Skip to content

Commit ab60fea

Browse files
Merge branch 'main' into DIGCS-1-migrate-bibucket-to-github
2 parents 70cd6f3 + 4cb9e37 commit ab60fea

File tree

172 files changed

+12762
-3394
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

172 files changed

+12762
-3394
lines changed

docs/actions-and-automations/create-self-service-experiences/setup-ui-for-action/advanced-form-configurations.md

Lines changed: 58 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -233,9 +233,13 @@ values={[
233233

234234
<TabItem value="visible">
235235

236-
The `visible` property is used to dynamically hide/show inputs in the form.
236+
The `visible` property is used to dynamically hide/show elements in the form.
237237
The `visible` value could be set to either a boolean (`true` value is always shown, `false` value is always hidden), or to a `jqQuery` which evaluates to a boolean.
238238

239+
<h4>Input-level visibility</h4>
240+
241+
You can apply `visible` to individual inputs to control their display:
242+
239243
In this example, the `runArguments` properties are configured with `visible` so that they only show up in the form when the matching value is selected in the `language` input:
240244

241245
<Tabs
@@ -318,6 +322,59 @@ action = Action(
318322

319323
</Tabs>
320324

325+
<h4>Step-level visibility</h4>
326+
327+
You can also apply `visible` to entire steps to control their display:
328+
329+
In this example, the `AWS Configuration` and `Azure Configuration` steps are conditionally shown based on the values selected in the first step's cloud provider input:
330+
331+
<Tabs
332+
defaultValue="api"
333+
values={[
334+
{label: 'API', value: 'api'}
335+
]}>
336+
337+
<TabItem value="api">
338+
339+
```json showLineNumbers
340+
{
341+
"userInputs": {
342+
"properties": {
343+
"enum": {
344+
"icon": "DefaultProperty",
345+
"title": "Cloud provider",
346+
"type": "array",
347+
"items": {
348+
"enum": [ "aws", "azure" ],
349+
"enumColors": { "aws": "red", "azure": "blue" },
350+
"type": "string"
351+
}
352+
}
353+
},
354+
"required": [],
355+
"steps": [
356+
{
357+
"title": "Cloud selection",
358+
"order": [ "enum" ]
359+
},
360+
{
361+
"title": "AWS configuration",
362+
"order": [],
363+
"visible": { "jqQuery": ".form.enum | index(\"aws\") != null" }
364+
},
365+
{
366+
"title": "Azure configuration",
367+
"order": [],
368+
"visible": { "jqQuery": ".form.enum | index(\"azure\") != null" }
369+
}
370+
]
371+
}
372+
}
373+
```
374+
</TabItem>
375+
376+
</Tabs>
377+
321378
</TabItem>
322379

323380
<TabItem value="dependsOn">

docs/actions-and-automations/setup-backend/webhook/port-execution-agent/usage.md

Lines changed: 20 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,6 @@ For example:
2222
```json showLineNumbers
2323
{ "type": "WEBHOOK", "agent": true, "url": "URL_TO_API_INSIDE_YOUR_NETWORK" }
2424
```
25-
2625
:::
2726

2827
Well Done! **Port Agent** is now running in your environment and will trigger any webhook that you've configured (for self-service actions, or changes in the software catalog).
@@ -56,7 +55,7 @@ env:
5655
VAR_NAME: VAR_VALUE
5756
```
5857
59-
### Proxy configuration
58+
### Proxy configuration
6059
6160
#### `HTTP_PROXY`, `HTTPS_PROXY` & `ALL_PROXY`
6261
`HTTP_PROXY`, `HTTPS_PROXY`, and `ALL_PROXY` are environment variables used to specify a proxy server for handling HTTP, HTTPS, or all types of requests, respectively. The values assigned to these settings should be the URL of the proxy server.
@@ -81,7 +80,15 @@ For more information take a look at the Requests [proxy configuration documentat
8180

8281
### SSL Environment Configuration
8382

84-
#### `REQUESTS_CA_BUNDLE`
83+
### Certificate Configuration
84+
85+
#### Self-signed certificate
86+
87+
Use the following Helm values:
88+
- Set `selfSignedCertificate.enabled` to `true`.
89+
- Put your PEM-encoded CA content in `selfSignedCertificate.certificate`.
90+
91+
The certificate should be mounted to `/usr/local/share/ca-certificates/`.
8592

8693
`REQUESTS_CA_BUNDLE` is an environment variable used to specify a custom Certificate Authority (CA) bundle for verifying SSL/TLS certificates in HTTPS requests.
8794

@@ -94,6 +101,16 @@ REQUESTS_CA_BUNDLE=/path/to/cacert.pem
94101

95102
This configuration directs the `requests` library to use the specified CA bundle for SSL/TLS certificate verification, overriding default system settings. It's useful for trusting self-signed certificates or certificates from a private CA.
96103

104+
#### Multiple certificates
105+
106+
Use the following Helm values:
107+
- Keep your certificate via `selfSignedCertificate` as above.
108+
- Add other certificates by supplying files via `extraVolumes` and mounting them with `extraVolumeMounts` into the container at `/usr/local/share/ca-certificates/<your-cert-name>.crt`.
109+
110+
:::info Certificate file requirements
111+
- Each certificate must be provided in a separate PEM file. Files containing multiple certificates are not supported.
112+
- Certificates must be mounted to `/usr/local/share/ca-certificates/` with a `.crt` file extension.
113+
:::
97114

98115
## Next Steps
99116

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
11
{
22
"label": "AI agents",
3-
"position": 1
3+
"position": 5
44
}

0 commit comments

Comments
 (0)