pipelines-as-code ConfigMap in the pipelines-as-code namespace. This ConfigMap controls various aspects of the controller behavior, from authentication to error detection.
Viewing the Configuration
To view the current configuration:Configuration Reference
All configuration options are defined in thedata section of the ConfigMap. Below is the complete reference for all available settings.
Application Settings
The name of the application shown in PipelineRun results. If using GitHub App, you must also update this label in the GitHub App settings.
Authentication & Security
Automatically create a secret with the token generated through the GitHub application for use with private repositories.
Scope GitHub App installation tokens to only the repository where the event originated, rather than all repositories the app has access to.This is recommended when the GitHub App is installed on an organization with a mix of public and private repositories where not all users should have access to private repositories.
Add additional repositories to the token scope without completely disabling token scoping. Repositories must be part of the same GitHub App installation.Example:
Remote Tasks & Catalogs
Allow fetching remote tasks using PipelineRun annotations.
The base URL for the hub API used to fetch tasks and pipelines.
The type of hub catalog. Supported values:
artifacthub- For Artifact Hub (default)tektonhub- For custom self-hosted Tekton Hub instances
Additional Catalogs
You can configure multiple custom catalogs using numbered prefixes:Error Detection & Reporting
Show a log snippet of the failed task when a PipelineRun fails. Disable this if your pipelines may leak sensitive values in logs.
Number of lines to display in error log snippets. GitHub Check interface has a 65,535 character limit, so use conservative values.
Inspect container logs to detect error messages and expose them as annotations on Pull Requests. Only supported with GitHub Apps.
Maximum number of lines to inspect from container logs for error detection. Use
-1 for unlimited lines. Increasing this value may increase watcher memory usage.Regular expression used for simple error detection. The regexp must include named groups:
filename, line, column, and error.Default pattern matches errors like: test.js:100:10: an error occurredPipeline Run Management
Automatically cancel in-progress PipelineRuns when a pull request is updated. Helps conserve resources by preventing outdated runs.
Automatically cancel in-progress PipelineRuns when a new push occurs on the same branch.
Individual PipelineRuns can override global cancel-in-progress settings using the
pipelinesascode.tekton.dev/on-cancel-in-progress annotation.Maximum value allowed for the
pipelinesascode.tekton.dev/max-keep-runs annotation. When users set this annotation, the value must be less than or equal to this limit.Default number of PipelineRuns to keep. Applied to all PipelineRuns without a
max-keep-runs annotation.Prevent duplicate PipelineRuns when a commit appears in both a push event and a pull request. If a pushed commit is part of an open PR, the push event is skipped.Note: This does not apply to git tag push events, which always trigger pipeline runs.
Auto-Configuration
Automatically configure newly created GitHub repositories by creating a namespace and Repository CR. Only supported with GitHub App.
Template for generating namespace names for auto-configured repositories.Available variables:
{{repo_owner}}- The repository owner{{repo_name}}- The repository name
{{repo_owner}}-{{repo_name}}-ci creates owner-repo-ci for https://github.com/owner/repoTemplate for generating Repository CR names for auto-configured repositories.Available variables:
{{repo_owner}}- The repository owner{{repo_name}}- The repository name
Security Settings
When enabled, CI automatically re-runs on pull request updates after initial
/ok-to-test approval.Require
/ok-to-test comments to include the specific commit SHA. Prevents race conditions where malicious code is pushed after approval but before CI runs.Example: /ok-to-test sha=abc123def456Bitbucket Cloud Settings
Verify webhook requests from Bitbucket Cloud by checking against Atlassian IP ranges. Only applies to public Bitbucket (when
provider.url is not set in Repository spec).Additional IPs or networks to allow for Bitbucket Cloud webhooks. Supports specific IPs (
127.0.0.1) or networks (127.0.0.0/16). Separate multiple values with commas.Dashboard Integration
URL of the Tekton Dashboard. When set, Pipelines as Code generates links to PipelineRun status and task logs in the dashboard.
Custom Console Configuration
Name of your custom console (e.g., “MyCorp Console”)
Root URL of your custom console (e.g., “https://mycorp.com”)
URL template for viewing PipelineRun details. Supports template variables:
{{namespace}}- Target namespace{{pr}}- PipelineRun name- Any custom parameters from Repository CR
https://mycorp.com/ns/{{namespace}}/pipelinerun/{{pr}}URL template for viewing task logs. Supports template variables:
{{namespace}}- Target namespace{{pr}}- PipelineRun name{{task}}- Task name{{pod}}- Pod name{{firstFailedStep}}- First failed step name
https://mycorp.com/ns/{{namespace}}/pr/{{pr}}/logs/{{task}}#{{pod}}-{{firstFailedStep}}Example ConfigMap
Applying Configuration Changes
To update configuration:See Also
- Global Repository Settings - Configure default settings for all repositories
- Logging Configuration - Configure log levels and debugging
- Metrics - Monitor Pipelines as Code with Prometheus