OpenShiftPipelinesAsCode
OpenShiftPipelinesAsCode custom resource allows the user to install and manage OpenShift PipelinesAsCode.
It is recommended that you install OpenShiftPipelinesAsCode through TektonConfig.
-
OpenShiftPipelinesAsCode CR is as below
- On OpenShift, OpenShiftPipelinesAsCode CR is as below:
apiVersion: operator.tekton.dev/v1alpha1 kind: OpenShiftPipelinesAsCode metadata: name: pipelines-as-code spec: additionalPACControllers: controllername: enable: true configMapName: secretName: settings: enable: true settings: application-name: Pipelines as Code CI auto-configure-new-github-repo: "false" bitbucket-cloud-check-source-ip: "true" custom-console-name: "" custom-console-url: "" custom-console-url-pr-details: "" custom-console-url-pr-tasklog: "" error-detection-from-container-logs: "false" error-detection-max-number-of-lines: "50" error-detection-simple-regexp: ^(?P<filename>[^:]*):(?P<line>[0-9]+):(?P<column>[0-9]+):([ ]*)?(?P<error>.*) error-log-snippet: "true" enable-cancel-in-progress-on-pull-requests: "false" enable-cancel-in-progress-on-push: "false" hub-catalog-name: tekton hub-url: https://api.hub.tekton.dev/v1 skip-push-event-for-pr-commits: "true" remote-tasks: "true" secret-auto-create: "true" secret-github-app-token-scoped: "true" targetNamespace: openshift-pipelines -
Check the status of the installation using following command:
kubectl get openshiftpipelinesascodes.operator.tekton.dev
PipelinesAsCode Config
The recommended way to update the OpenShiftPipelinesAsCode CR is using TektonConfig CR.
Properties (Mandatory)
-
targetNamespaceSet this field to provide the namespace in which you want to install the PipelinesAsCode component.
Properties (Optional)
The fields have default values so even if the user has not passed them in CR, operator will add them. The user can later change them as per their need.
Details of the field can be found in OpenShift Pipelines As Code Settings
Additional Pipelines As Code Controller (Optional)
If users want to deploy additional Pipelines As Code controller on their cluster along with default Pipelines As Code
controller then they need to provide the additionalPACControllers field in the pipelinesAsCode section.
Example:
pipelinesAsCode:
additionalPACControllers: # can provide a list of controllers
<controllername>:
enable:
configMapName:
secretName:
settings:
-
controllernameis the unique name of the new controller, should not be more than 25 characters and should follow k8s naming rules. -
enableis optional with default value to true. You can use this field to disable the additional PAC controller without removing the details from the CR. -
configMapNameis optional and is to provide the ConfigMap name of additional PAC Controller. If user doesn’t provide any value then Operator will add controllerName +-pipelines-as-code-configmapas default value. If user provides configMap name aspipelines-as-codefor additional Pipelines As Code controller, then operator will not create the configMap and the defaultpipeline-as-codeconfigMap will be used with default settings. -
secretNameis optional and is to provide the secret name of additional PAC Controller. If user does not provide any value then operator will add controllerName +-pipelines-as-code-secretas default value to be added to deployment env. -
settingsis optional and used to set the settings in the configMap of additional PAC Controller. For the fields whose are not provided, default value will be used. You can check them here. Also, if configmap name is provided aspipelines-as-codethen these settings will not be taken.
NOTE: Users can deploy multiple additional PAC Controller by providing multiple entries in
additionalPACControllersfield.
Example:
pipelinesAsCode:
additionalPACControllers:
firstcontroller:
enable: true
secondcontroller:
enable: true
configMapName: second-config
secretName: second-secret
Feedback
Was this page helpful?