You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/2.0/docs/pipelines/installation/addinggitlabrepo.md
+19-8Lines changed: 19 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -13,6 +13,15 @@ Before you begin, make sure you have:
13
13
- Completed the [Pipelines Auth setup for GitLab](/2.0/docs/pipelines/installation/viamachineusers#gitlab) and setup a machine user with appropriate PAT tokens
14
14
- Local access to Gruntwork's GitHub repositories, specifically [boilerplate](https://github.com/gruntwork-io/boilerplate) and the [architecture catalog](https://github.com/gruntwork-io/terraform-aws-architecture-catalog/)
15
15
16
+
:::info
17
+
18
+
**For custom GitLab instances only**: You must [fork](https://docs.gitlab.com/user/project/repository/forking_workflow/#create-a-fork) Gruntwork's public [Pipelines workflow project](https://gitlab.com/gruntwork-io/pipelines-workflows) into your own GitLab instance.
19
+
20
+
This is necessary because Gruntwork Pipelines uses [GitLab CI/CD components](/2.0/docs/pipelines/architecture/ci-workflows), and GitLab requires components to reside within the [same GitLab instance as the project referencing them](https://docs.gitlab.com/ci/components/#use-a-component).
21
+
22
+
When creating the fork, we recommend configuring it as a public mirror of the original Gruntwork project and ensuring that tags are included.
23
+
:::
24
+
16
25
## Setup Process Overview
17
26
18
27
Setting up Gruntwork Pipelines for GitLab involves these main steps:
@@ -32,9 +41,12 @@ Setting up Gruntwork Pipelines for GitLab involves these main steps:
32
41
To use Gruntwork Pipelines with GitLab, your group needs authorization from Gruntwork:
2. Wait for confirmation that your group has been authorized.
40
52
@@ -94,11 +106,11 @@ First, you'll need to install [mise](https://mise.jdx.dev/), a powerful environm
94
106
95
107
4. Download the sample [vars.yaml file](https://github.com/gruntwork-io/terraform-aws-architecture-catalog/blob/main/examples/gitlab-pipelines/vars.yaml) to the root of <CustomizableValueid="REPOSITORY_NAME" />
96
108
97
-
4. Edit the `vars.yaml` file to customize it for your environment
109
+
4. Edit the `vars.yaml` file to customize it for your environment. If using a custom GitLab instance, update any custom instance variables.
98
110
99
111
5.`cd` to the root of <CustomizableValueid="REPOSITORY_NAME" /> where you wish to install Gruntwork Pipelines. Run the boilerplate tool to generate your repository structure:
If you encounter SSH issues, verify your SSH access to GitHub:
@@ -119,9 +131,8 @@ First, you'll need to install [mise](https://mise.jdx.dev/), a powerful environm
119
131
120
132
### Step 4: Install AWS OIDC Provider and IAM Roles for Pipelines
121
133
122
-
123
-
1. Navigate to the `_global` folder under each account in your repository and review the Terraform files that were created:
124
-
- The GitLab OIDC identity provider in AWS
134
+
1. Navigate to the `_global` folder under each account in your repository and review the Terragrunt files that were created:
135
+
- The GitLab OIDC identity provider in AWS. **Note:** If using a custom GitLab instance, ensure the `URL` and `audiences` inputs in this configuration are correct.
125
136
- IAM roles for your the account (`root-pipelines-plan` and `root-pipelines-apply`)
126
137
127
138
2. Apply these configurations to create the required AWS resources:
0 commit comments