<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Usage Guide on Pipelines as Code</title><link>/docs/guide/</link><description>Recent content in Usage Guide on Pipelines as Code</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><atom:link href="/docs/guide/index.xml" rel="self" type="application/rss+xml"/><item><title>Repository CR</title><link>/docs/guide/repositorycrd/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>/docs/guide/repositorycrd/</guid><description>Repository CR # The Repository CR serves the following purposes:
Informing Pipelines-as-Code that an event from a specific URL needs to be handled. Specifying the namespace where the PipelineRuns will be executed. Referencing an API secret, username, or API URL if necessary for Git provider platforms that require it (e.g., when using webhooks instead of the GitHub application). Providing the last PipelineRun statuses for the repository (5 by default).</description></item><item><title>Resolver</title><link>/docs/guide/resolver/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>/docs/guide/resolver/</guid><description>Pipelines-as-Code resolver # The Pipelines-as-Code resolver ensures that the PipelineRun you are running doesn&amp;rsquo;t conflict with others.
Pipelines-as-Code parses any files ending with a .yaml or .yml suffix in the .tekton directory and subdirectory at the root of your repository. It will automatically attempt to detect any Tekton resources like Pipeline, PipelineRun, Task.
When detecting a PipelineRun it will try to resolve it as a single PipelineRun with an embedded PipelineSpec of the referenced Task or Pipeline.</description></item><item><title>Authoring PipelineRun</title><link>/docs/guide/authoringprs/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>/docs/guide/authoringprs/</guid><description>Authoring PipelineRuns in .tekton/ directory # Pipelines-as-Code will always try to be as close to the Tekton template as possible. Usually, you will write your template and save them with a .yaml extension, and Pipelines-as-Code will run them.
The .tekton directory must be at the top level of the repo. You can reference YAML files in other repos using remote URLs (see Remote HTTP URLs for more information), but PipelineRuns will only be triggered by events in the repository containing the .</description></item><item><title>Matching a PipelineRun</title><link>/docs/guide/matchingevents/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>/docs/guide/matchingevents/</guid><description>Matching a PipelineRun to a Git provider Event # A PipelineRun can be matched to a Git provider event by using specific annotations in the PipelineRun metadata.
For example, when you have these as metadata in your PipelineRun:
metadata: name: pipeline-pr-main annotations: pipelinesascode.tekton.dev/on-target-branch: &amp;#34;[main]&amp;#34; pipelinesascode.tekton.dev/on-event: &amp;#34;[pull_request]&amp;#34; Pipelines-as-Code will match the PipelineRun pipeline-pr-main if the Git provider events target the branch main and it&amp;rsquo;s coming from a [pull_request]</description></item><item><title>Running the PipelineRun</title><link>/docs/guide/running/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>/docs/guide/running/</guid><description>Running the PipelineRun # Pipelines-as-Code (PAC) can be used to run pipelines on events such as pushes or pull requests. When an event occurs, PAC will try to match it to any PipelineRuns located in the .tekton directory of your repository that are annotated with the appropriate event type.
The PipelineRuns definitions are fetched from the .tekton directory at the root of your repository from where the event comes from, this is unless you have configured the provenance from the default branch on your Repository CR.</description></item><item><title>GitOps Commands</title><link>/docs/guide/gitops_commands/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>/docs/guide/gitops_commands/</guid><description>GitOps Commands # Pipelines-as-Code supports the concept of GitOps commands, which allow users to issue special commands in a comment on a Pull Request or a pushed commit to control Pipelines-as-Code.
The advantage of using a GitOps command is that it provides a journal of all the executions of your pipeline directly on your Pull Request, near your code.
GitOps Commands on Pull Requests # For example, when you are on a Pull Request, you may want to restart all your PipelineRuns.</description></item><item><title>PipelineRun status</title><link>/docs/guide/statuses/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>/docs/guide/statuses/</guid><description>Status # GitHub apps # After the PipelineRun has finished, its status will be shown in the GitHub Check tabs, along with a concise overview of the status the name and the duration of each task in the pipeline. If the task has a displayName it will use it as the description of the task or otherwise just the task name.
If any step fails, a small portion of the log from that step will also be included in the output.</description></item><item><title>Private Repositories</title><link>/docs/guide/privaterepo/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>/docs/guide/privaterepo/</guid><description>Private repositories # Pipelines-as-Code allows the use of private repositories by creating or updating a secret in the target namespace. This secret contains the user token required for the git-clone task to clone private repositories.
Whenever Pipelines-as-Code creates a new PipelineRun in the target namespace, it also creates a secret with a specific name format:
pac-gitauth-REPOSITORY_OWNER-REPOSITORY_NAME-RANDOM_STRING
This secret contains a Git Config file named .gitconfig and a Git credentials file named .</description></item><item><title>PipelineRuns Cleanup</title><link>/docs/guide/cleanups/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>/docs/guide/cleanups/</guid><description>PipelineRuns Cleanups # There can be many PipelineRuns into a user namespace and Pipelines-as-Code has the ability to only keep a certain amount of PipelineRuns and cleaning the old ones.
When your PipelineRun has this annotation :
pipelinesascode.tekton.dev/max-keep-runs: &amp;#34;maxNumber&amp;#34; Pipelines-as-Code sees this and will start cleaning up right after one of the PipelineRun finishes to a successful execution keeping only the last maxNumber of PipelineRuns.
It will skip the Running or Pending PipelineRuns but will not skip the PipelineRuns with Unknown status.</description></item><item><title>Custom Parameters</title><link>/docs/guide/customparams/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>/docs/guide/customparams/</guid><description>Custom Parameters # Using the {{ param }} syntax, Pipelines-as-Code lets you expand a variable or the payload body inside a template within your PipelineRun.
By default, several variables are exposed according to the event. To view all the variables exposed by default, refer to the documentation on Authoring PipelineRuns.
With the custom parameter, you can specify some custom values to be replaced inside the template.
Utilizing the Tekton PipelineRun parameters feature may generally be the preferable approach, and custom params expansion should only be used in specific scenarios where Tekton params cannot be used.</description></item><item><title>Incoming Webhook</title><link>/docs/guide/incoming_webhook/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>/docs/guide/incoming_webhook/</guid><description>Incoming webhook # Pipelines-as-Code support the concept of incoming webhook URL. It let you trigger PipelineRun in a Repository using a shared secret and URL, instead of creating a new code iteration.
Incoming Webhook URL # To use incoming webhooks in Pipelines-as-Code, you must configure the incoming field in your Repository CRD. This field references a Secret, which serves as the shared secret, as well as the branches targeted by the incoming webhook.</description></item><item><title>Policy on actions</title><link>/docs/guide/policy/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>/docs/guide/policy/</guid><description>Policy on Pipelines-as-Code Actions # Pipelines-as-Code uses policies to control which actions can be performed by users who belong to specific teams within an organization, as defined on GitHub or other supported Git providers (currently GitHub and Gitea).
This feature is supported on the following providers
Git Provider Supported GitHub App ✅️ GitHub Webhook ✅️ Gitea ✅️ GitLab ❌️ Bitbucket Cloud ❌️ Bitbucket Data Center ❌️ Supported Actions # pull_request - This action triggers the CI in Pipelines-as-Code.</description></item><item><title>CLI tkn-pac</title><link>/docs/guide/cli/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>/docs/guide/cli/</guid><description>Pipelines-as-Code CLI # Pipelines-as-Code provides a powerful CLI designed to work as a plug-in to the Tekton CLI (tkn).
tkn pac allows you to:
bootstrap: quickly bootstrap a Pipelines-as-Code installation. create: create a new Pipelines-as-Code Repository definition. delete: delete an existing Pipelines-as-Code Repository definition. generate: generate a simple pipelinerun to get you started with Pipelines-as-Code. list: list Pipelines-as-Code Repositories. logs: show the logs of a PipelineRun from a Repository CRD.</description></item></channel></rss>