-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy path.env.example
More file actions
52 lines (43 loc) · 2.6 KB
/
.env.example
File metadata and controls
52 lines (43 loc) · 2.6 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
# OpsPortal — Environment Variables
# Copy to .env and adjust as needed.
# ── Server ─────────────────────────────────────────────────────────────────
OPSPORTAL_HOST=127.0.0.1
OPSPORTAL_PORT=8000
OPSPORTAL_DEBUG=false
OPSPORTAL_LOG_LEVEL=info
# ── Paths ──────────────────────────────────────────────────────────────────
# Path to the YAML tool manifest
OPSPORTAL_MANIFEST_PATH=opsportal.yaml
# Base directory for resolving relative tool repo paths
OPSPORTAL_TOOLS_BASE_DIR=..
# Where generated artifacts (HTML dashboards, reports) are stored
OPSPORTAL_ARTIFACT_DIR=artifacts
# Working directory for temporary files
OPSPORTAL_WORK_DIR=work
# ── Process Management ─────────────────────────────────────────────────────
OPSPORTAL_PROCESS_STARTUP_TIMEOUT=30
OPSPORTAL_CLI_TASK_TIMEOUT=300
OPSPORTAL_LOG_BUFFER_SIZE=5000
OPSPORTAL_HEALTH_CHECK_INTERVAL=30
# ── Tool Config Overrides ─────────────────────────────────────────────────
# Override the default config file location for ReleaseBoard.
# If unset, the adapter searches: repo_path/, tools_base_dir/, cwd/
# OPSPORTAL_RELEASEBOARD_CONFIG=/path/to/releaseboard.json
# Override the default config file location for LocaleSync.
# OPSPORTAL_LOCALESYNC_CONFIG=/path/to/localesync.json
# ── Corporate Proxy / SSL (auto-propagated to child tools) ─────────────────
# These are standard environment variables. Set them in your shell or here.
# OpsPortal automatically forwards them to all child tool subprocesses.
#
# HTTP_PROXY=http://proxy.corp.example.com:8080
# HTTPS_PROXY=http://proxy.corp.example.com:8080
# NO_PROXY=localhost,127.0.0.1,.corp.example.com
#
# ── Custom CA Certificates ─────────────────────────────────────────────────
# If your organisation uses SSL inspection (Zscaler, Netskope, etc.),
# point these to your corporate CA bundle:
#
# SSL_CERT_FILE=/etc/ssl/certs/corporate-ca-bundle.pem
# REQUESTS_CA_BUNDLE=/etc/ssl/certs/corporate-ca-bundle.pem
# CURL_CA_BUNDLE=/etc/ssl/certs/corporate-ca-bundle.pem
# NODE_EXTRA_CA_CERTS=/etc/ssl/certs/corporate-ca-bundle.pem