OpenShiftPipelinesAsCode
OpenShiftPipelinesAsCode custom resource allows the user to install and manage OpenShift PipelinesAsCode.
It is recommended that you install OpenShiftPipelinesAsCode through TektonConfig.
-
OpenShiftPipelinesAsCode CR is as below
- On OpenShift, OpenShiftPipelinesAsCode CR is as below:
apiVersion: operator.tekton.dev/v1alpha1 kind: OpenShiftPipelinesAsCode metadata: name: pipelines-as-code spec: additionalPACControllers: controllername: enable: true configMapName: secretName: settings: enable: true settings: application-name: Pipelines as Code CI auto-configure-new-github-repo: "false" bitbucket-cloud-check-source-ip: "true" custom-console-name: "" custom-console-url: "" custom-console-url-pr-details: "" custom-console-url-pr-tasklog: "" error-detection-from-container-logs: "false" error-detection-max-number-of-lines: "50" error-detection-simple-regexp: ^(?P<filename>[^:]*):(?P<line>[0-9]+):(?P<column>[0-9]+):([ ]*)?(?P<error>.*) error-log-snippet: "true" hub-catalog-name: tekton hub-url: https://api.hub.tekton.dev/v1 remote-tasks: "true" secret-auto-create: "true" secret-github-app-token-scoped: "true" targetNamespace: openshift-pipelines
-
Check the status of the installation using following command:
kubectl get openshiftpipelinesascodes.operator.tekton.dev
PipelinesAsCode Config
The recommended way to update the OpenShiftPipelinesAsCode CR is using TektonConfig CR.
Properties (Mandatory)
-
targetNamespace
Set this field to provide the namespace in which you want to install the PipelinesAsCode component.
Properties (Optional)
The fields have default values so even if the user has not passed them in CR, operator will add them. The user can later change them as per their need.
Details of the field can be found in OpenShift Pipelines As Code Settings
Additional Pipelines As Controller (Optional)
If users want to deploy additional Pipelines As Code controller on their cluster along with default Pipelines As Code
controller then they need to provide the additionalPACControllers
field in the pipelinesAsCode
section.
Example:
pipelinesAsCode:
additionalPACControllers: # can provide a list of controllers
<controllername>:
enable:
configMapName:
secretName:
settings:
-
controllername
is the unique name of the new controller, should not be more than 25 characters and should follow k8s naming rules. -
enable
is optional with default value to true. You can use this field to disable the additional PAC controller without removing the details from the CR. -
configMapName
is optional and is to provide the ConfigMap name of additional PAC Controller. If user doesn’t provide any value then Operator will add controllerName +-pipelines-as-code-configmap
as default value. If user provides configMap name aspipelines-as-code
for additional Pipelines As Code controller, then operator will not create the configMap and the defaultpipeline-as-code
configMap will be used with default settings. -
secretName
is optional and is to provide the secret name of additional PAC Controller. If user does not provide any value then operator will add controllerName +-pipelines-as-code-secret
as default value to be added to deployment env. -
settings
is optional and used to set the settings in the configMap of additional PAC Controller. For the fields whose are not provided, default value will be used. You can check them here. Also, if configmap name is provided aspipelines-as-code
then these settings will not be taken.
NOTE: Users can deploy multiple additional PAC Controller by providing multiple entries in
additionalPACControllers
field.
Example:
pipelinesAsCode:
additionalPACControllers:
firstcontroller:
enable: true
secondcontroller:
enable: true
configMapName: second-config
secretName: second-secret
Feedback
Was this page helpful?