Usage:
atlantis server [flags]
Flags:
--allow-fork-prs > Allow Atlantis to run on pull requests from forks. A security issue for
public repos.
--atlantis-url string > URL that Atlantis can be reached at. Defaults to http://$(hostname):$port
where $port is from --port.
--config string > Path to config file.
--data-dir string > Path to directory to store Atlantis data. (default "~/.atlantis")
--gh-hostname string > Hostname of your Github Enterprise installation. If using github.com, no
need to set. (default "github.com")
--gh-token string > GitHub token of API user. Can also be specified via the ATLANTIS_GH_TOKEN
environment variable.
--gh-user string > GitHub username of API user.
--gh-webhook-secret string > Secret used to validate GitHub webhooks (see
https://developer.github.com/webhooks/securing/). SECURITY WARNING: If not
specified, Atlantis won't be able to validate that the incoming webhook
call came from GitHub. This means that an attacker could spoof calls to
Atlantis and cause it to perform malicious actions. Should be specified via
the ATLANTIS_GH_WEBHOOK_SECRET environment variable.
--gitlab-hostname string > Hostname of your GitLab Enterprise installation. If using gitlab.com, no
need to set. (default "gitlab.com")
--gitlab-token string > GitLab token of API user. Can also be specified via the
ATLANTIS_GITLAB_TOKEN environment variable.
--gitlab-user string > GitLab username of API user.
--gitlab-webhook-secret string > Optional secret used to validate GitLab webhooks. SECURITY WARNING: If
not specified, Atlantis won't be able to validate that the incoming webhook
call came from GitLab. This means that an attacker could spoof calls to
Atlantis and cause it to perform malicious actions. Should be specified via
the ATLANTIS_GITLAB_WEBHOOK_SECRET environment variable.
-h, --help help for server
--log-level string > Log level. Either debug, info, warn, or error. (default "info")
--port int > Port to bind to. (default 4141)
--repo-whitelist string > Comma separated list of repositories that Atlantis will operate on, ex.
'github.com/runatlantis/atlantis,github.mycompany.com/*'. The format is
{hostname}/{owner}/{repo}. '*' denotes any string until the next comma and
can be used to whitelist all repos (not recommended) or an entire hostname
or organization.
--require-approval > Require pull requests to be "Approved" before allowing the apply command
to be run.
--ssl-cert-file string > File containing x509 Certificate used for serving HTTPS. If the cert is
signed by a CA, the file should be the concatenation of the server's
certificate, any intermediates, and the CA's certificate.
--ssl-key-file string > File containing x509 private key matching --ssl-cert-file.
Start the atlantis server
Flags can also be set in a yaml config file (see --config).
Config file values are overridden by environment variables which in turn are overridden by flags.
Usage:
atlantis server [flags]
Flags:
--allow-fork-prs Allow Atlantis to run on pull requests from forks. A security issue for
public repos.
--atlantis-url string URL that Atlantis can be reached at. Defaults to http://$(hostname):$port
where $port is from --port.
--config string Path to config file.
--data-dir string Path to directory to store Atlantis data. (default "~/.atlantis")
--gh-hostname string Hostname of your Github Enterprise installation. If using github.com, no
need to set. (default "github.com")
--gh-token string GitHub token of API user. Can also be specified via the ATLANTIS_GH_TOKEN
environment variable.
--gh-user string GitHub username of API user.
--gh-webhook-secret string Secret used to validate GitHub webhooks (see
https://developer.github.com/webhooks/securing/). SECURITY WARNING: If not
specified, Atlantis won't be able to validate that the incoming webhook
call came from GitHub. This means that an attacker could spoof calls to
Atlantis and cause it to perform malicious actions. Should be specified via
the ATLANTIS_GH_WEBHOOK_SECRET environment variable.
--gitlab-hostname string Hostname of your GitLab Enterprise installation. If using gitlab.com, no
need to set. (default "gitlab.com")
--gitlab-token string GitLab token of API user. Can also be specified via the
ATLANTIS_GITLAB_TOKEN environment variable.
--gitlab-user string GitLab username of API user.
--gitlab-webhook-secret string Optional secret used to validate GitLab webhooks. SECURITY WARNING: If not
specified, Atlantis won't be able to validate that the incoming webhook
call came from GitLab. This means that an attacker could spoof calls to
Atlantis and cause it to perform malicious actions. Should be specified via
the ATLANTIS_GITLAB_WEBHOOK_SECRET environment variable.
-h, --help help for server
--log-level string Log level. Either debug, info, warn, or error. (default "info")
--port int Port to bind to. (default 4141)
--repo-whitelist string Comma separated list of repositories that Atlantis will operate on, ex.
'github.com/runatlantis/atlantis,github.mycompany.com/*'. The format is
{hostname}/{owner}/{repo}. '*' denotes any string until the next comma and
can be used to whitelist all repos (not recommended) or an entire hostname
or organization.
--require-approval Require pull requests to be "Approved" before allowing the apply command to
be run.
--ssl-cert-file string File containing x509 Certificate used for serving HTTPS. If the cert is
signed by a CA, the file should be the concatenation of the server's
certificate, any intermediates, and the CA's certificate.
--ssl-key-file string File containing x509 private key matching --ssl-cert-file.