Skip to content

Commit 323fe08

Browse files
Merge branch 'add-catalog-info' of github.com:elastic/detection-rules-explorer into add-catalog-info
2 parents df4fcaf + 8d886e1 commit 323fe08

File tree

1 file changed

+12
-24
lines changed

1 file changed

+12
-24
lines changed

catalog-info.yaml

Lines changed: 12 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -1,30 +1,18 @@
1-
# Declare your Buildkite pipelines below
1+
# Declare a Backstage Component that represents your application.
22
---
3-
# yaml-language-server: $schema=https://gist.githubusercontent.com/elasticmachine/988b80dae436cafea07d9a4a460a011d/raw/rre.schema.json
3+
# yaml-language-server: $schema=https://json.schemastore.org/catalog-info.json
44
apiVersion: backstage.io/v1alpha1
5-
kind: Resource
5+
kind: Component
66
metadata:
7-
name: buildkite-pipeline-Detection-rules-explorer
8-
description: Buildkite Pipeline for Detection-rules-explorer
9-
links:
10-
- title: Pipeline
11-
url: https://buildkite.com/elastic/Detection-rules-explorer
7+
name: bifrost
8+
description: A web explorer for Detection Rules
9+
annotations:
10+
backstage.io/source-location: "url:https://github.com/elastic/Detection-rules-explorer/"
11+
github.com/project-slug: "elastic/Detection-rules-explorer"
12+
github.com/team-slug: "elastic/threat-research-and-detection-engineering"
13+
buildkite.com/project-slug: "elastic/Detection-rules-explorer"
1214

1315
spec:
14-
type: buildkite-pipeline
16+
type: service
1517
owner: group:threat-research-and-detection-engineering
16-
system: buildkite
17-
implementation:
18-
apiVersion: buildkite.elastic.dev/v1
19-
kind: Pipeline
20-
metadata:
21-
name: Detection-rules-explorer
22-
description:
23-
spec:
24-
repository: elastic/Detection-rules-explorer
25-
pipeline_file: ".buildkite/pipeline.yml"
26-
teams:
27-
threat-research-and-detection-engineering:
28-
access_level: MANAGE_BUILD_AND_READ
29-
everyone:
30-
access_level: READ_ONLY
18+
lifecycle: production

0 commit comments

Comments
 (0)