ## @param app.configuration.sonarqube.webhook.secret Secret for signature header (in plaintext)
## @extra app.configuration.sonarqube.webhook.secretFile Path to file containing the plain text secret. Alternative to inline `app.configuration.sonarqube.webhook.secret` ## @extra app.configuration.sonarqube.webhook.secretFile Path to file containing the plain text secret. Alternative to inline `app.configuration.sonarqube.webhook.secret`
webhook: webhook:
secret: '"${vault:team-devops/data/accounts/bots/sonarqube/avroid.tech/gitea-sonarqube-bot-staging#app.configuration.sonarqube.webhook.secret}"' secret: "${vault:team-devops/data/accounts/bots/sonarqube/avroid.tech/gitea-sonarqube-bot-staging#app.configuration.sonarqube.webhook.secret}"
# # or path to file containing the plain text secret # # or path to file containing the plain text secret
# secretFile: /bot/secrets/sonarqube/webhook-secret # secretFile: /bot/secrets/sonarqube/webhook-secret
@@ -116,7 +116,7 @@ app:
bitbucket: bitbucket:
webhook: webhook:
secret: '"${vault:team-devops/data/accounts/bots/sonarqube/avroid.tech/gitea-sonarqube-bot-staging#app.configuration.bitbucket.webhook.secret}"' secret: "${vault:team-devops/data/accounts/bots/sonarqube/avroid.tech/gitea-sonarqube-bot-staging#app.configuration.bitbucket.webhook.secret}"
## ref: https://kubernetes.io/docs/user-guide/ingress/ ## ref: https://kubernetes.io/docs/user-guide/ingress/
ingress: ingress: