Skip to content

Commit 1645b75

Browse files
committed
fix: Removing unnecessary GitLab content
1 parent fad28ad commit 1645b75

File tree

1 file changed

+0
-103
lines changed

1 file changed

+0
-103
lines changed

docs/2.0/docs/pipelines/installation/addinggitlabrepo.mdx

Lines changed: 0 additions & 103 deletions
Original file line numberDiff line numberDiff line change
@@ -330,109 +330,6 @@ terragrunt run --all --non-interactive --provider-cache apply
330330

331331
:::
332332

333-
## Creating `.gruntwork` HCL configurations
334-
335-
Create [HCL configurations](/2.0/reference/pipelines/configurations-as-code/) in the `.gruntwork` directory in the root of your `infrastructure-live` repository to tell Pipelines how you plan to organize your infrastructure, and how you plan to have Pipelines authenticate with your cloud provider(s).
336-
337-
### The `repository` block
338-
339-
The core configuration that you'll want to start with is the `repository` block. This block tells Pipelines which branch has the "live" infrastructure you want provisioned. When you merge IaC to this branch, Pipelines will be triggered to update your infrastructure accordingly.
340-
341-
```hcl title=".gruntwork/repository.hcl"
342-
repository {
343-
deploy_branch_name = "main"
344-
}
345-
```
346-
347-
:::note Progress Checklist
348-
349-
<PersistentCheckbox id="create-repository-hcl" label="Create a new `.gruntwork/repository.hcl` file in the root of your `infrastructure-live` repository with the contents above." />
350-
<PersistentCheckbox id="edit-repository-deploy-branch-name" label="Edit the value of `deploy_branch_name` in `.gruntwork/repository.hcl` if necessary." />
351-
352-
:::
353-
354-
### The `environment` block
355-
356-
Next, you'll want to define the environments you want to manage with Pipelines using the [`environment` block](/2.0/reference/pipelines/configurations-as-code/api#environment-block).
357-
358-
For each environment, you'll want to define a [`filter` block](/2.0/reference/pipelines/configurations-as-code/api#filter-block) that tells Pipelines which units are part of that environment. You'll also want to define an [`authentication` block](/2.0/reference/pipelines/configurations-as-code/api#authentication-block) that tells Pipelines how to authenticate with your cloud provider(s) for that environment.
359-
360-
```hcl title=".gruntwork/environment-an-aws-account.hcl"
361-
environment "an_aws_account" {
362-
filter {
363-
paths = ["an-aws-account/*"]
364-
}
365-
366-
authentication {
367-
aws_oidc {
368-
account_id = "123456789012"
369-
plan_iam_role_arn = "arn:aws:iam::123456789012:role/pipelines-plan"
370-
apply_iam_role_arn = "arn:aws:iam::123456789012:role/pipelines-apply"
371-
}
372-
}
373-
}
374-
```
375-
376-
:::tip
377-
378-
Learn more about how Pipelines authenticates to AWS in the [Authenticating to AWS](/2.0/docs/pipelines/concepts/cloud-auth/aws) page.
379-
380-
:::
381-
382-
:::tip
383-
384-
Check out the [aws block](/2.0/reference/pipelines/configurations-as-code/#aws-blocks) for more information on how to configure Pipelines to authenticate with AWS conveniently.
385-
386-
:::
387-
388-
:::note Progress Checklist
389-
390-
<PersistentCheckbox id="create-aws-environment-hcl" label="Create a new `.gruntwork/environment-an-aws-account.hcl` file in the root of your `infrastructure-live` repository with the contents above." />
391-
<PersistentCheckbox id="rename-aws-environment-hcl" label="Rename the file to match the name of the environment you want to manage with pipelines." />
392-
<PersistentCheckbox id="edit-aws-environment-label" label="Edit the label of the `environment` block from `an_aws_account` to the name of the environment you want to manage with pipelines." />
393-
<PersistentCheckbox id="edit-aws-filter-paths" label="Edit the value of `paths` in the `filter` block so that the glob matches the path to the units you want to manage with Pipelines as part of that environment." />
394-
<PersistentCheckbox id="edit-aws-account-id" label="Edit the value of `account_id` in the `aws_oidc` block so that it matches the AWS account ID of the account you want to authenticate with." />
395-
<PersistentCheckbox id="edit-aws-plan-iam-role-arn" label="Edit the value of `plan_iam_role_arn` and `apply_iam_role_arn` in the `aws_oidc` block so that they match the IAM roles you want to assume for plans and applies for that environment." />
396-
397-
:::
398-
399-
## Creating `.gitlab-ci.yml`
400-
401-
Create a `.gitlab-ci.yml` file in the root of your `infrastructure-live` repository with the following content:
402-
403-
```yaml title=".gitlab-ci.yml"
404-
include:
405-
- component: gitlab.com/gruntwork-io/pipelines-workflows/gitlab-ci@v4
406-
inputs:
407-
stage: pipelines
408-
```
409-
410-
:::info
411-
412-
**For custom GitLab instances only**: If you are using a custom GitLab instance, you must update the component reference to point to your forked version of the pipelines-workflows project:
413-
414-
```yaml title=".gitlab-ci.yml"
415-
include:
416-
- component: your-gitlab-instance.com/your-group/pipelines-workflows/gitlab-ci@v4
417-
inputs:
418-
stage: pipelines
419-
```
420-
421-
:::
422-
423-
:::tip
424-
425-
You can read the [Pipelines GitLab CI Component](https://gitlab.com/gruntwork-io/pipelines-workflows/-/blob/main/templates/gitlab-ci.yml) to learn how this GitLab CI component calls the Pipelines CLI to run your pipelines.
426-
427-
:::
428-
429-
:::note Progress Checklist
430-
431-
<PersistentCheckbox id="create-gitlab-ci-yml" label="Create a new `.gitlab-ci.yml` file in the root of your `infrastructure-live` repository with the contents above." />
432-
<PersistentCheckbox id="update-gitlab-ci-component-reference" label="If using a custom GitLab instance, update the component reference to point to your forked pipelines-workflows project." />
433-
434-
:::
435-
436333
## Commit and push your changes
437334

438335
Commit and push your changes to your repository.

0 commit comments

Comments
 (0)