Skip to content

Commit ed42b5d

Browse files
committed
update the config file
1 parent 15270c2 commit ed42b5d

File tree

2 files changed

+89
-89
lines changed

2 files changed

+89
-89
lines changed

pkg/pipeline/PipelineBuilder.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ const SECURITY_SCANNING = "FORCE_SECURITY_SCANNING"
4040
var DefaultPipelineValue = []byte(`{"ConfigMaps":{"enabled":false},"ConfigSecrets":{"enabled":false},"ContainerPort":[],"EnvVariables":[],"GracePeriod":30,"LivenessProbe":{},"MaxSurge":1,"MaxUnavailable":0,"MinReadySeconds":60,"ReadinessProbe":{},"Spec":{"Affinity":{"Values":"nodes","key":""}},"app":"13","appMetrics":false,"args":{},"autoscaling":{},"command":{"enabled":false,"value":[]},"containers":[],"dbMigrationConfig":{"enabled":false},"deployment":{"strategy":{"rolling":{"maxSurge":"25%","maxUnavailable":1}}},"deploymentType":"ROLLING","env":"1","envoyproxy":{"configMapName":"","image":"","resources":{"limits":{"cpu":"50m","memory":"50Mi"},"requests":{"cpu":"50m","memory":"50Mi"}}},"image":{"pullPolicy":"IfNotPresent"},"ingress":{},"ingressInternal":{"annotations":{},"enabled":false,"host":"","path":"","tls":[]},"initContainers":[],"pauseForSecondsBeforeSwitchActive":30,"pipelineName":"","prometheus":{"release":"monitoring"},"rawYaml":[],"releaseVersion":"1","replicaCount":1,"resources":{"limits":{"cpu":"0.05","memory":"50Mi"},"requests":{"cpu":"0.01","memory":"10Mi"}},"secret":{"data":{},"enabled":false},"server":{"deployment":{"image":"","image_tag":""}},"service":{"annotations":{},"type":"ClusterIP"},"servicemonitor":{"additionalLabels":{}},"tolerations":[],"volumeMounts":[],"volumes":[],"waitForSecondsBeforeScalingDown":30}`)
4141

4242
type EcrConfig struct {
43-
EcrPrefix string `env:"ECR_REPO_NAME_PREFIX" envDefault:"test/"`
43+
EcrPrefix string `env:"ECR_REPO_NAME_PREFIX" envDefault:"test/" description:"Prefix for ECR repo to be created in does not exist"`
4444
}
4545

4646
func GetEcrConfig() (*EcrConfig, error) {
@@ -52,7 +52,7 @@ func GetEcrConfig() (*EcrConfig, error) {
5252
type SecurityConfig struct {
5353
//FORCE_SECURITY_SCANNING flag is being maintained in both dashboard and orchestrator CM's
5454
//TODO: rishabh will remove FORCE_SECURITY_SCANNING from dashboard's CM.
55-
ForceSecurityScanning bool `env:"FORCE_SECURITY_SCANNING" envDefault:"false"`
55+
ForceSecurityScanning bool `env:"FORCE_SECURITY_SCANNING" envDefault:"false" description: "By enabling this no one can disable image scaning on ci-pipeline from UI"`
5656
}
5757

5858
type PipelineBuilder interface {

0 commit comments

Comments
 (0)