forked from jenkins-infra/kubernetes-management
-
Notifications
You must be signed in to change notification settings - Fork 0
/
jenkins-jobs_infra.ci.jenkins.io.yaml
509 lines (509 loc) · 24.3 KB
/
jenkins-jobs_infra.ci.jenkins.io.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
jenkinsName: jenkins-infra
jenkinsFqdn: infra.ci.jenkins.io
jobsDefinition:
docker-jobs:
name: Docker Jobs
description: Folder hosting all the Docker jobs
kind: folder
credentials:
jenkins-dockerhub:
description: Docker hub credential for jenkinsinfra organisation
username: jenkinsinfraadmin
password: "${DOCKER_HUB_TOKEN_JENKINSINFRAADMIN_PUSH}"
jenkinsinfraadmin-dockerhub-push: &jenkinsinfraadmin-dockerhub-push-def
description: Docker hub credential for jenkinsinfra organisation PUSH
username: jenkinsinfraadmin
password: "${DOCKER_HUB_TOKEN_JENKINSINFRAADMIN_PUSH}"
infracijenkinsio-dockerhub-pull: &infracijenkinsio-dockerhub-pull-def
description: Docker hub credential for jenkinsinfra organisation PULL
username: infracijenkinsio
password: "${DOCKER_HUB_TOKEN_INFRACIJENKINSIO_PULL}"
children:
acceptance-test-harness:
name: "Jenkins CI Acceptance Test Harness (ATH) Docker Image"
githubCredentialsId: jenkinsci-ath-ghapp
jenkinsfilePath: Jenkinsfile.infra.ci.jenkins.io
repoOwner: "jenkinsci"
credentials:
jenkinsci-ath-ghapp:
description: "Github App installed on jenkinsci org for https://github.com/jenkinsci/acceptance-test-harness Docker Image build"
appId: "${GITHUB_APP_JENKINSCI_ID}"
owner: "jenkinsci"
privateKey: "${GITHUB_APP_JENKINSCI_PRIVATE_KEY}"
account-app:
jenkinsfilePath: Jenkinsfile
docker-404:
docker-builder:
docker-confluence-data:
docker-crond:
docker-inbound-agents:
docker-jenkins-lts:
docker-jenkins-weekly:
docker-ldap:
docker-mirrorbits:
docker-openvpn:
docker-packaging:
docker-plugin-site-issues:
docker-plugins-self-service:
docker-rsyncd:
ircbot:
jenkinsfilePath: Jenkinsfile
plugin-health-scoring:
jenkinsfilePath: Jenkinsfile
plugin-site-api:
jenkinsfilePath: Jenkinsfile
rating:
uplink:
jenkinsfilePath: Jenkinsfile
infra-tools:
name: Infrastructure Tooling Jobs
description: Folder hosting all the Infrastructure Tools jobs
kind: folder
children:
packer-images:
name: Packer Images
credentials:
packer-aws-access-key-id: &packer-aws-access-key-id-def
description: AWS API key for the account ci-packer
secret: "${CI_PACKER_AWS_ACCESS_KEY_ID}"
packer-aws-secret-access-key: &packer-aws-secret-access-key-def
description: AWS Secret key for the account ci-packer
secret: "${CI_PACKER_AWS_SECRET_ACCESS_KEY}"
packer-azure-serviceprincipal:
azureEnvironmentName: "Azure"
clientId: "${PACKER_AZURE_CLIENT_ID}"
clientSecret: "${PACKER_AZURE_CLIENT_SECRET_VALUE}"
description: "Azure Service Principal credential used by packer"
subscriptionId: "${JENKINSINFRA_AZURE_PRIMARY_SUBSCRIPTION_ID}"
tenant: "${PACKER_AZURE_TENANT_ID}"
packer-azure-serviceprincipal-sponsorship:
azureEnvironmentName: "Azure"
clientId: "${PACKER_AZURE_CLIENT_ID}"
clientSecret: "${PACKER_AZURE_CLIENT_SECRET_VALUE}"
description: "Azure Service Principal credential used by packer on secondary subscription"
subscriptionId: "${JENKINSINFRA_AZURE_SECONDARY_SUBSCRIPTION_ID}"
tenant: "${PACKER_AZURE_TENANT_ID}"
jenkinsinfraadmin-dockerhub-push: *jenkinsinfraadmin-dockerhub-push-def
jenkins-infra:
name: Puppet (jenkins-infra)
jenkinsfilePath: Jenkinsfile
branchIncludes: "production staging updatecli_* PR-* main"
shared-tools:
name: Shared Tools
kubernetes-jobs:
name: Kubernetes Jobs
description: Folder hosting all the Kubernetes-related jobs
kind: folder
children:
kubernetes-management:
name: Kubernetes Management
description: Managing the Kubernetes-hosted applications
credentials:
sops-client-id:
secret: "${SOPS_CLIENT_ID}"
description: Azure client ID used by sops to decrypt secrets
sops-client-secret:
secret: "${SOPS_CLIENT_SECRET}"
description: Azure client secret used by sops to decrypt secrets
sops-tenant-id:
secret: "${SOPS_TENANT_ID}"
description: Azure tenant id used by sops to decrypt secrets
kubeconfig-cik8s:
fileName: "kubeconfig"
description: "Kubeconfig file for cik8s"
secretBytes: "${base64:${KUBECONFIG_CIK8S}}"
kubeconfig-eks-public:
fileName: "kubeconfig"
description: "Kubeconfig file for eks-public"
secretBytes: "${base64:${KUBECONFIG_EKS_PUBLIC}}"
kubeconfig-doks:
fileName: "kubeconfig"
description: "Kubeconfig file for doks"
secretBytes: "${base64:${KUBECONFIG_DOKS}}"
kubeconfig-doks-public:
fileName: "kubeconfig"
description: "Kubeconfig file for doks-public"
secretBytes: "${base64:${KUBECONFIG_DOKS_PUBLIC}}"
kubeconfig-privatek8s:
fileName: "kubeconfig"
description: "Kubeconfig file for privatek8s"
secretBytes: "${base64:${KUBECONFIG_PRIVATEK8S}}"
kubeconfig-publick8s:
fileName: "kubeconfig"
description: "Kubeconfig file for publick8s"
secretBytes: "${base64:${KUBECONFIG_PUBLICK8S}}"
updatecli:
name: Dependencies Management with Updatecli
kind: folder
credentials:
# Used by updatecli to retrieve AMIs
packer-aws-access-key-id: *packer-aws-access-key-id-def
# Used by updatecli to retrieve AMIs
packer-aws-secret-access-key: *packer-aws-secret-access-key-def
children:
jenkins-infra:
name: Puppet (jenkins-infra)
jenkinsfilePath: Jenkinsfile_updatecli
enableGitHubChecks: true
branchIncludes: "production staging updatecli_* PR-* main"
disableTagDiscovery: true
kubernetes-management:
jenkinsfilePath: Jenkinsfile_updatecli
disableTagDiscovery: true
enableGitHubChecks: true
credentials:
updatecli-azure-serviceprincipal:
azureEnvironmentName: "Azure"
clientId: "${PACKER_AZURE_CLIENT_ID}"
clientSecret: "${PACKER_AZURE_CLIENT_SECRET_VALUE}"
description: "Azure Service Principal credential used by updatecli"
subscriptionId: "${JENKINSINFRA_AZURE_SECONDARY_SUBSCRIPTION_ID}"
tenant: "${PACKER_AZURE_TENANT_ID}"
packer-images:
jenkinsfilePath: Jenkinsfile_updatecli
disableTagDiscovery: true
enableGitHubChecks: true
helm-charts:
name: Helm Charts
description: Custom Helm Charts of the Jenkins Infra
disableTagDiscovery: true
enableGitHubChecks: true
azure:
jenkinsfilePath: Jenkinsfile_updatecli
disableTagDiscovery: true
enableGitHubChecks: true
other-jobs:
name: Other Jobs
description: Folder hosting all the jobs not fitting any category
kind: folder
credentials:
jenkinsinfraadmin-dockerhub-push: *jenkinsinfraadmin-dockerhub-push-def
infracijenkinsio-dockerhub-pull: *infracijenkinsio-dockerhub-pull-def
children:
incrementals-publisher:
name: Incrementals Publisher
jenkinsfilePath: Jenkinsfile
reports:
name: Reports
description: Folder hosting all the reporting tasks jobs
kind: folder
credentials:
azure-reports-access-key:
description: "Azure Storage Key used by infra-reports to publish to a storage bucket"
secret: "${AZURE_INFRA_REPORTS_STORAGE_KEY}"
children:
artifactory-users-report:
name: "Artifactory Users Report"
repository: "infra-reports"
jenkinsfilePath: "artifactory-users-report/Jenkinsfile"
credentials:
artifactoryAdmin:
description: "Artifactory API for updating permissions"
username: "${ARTIFACTORY_API_INFRA_REPORTS_USERNAME}"
usernameSecret: true
password: "${ARTIFACTORY_API_INFRA_REPORTS_PASSWORD}"
backend-extension-indexer:
name: "Backend Extension Indexer"
jenkinsfilePath: Jenkinsfile
fork-report:
name: "GitHub Forks Report"
repository: "infra-reports"
jenkinsfilePath: "fork-report/Jenkinsfile"
credentials:
jenkins-infra-reports:
description: "Github App installed on jenkinsci org for https://github.com/jenkins-infra/infra-reports scripts"
appId: "${GITHUB_APP_JENKINSCI_INFRA_REPORTS_ID}"
owner: "jenkinsci"
privateKey: "${GITHUB_APP_JENKINSCI_INFRA_REPORTS_PRIVATE_KEY}"
jira-users-report:
name: "Jira Users Report"
repository: "infra-reports"
jenkinsfilePath: "jira-users-report/Jenkinsfile"
credentials:
jiraAuth:
description: "Credentials (curl <user>:<password>) for the infra-reports LDAP user to access Jira"
username: "${JIRA_API_INFRA_REPORTS_USERNAME}"
usernameSecret: true
password: "${JIRA_API_INFRA_REPORTS_PASSWORD}"
maintainers-info-report:
name: "Maintainers Jira Infos"
repository: "infra-reports"
jenkinsfilePath: "maintainers-info-report/Jenkinsfile"
credentials:
jiraAuth:
description: "Credentials (curl <user>:<password>) for the infra-reports LDAP user to access Jira"
username: "${JIRA_API_INFRA_REPORTS_USERNAME}"
usernameSecret: true
password: "${JIRA_API_INFRA_REPORTS_PASSWORD}"
jenkins-infra-data:
name: "Jenkins Infrastructure Public Data"
repository: "infra-reports"
jenkinsfilePath: "jenkins-infra-data/Jenkinsfile"
permissions-report:
name: "GitHub Permissions Report"
repository: "infra-reports"
jenkinsfilePath: "permissions-report/Jenkinsfile"
credentials:
githubapp-jenkins-infra-reports-private-key-b64:
description: "Base64 encoded private key of the Github App installed on jenkinsci org for https://github.com/jenkins-infra/infra-reports scripts"
secret: "${GITHUB_APP_JENKINSCI_INFRA_REPORTS_PRIVATE_KEY_B64}"
githubapp-jenkins-infra-reports-app-identifier:
description: "Identifier (integer) of the Github App installed on jenkinsci org for https://github.com/jenkins-infra/infra-reports scripts"
secret: "${GITHUB_APP_JENKINSCI_INFRA_REPORTS_ID}"
pipeline-steps-doc-generator:
name: "Pipeline Steps Documentation Generator"
jenkinsfilePath: Jenkinsfile
plugin-migration:
name: "Plugin Migration Status Report"
repository: "infra-reports"
jenkinsfilePath: "plugin-migration/Jenkinsfile"
credentials:
githubapp-jenkins-infra-reports-private-key-b64:
description: "Base64 encoded private key of the Github App installed on jenkinsci org for https://github.com/jenkins-infra/infra-reports scripts"
secret: "${GITHUB_APP_JENKINSCI_INFRA_REPORTS_PRIVATE_KEY_B64}"
githubapp-jenkins-infra-reports-app-identifier:
description: "Identifier (integer) of the Github App installed on jenkinsci org for https://github.com/jenkins-infra/infra-reports scripts"
secret: "${GITHUB_APP_JENKINSCI_INFRA_REPORTS_ID}"
terraform-jobs:
name: Terraform Jobs
description: Folder hosting all the Terraform-related jobs
kind: folder
credentials:
infracost-api-key:
secret: "${INFRACOST_API_KEY}"
description: Infracost API key
children:
aws:
name: Terraform AWS
description: AWS resources managed by Terraform
credentials:
staging-terraform-aws-access-key:
secret: "${STAGING_TERRAFORM_AWS_ACCESS_KEY_ID}"
description: "AWS access key id for the staging terraform account for jenkins-infra/aws"
staging-terraform-aws-secret-key:
secret: "${STAGING_TERRAFORM_AWS_SECRET_ACCESS_KEY}"
description: "AWS secret key for the staging terraform account for jenkins-infra/aws"
staging-terraform-aws-backend-config:
fileName: backend-config
description: "Terraform backend configuration for the staging environment of jenkins-infra/aws"
secretBytes: "${base64:${STAGING_TERRAFORM_AWS_BACKEND_CONFIG}}"
production-terraform-aws-access-key:
secret: "${PRODUCTION_TERRAFORM_AWS_ACCESS_KEY_ID}"
description: "AWS access key id for the account production-terraform"
production-terraform-aws-secret-key:
secret: "${PRODUCTION_TERRAFORM_AWS_SECRET_ACCESS_KEY}"
description: "AWS secret key for the account production-terraform"
production-terraform-aws-backend-config:
fileName: "backend-config"
secretBytes: "${base64:${PRODUCTION_TERRAFORM_AWS_BACKEND_CONFIG}}"
azure:
name: Terraform Azure
description: "Azure resources managed by Terraform"
credentials:
production-terraform-azure-serviceprincipal:
azureEnvironmentName: "Azure"
clientId: "${PRODUCTION_TERRAFORM_AZURE_CLIENT_ID}"
clientSecret: "${PRODUCTION_TERRAFORM_AZURE_CLIENT_SECRET_VALUE}"
description: "Azure Service Principal credential used by terraform for azure production"
subscriptionId: "${PRODUCTION_TERRAFORM_AZURE_SUBSCRIPTION_ID}"
tenant: "${PRODUCTION_TERRAFORM_AZURE_TENANT_ID}"
production-terraform-azure-backend-config:
fileName: "backend-config"
description: "Terraform backend configuration for the production environment of jenkins-infra/azure"
secretBytes: "${base64:${PRODUCTION_TERRAFORM_AZURE_BACKEND_CONFIG}}"
staging-terraform-azure-serviceprincipal:
azureEnvironmentName: "Azure"
clientId: "${STAGING_TERRAFORM_AZURE_CLIENT_ID}"
clientSecret: "${STAGING_TERRAFORM_AZURE_CLIENT_SECRET_VALUE}"
description: "Azure Service Principal credential used by terraform for azure staging"
subscriptionId: "${STAGING_TERRAFORM_AZURE_SUBSCRIPTION_ID}"
tenant: "${STAGING_TERRAFORM_AZURE_TENANT_ID}"
staging-terraform-azure-backend-config:
fileName: "backend-config"
description: "Terraform backend configuration for the staging environment of jenkins-infra/azure"
secretBytes: "${base64:${STAGING_TERRAFORM_AZURE_BACKEND_CONFIG}}"
azure-net:
name: Terraform Azure-net
description: "Azure-net resources managed by Terraform"
credentials:
production-terraform-azure-net-serviceprincipal:
azureEnvironmentName: "Azure-net"
clientId: "${PRODUCTION_TERRAFORM_AZURE_NET_CLIENT_ID}"
clientSecret: "${PRODUCTION_TERRAFORM_AZURE_NET_CLIENT_SECRET_VALUE}"
description: "Azure Service Principal credential used by terraform for azure-net production"
subscriptionId: "${PRODUCTION_TERRAFORM_AZURE_NET_SUBSCRIPTION_ID}"
tenant: "${PRODUCTION_TERRAFORM_AZURE_NET_TENANT_ID}"
production-terraform-azure-net-backend-config:
fileName: "backend-config"
description: "Terraform backend configuration for the production environment of jenkins-infra/azure-net"
secretBytes: "${base64:${PRODUCTION_TERRAFORM_AZURE_NET_BACKEND_CONFIG}}"
staging-terraform-azure-net-serviceprincipal:
azureEnvironmentName: "Azure-net"
clientId: "${STAGING_TERRAFORM_AZURE_NET_CLIENT_ID}"
clientSecret: "${STAGING_TERRAFORM_AZURE_NET_CLIENT_SECRET_VALUE}"
description: "Azure Service Principal credential used by terraform for azure-net staging"
subscriptionId: "${STAGING_TERRAFORM_AZURE_NET_SUBSCRIPTION_ID}"
tenant: "${STAGING_TERRAFORM_AZURE_NET_TENANT_ID}"
staging-terraform-azure-net-backend-config:
fileName: "backend-config"
description: "Terraform backend configuration for the staging environment of jenkins-infra/azure-net"
secretBytes: "${base64:${STAGING_TERRAFORM_AZURE_NET_BACKEND_CONFIG}}"
cloudflare:
name: Terraform CloudFlare
description: "CloudFlare resources managed by Terraform"
credentials:
staging-cloudflare-api-token:
secret: "${STAGING_CLOUDFLARE_API_TOKEN}"
description: Staging CloudFlare API token for infra.ci
production-cloudflare-api-token:
secret: "${PRODUCTION_CLOUDFLARE_API_TOKEN}"
description: Production CloudFlare API token for infra.ci
production-terraform-cloudflare-backend-config:
fileName: "backend-config"
description: "Terraform backend configuration for the production environment of jenkins-infra/cloudflare"
secretBytes: "${base64:${PRODUCTION_TERRAFORM_CLOUDFLARE_BACKEND_CONFIG}}"
staging-terraform-cloudflare-backend-config:
fileName: "backend-config"
description: "Terraform backend configuration for the staging environment of jenkins-infra/cloudflare"
secretBytes: "${base64:${STAGING_TERRAFORM_CLOUDFLARE_BACKEND_CONFIG}}"
datadog:
name: Terraform Datadog
description: "Datadog resources managed by Terraform"
credentials:
datadog-api-key:
secret: "${PRODUCTION_DATADOG_API_KEY}"
description: Datadog API key for infra.ci
datadog-app-key:
secret: "${PRODUCTION_DATADOG_APP_KEY}"
description: Datadog application key for infra.ci
datadog-jenkinsuser-password:
secret: "${PRODUCTION_DATADOG_JENKINSUSER_PASSWORD}"
description: datadog_monitoring Jenkins technical user password
production-terraform-datadog-backend-config:
fileName: "backend-config"
secretBytes: "${base64:${PRODUCTION_TERRAFORM_DATADOG_BACKEND_CONFIG}}"
digitalocean:
name: Terraform Digital Ocean
description: "Digital Ocean resources managed by Terraform"
credentials:
staging-terraform-digitalocean-pat:
secret: "${STAGING_TERRAFORM_DIGITALOCEAN_PAT}"
description: "Digital Ocean PAT for the staging environment of jenkins-infra/digitalocean"
staging-terraform-digitalocean-backend-config:
fileName: "backend-config"
description: "Terraform backend configuration for the staging environment of jenkins-infra/digitalocean"
secretBytes: "${base64:${STAGING_TERRAFORM_DIGITALOCEAN_BACKEND_CONFIG}}"
production-terraform-digitalocean-pat:
secret: "${PRODUCTION_TERRAFORM_DIGITALOCEAN_PAT}"
description: "Digital Ocean PAT for production"
production-terraform-digitalocean-backend-config:
fileName: "backend-config"
secretBytes: "${base64:${PRODUCTION_TERRAFORM_DIGITALOCEAN_BACKEND_CONFIG}}"
fastly:
name: Terraform Fastly
description: "Fastly resources managed by Terraform"
credentials:
staging-terraform-fastly-api-key:
secret: "${STAGING_TERRAFORM_FASTLY_API_KEY}"
description: Fastly API key for staging (read-only)
staging-terraform-fastly-backend-config:
fileName: "backend-config"
description: "Terraform backend configuration for the staging environment of jenkins-infra/fastly"
secretBytes: "${base64:${STAGING_TERRAFORM_FASTLY_BACKEND_CONFIG}}"
production-terraform-fastly-api-key:
secret: "${PRODUCTION_TERRAFORM_FASTLY_API_KEY}"
description: Fastly API key for production (full access)
production-terraform-fastly-backend-config:
fileName: "backend-config"
description: "Terraform backend configuration for the production environment of jenkins-infra/fastly"
secretBytes: "${base64:${PRODUCTION_TERRAFORM_FASTLY_BACKEND_CONFIG}}"
website-jobs:
name: Website Jobs
description: "Folder hosting all the Website jobs"
kind: folder
credentials:
netlify-auth-token:
description: "Auth token to communicate with netlify"
secret: "${NETLIFY_AUTH_TOKEN}"
children:
jenkins.io:
name: Jenkins.io
description: "Jenkins.io Website"
allowUntrustedChanges: true
stories:
name: Jenkins User Stories
description: "Jenkins User Stories Website"
allowUntrustedChanges: true
jenkinsfilePath: Jenkinsfile
plugin-site:
name: Plugin Site
allowUntrustedChanges: true
jenkinsfilePath: Jenkinsfile
branchIncludes: "main PR-*"
credentials:
PLUGINSITE_STORAGEACCOUNTKEY:
secret: "${PLUGINSITE_STORAGEACCOUNTKEY}"
description: "Azure storage account key for plugin site"
algolia-plugins-app-id:
secret: "${ALGOLIA_PLUGINS_JENKINS_IO_APP_ID}"
description: "Algolia app id for plugin site"
algolia-plugins-search-key:
secret: "${ALGOLIA_PLUGINS_JENKINS_IO_SEARCH_KEY}"
description: "Algolia credentials to read data for plugin site (runtime)"
algolia-plugins-write-key:
secret: "${ALGOLIA_PLUGINS_JENKINS_IO_WRITE_KEY}"
description: "Algolia credentials to write data for plugin site"
infraci-pluginsjenkinsio-fileshare-service-principal-writer:
kind: azure-serviceprincipal
azureEnvironmentName: "Azure"
clientId: "${INFRACI_PLUGINSJENKINSIO_FILESHARE_SERVICE_PRINCIPAL_WRITER_CLIENT_ID}"
clientSecret: "${INFRACI_PLUGINSJENKINSIO_FILESHARE_SERVICE_PRINCIPAL_WRITER_PASSWORD}"
description: "plugins.jenkins.io File Share Service Principal Writer"
subscriptionId: "${JENKINSINFRA_AZURE_PRIMARY_SUBSCRIPTION_ID}"
tenant: "${JENKINSINFRA_AZURE_TENANT_ID}"
jenkins-io-components:
name: Jenkins.io Web Components
allowUntrustedChanges: true
jenkinsfilePath: Jenkinsfile
branchIncludes: "main alpha beta PR-*"
credentials:
jenkinsci-npm-token:
secret: "${JENKINSCI_NPM_AUTOMATION_TOKEN}"
description: "NPM automation token to publish jenkins.io Web Components"
jenkins-io-components-ghapp:
description: "Github App for semantic-release"
appId: "${GITHUB_APP_JENKINS_IO_COMPONENTS_ID}"
owner: "jenkins-infra"
privateKey: "${GITHUB_APP_JENKINS_IO_COMPONENTS_PRIVATE_KEY}"
gatsby-plugin-jenkins-layout:
name: Gatsby plugin for standard Jenkins.io layout
allowUntrustedChanges: true
jenkinsfilePath: Jenkinsfile
branchIncludes: "main alpha beta PR-*"
credentials:
jenkinsci-npm-token:
secret: "${JENKINSCI_NPM_AUTOMATION_TOKEN}"
description: "NPM automation token to publish jenkins.io Web Components"
jenkins-io-components-ghapp:
description: "Github App for semantic-release"
appId: "${GITHUB_APP_JENKINS_IO_COMPONENTS_ID}"
owner: "jenkins-infra"
privateKey: "${GITHUB_APP_JENKINS_IO_COMPONENTS_PRIVATE_KEY}"
contributor-spotlight:
name: Contributor Spotlight
description: "Jenkins Contributor Spotlight Website"
allowUntrustedChanges: true
jenkinsfilePath: Jenkinsfile
enableGitHubChecks: true
credentials:
contributors-jenkins-io-fileshare-sas-querystring:
secret: "${CONTRIBUTORS_JENKINS_IO_FILESHARE_SAS_QUERYSTRING}"
description: "File Share SAS query string to update contributors.jenkins.io content"
contributors-jenkins-io-fileshare-service-principal-writer:
kind: azure-serviceprincipal
azureEnvironmentName: "Azure"
clientId: "${CONTRIBUTORS_SERVICE_PRINCIPAL_WRITER_CLIENT_ID}"
clientSecret: "${CONTRIBUTORS_SERVICE_PRINCIPAL_WRITER_CLIENT_SECRET}"
description: "Contributors.jenkins.io File Share Service Principal Writer"
subscriptionId: "${JENKINSINFRA_AZURE_PRIMARY_SUBSCRIPTION_ID}"
tenant: "${JENKINSINFRA_AZURE_TENANT_ID}"