Authoring PipelineRuns in .tekton/
directory
#
Pipelines-as-Code will always try to be as close to the tekton template as possible. Usually you will write your template and save them with a
.yaml
extension and Pipelines-as-Code will run them.The
.tekton
directory must be at the top level of the repo. You can reference YAML files in other repos using remote URLs (see Remote HTTP URLs for more information), but PipelineRuns will only be triggered by events in the repository containing the.tekton
directory.Using its resolver Pipelines-as-Code will try to bundle the PipelineRun with all its Task as a single PipelineRun with no external dependencies.
Inside your pipeline you need to be able to check out the commit as received from the webhook by checking it out the repository from that ref. Most of the time you want to reuse the git-clone task from the tektoncd/catalog.
To be able to specify parameters of your commit and URL, Pipelines-as-Code give you some “dynamic” variables that is defined according to the execution of the events. Those variables look like this
{{ var }}
and can be used anywhere in your template, see below for the list of available variables.For Pipelines-as-Code to process your
PipelineRun
, you must have either an embeddedPipelineSpec
or a separatePipeline
object that references a YAML file in the.tekton
directory. The Pipeline object can includeTaskSpecs
, which may be defined separately as Tasks in another YAML file in the same directory. It’s important to give eachPipelineRun
a unique name to avoid conflicts. PipelineRuns with duplicate names will never be matched.
Dynamic variables #
Here is a list of al the dynamic variables available in Pipelines-as-Code. The
one that would be the most important to you would probably be the revision
and repo_url
variables, they will give you the commit SHA and the repository URL that is
getting tested. You usually use this with the
git-clone task to be able to
checkout the code that is being tested.
Variable | Description | Example | Example Output |
---|---|---|---|
body | The full payload body (see below) | {{body.pull_request.user.email }} | [email protected] |
event_type | The event type (eg: pull_request or push ) | {{event_type}} | pull_request (see the note for Gitops Comments here ) |
git_auth_secret | The secret name auto generated with provider token to check out private repos. | {{git_auth_secret}} | pac-gitauth-xkxkx |
headers | The request headers (see below) | {{headers['x-github-event']}} | push |
pull_request_number | The pull or merge request number, only defined when we are in a pull_request event type. | {{pull_request_number}} | 1 |
repo_name | The repository name. | {{repo_name}} | pipelines-as-code |
repo_owner | The repository owner. | {{repo_owner}} | openshift-pipelines |
repo_url | The repository full URL. | {{repo_url}} | https:/github.com/repo/owner |
revision | The commit full sha revision. | {{revision}} | 1234567890abcdef |
sender | The sender username (or accountid on some providers) of the commit. | {{sender}} | johndoe |
source_branch | The branch name where the event come from. | {{source_branch}} | main |
source_url | The source repository URL from which the event come from (same as repo_url for push events). | {{source_url}} | https:/github.com/repo/owner |
target_branch | The branch name on which the event targets (same as source_branch for push events). | {{target_branch}} | main |
target_namespace | The target namespace where the Repository has matched and the PipelineRun will be created. | {{target_namespace}} | my-namespace |
trigger_comment | The comment triggering the pipelinerun when using a GitOps command (like /test , /retest ) | {{trigger_comment}} | /merge-pr branch |
Matching an event to a PipelineRun #
Each PipelineRun
can match different Git provider events through some special
annotations on the PipelineRun
.
For example when you have these metadatas in
your PipelineRun
:
metadata:
name: pipeline-pr-main
annotations:
pipelinesascode.tekton.dev/on-target-branch: "[main]"
pipelinesascode.tekton.dev/on-event: "[pull_request]"
Pipelines-as-Code
will match the pipelinerun pipeline-pr-main
if the Git
provider events target the branch main
and it’s coming from a [pull_request]
There is many ways to match an event to a PipelineRun, head over to this patch page for a more details.
Using the body and headers in a Pipelines-as-Code parameter #
Pipelines-as-Code let you access the full body and headers of the request as a CEL expression.
This allows you to go beyond the standard variables and even play with multiple conditions and variable to output values.
For example if you want to get the title of the Pull Request in your PipelineRun you can simply access it like this:
{{ body.pull_request.title }}
You can then get creative and for example mix the variable inside a python script to evaluate the json.
This task for example is using python and will check the labels on the PR,
exit 0
if it has the label called ‘bug’ on the pull request or exit 1
if it
doesn’t:
taskSpec:
steps:
- name: check-label
image: registry.access.redhat.com/ubi9/ubi
script: |
#!/usr/bin/env python3
import json
labels=json.loads("""{{ body.pull_request.labels }}""")
for label in labels:
if label['name'] == 'bug':
print('This is a PR targeting a BUG')
exit(0)
print('This is not a PR targeting a BUG :(')
exit(1)
The expression are CEL expressions so you can as well make some conditional:
- name: bash
image: registry.access.redhat.com/ubi9/ubi
script: |
if {{ body.pull_request.state == "open" }}; then
echo "PR is Open"
fi
if the PR is open the condition then return true
and the shell script see this
as a valid boolean.
Headers from the payload body can be accessed from the headers
keyword, note that headers are case sensitive,
for example this will show the GitHub event type for a GitHub event:
{{ headers['X-Github-Event'] }}
and then you can do the same conditional or access as described above for the body
keyword.
Using the temporary GitHub APP Token for GitHub API operations #
You can use the temporary installation token that is generated by Pipelines as Code from the GitHub App to access the GitHub API.
The token value is stored into the temporary git-auth secret as generated for private
repositories in the key git-provider-token
.
As an example if you want to add a comment to your pull request, you can use the github-add-comment task from the Tekton Hub using a pipelines as code annotation:
pipelinesascode.tekton.dev/task: "github-add-comment"
you can then add the task to your tasks section (or finally tasks) of your PipelineRun :
[...]
tasks:
- name:
taskRef:
name: github-add-comment
params:
- name: REQUEST_URL
value: "{{ repo_url }}/pull/{{ pull_request_number }}"
- name: COMMENT_OR_FILE
value: "Pipelines-as-Code IS GREAT!"
- name: GITHUB_TOKEN_SECRET_NAME
value: "{{ git_auth_secret }}"
- name: GITHUB_TOKEN_SECRET_KEY
value: "git-provider-token"
Since we are using the dynamic variables we are able to reuse this on any PullRequest from any repositories.
and for completeness, here is another example how to set the GITHUB_TOKEN environment variable on a task step:
env:
- name: GITHUB_TOKEN
valueFrom:
secretKeyRef:
name: "{{ git_auth_secret }}"
key: "git-provider-token"
- On GitHub apps the generated installation token will be available for 8 hours
- On GitHub apps the token is scoped to the repository the event (payload) come from unless configured it differently on cluster.
Example #
Pipelines as code
test itself, you can see the examples in its
.tekton repository.