You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -473,6 +473,7 @@ statement instead the previous block.
473
473
| <aname="input_compliance_pipeline_repo_git_provider"></a> [compliance\_pipeline\_repo\_git\_provider](#input\_compliance\_pipeline\_repo\_git\_provider)| Git provider for compliance pipeline repo. If not set will default to `hostedgit`. |`string`|`""`| no |
474
474
| <aname="input_compliance_pipeline_repo_git_token_secret_crn"></a> [compliance\_pipeline\_repo\_git\_token\_secret\_crn](#input\_compliance\_pipeline\_repo\_git\_token\_secret\_crn)| The CRN of the Git token used for accessing the sample application repository. |`string`|`""`| no |
475
475
| <aname="input_compliance_pipeline_repo_git_token_secret_name"></a> [compliance\_pipeline\_repo\_git\_token\_secret\_name](#input\_compliance\_pipeline\_repo\_git\_token\_secret\_name)| Name of the Git token secret in the secret provider used for accessing the compliance pipelines repository. |`string`|`""`| no |
476
+
| <aname="input_compliance_pipeline_repo_name"></a> [compliance\_pipeline\_repo\_name](#input\_compliance\_pipeline\_repo\_name)| Sets the name for the compliance pipelines repository if cloned. The expected behaviour is to link to an existing compliance-pipelines repository. |`string`|`""`| no |
476
477
| <aname="input_compliance_pipeline_repo_root_url"></a> [compliance\_pipeline\_repo\_root\_url](#input\_compliance\_pipeline\_repo\_root\_url)| (Optional) The Root URL of the server. e.g. https://git.example.com.|`string`|`""`| no |
477
478
| <aname="input_compliance_pipeline_repo_secret_group"></a> [compliance\_pipeline\_repo\_secret\_group](#input\_compliance\_pipeline\_repo\_secret\_group)| Secret group for the Compliance Pipeline repository secret. Defaults to the value set in `sm_secret_group` if not set. Only used with `Secrets Manager`. |`string`|`""`| no |
478
479
| <aname="input_compliance_pipeline_repo_title"></a> [compliance\_pipeline\_repo\_title](#input\_compliance\_pipeline\_repo\_title)| (Optional) The title of the server. e.g. My Git Enterprise Server. |`string`|`""`| no |
@@ -495,11 +496,13 @@ statement instead the previous block.
495
496
| <aname="input_create_ibmcloud_api_key"></a> [create\_ibmcloud\_api\_key](#input\_create\_ibmcloud\_api\_key)| Set to `true` to create and add an `ibmcloud-api-key` to the Secrets Provider. |`bool`|`false`| no |
496
497
| <aname="input_create_icr_namespace"></a> [create\_icr\_namespace](#input\_create\_icr\_namespace)| Set to `true` to have Terraform create the registry namespace. Setting to `false` will have the CI pipeline create the namespace if it does not already exist. Note: If a Terraform destroy is used, the ICR namespace along with all images will be removed. |`bool`|`false`| no |
497
498
| <aname="input_create_kubernetes_access_policy"></a> [create\_kubernetes\_access\_policy](#input\_create\_kubernetes\_access\_policy)| Add a Kubernetes access policy to the generated IAM access key. See `create_ibmcloud_api_key`. |`bool`|`false`| no |
499
+
| <aname="input_create_privateworker_secret"></a> [create\_privateworker\_secret](#input\_create\_privateworker\_secret)| Set to `true` to add a specified private worker service api key to the Secrets Provider. |`bool`|`false`| no |
498
500
| <aname="input_create_secret_group"></a> [create\_secret\_group](#input\_create\_secret\_group)| Set to `true` to create the specified Secrets Manager secret group. |`bool`|`false`| no |
499
501
| <aname="input_create_signing_key"></a> [create\_signing\_key](#input\_create\_signing\_key)| Set to `true` to create and add a `signing-key` and the `signing-certificate` to the Secrets Provider. |`bool`|`false`| no |
500
502
| <aname="input_create_triggers"></a> [create\_triggers](#input\_create\_triggers)| Set to `true` to create the default triggers associated with the compliance repos and sample app. |`string`|`"true"`| no |
501
503
| <aname="input_enable_key_protect"></a> [enable\_key\_protect](#input\_enable\_key\_protect)| Set to `true` to the enable Key Protect integrations. |`string`|`"false"`| no |
502
504
| <aname="input_enable_pipeline_notifications"></a> [enable\_pipeline\_notifications](#input\_enable\_pipeline\_notifications)| When enabled, pipeline run events will be sent to the Event Notifications and Slack integrations in the enclosing toolchain. |`string`|`""`| no |
505
+
| <aname="input_enable_privateworker"></a> [enable\_privateworker](#input\_enable\_privateworker)| Set to `true` to enable private workers for the CI, CD, CC and PR pipelines. A valid service api key must be set in Secrets Manager. The name of this secret can be specified using `privateworker_credentials_secret_name`. |`string`|`"false"`| no |
503
506
| <aname="input_enable_secrets_manager"></a> [enable\_secrets\_manager](#input\_enable\_secrets\_manager)| Set to `true` to enable the Secrets Manager integrations. |`string`|`"true"`| no |
504
507
| <aname="input_enable_slack"></a> [enable\_slack](#input\_enable\_slack)| Set to `true` to create the Slack toolchain integration. This requires a valid `slack_channel_name`, `slack_team_name`, and a valid `webhook` (see `slack_webhook_secret_name`). This setting applies for CI, CD, and CC toolchains. |`string`|`"false"`| no |
505
508
| <aname="input_environment_prefix"></a> [environment\_prefix](#input\_environment\_prefix)| By default `ibm:yp:`. This will be set as the prefix to regions automatically where required. For example `ibm:yp:us-south`. |`string`|`"ibm:yp:"`| no |
@@ -560,6 +563,11 @@ statement instead the previous block.
560
563
| <aname="input_pipeline_ibmcloud_api_key_secret_name"></a> [pipeline\_ibmcloud\_api\_key\_secret\_name](#input\_pipeline\_ibmcloud\_api\_key\_secret\_name)| Name of the Cloud API key secret in the secret provider for running the pipelines. Applies to the CI, CD and CC toolchains. |`string`|`"ibmcloud-api-key"`| no |
561
564
| <aname="input_pr_pipeline_git_tag"></a> [pr\_pipeline\_git\_tag](#input\_pr\_pipeline\_git\_tag)| The GIT tag selector for the Compliance Pipelines definitions. |`string`|`""`| no |
562
565
| <aname="input_prefix"></a> [prefix](#input\_prefix)| A prefix that is added to the toolchain resources. |`string`|`""`| no |
566
+
| <aname="input_privateworker_credentials_secret_crn"></a> [privateworker\_credentials\_secret\_crn](#input\_privateworker\_credentials\_secret\_crn)| The CRN for the Private Worker secret secret. |`string`|`""`| no |
567
+
| <aname="input_privateworker_credentials_secret_group"></a> [privateworker\_credentials\_secret\_group](#input\_privateworker\_credentials\_secret\_group)| Secret group prefix for the Private Worker secret. Defaults to using `sm_secret_group` if not set. Only used with `Secrets Manager`. |`string`|`""`| no |
568
+
| <aname="input_privateworker_credentials_secret_name"></a> [privateworker\_credentials\_secret\_name](#input\_privateworker\_credentials\_secret\_name)| Name of the privateworker secret in the secret provider. |`string`|`""`| no |
569
+
| <aname="input_privateworker_name"></a> [privateworker\_name](#input\_privateworker\_name)| The name of the private worker tool integration. |`string`|`"private-worker-tool-01"`| no |
570
+
| <aname="input_privateworker_secret_value"></a> [privateworker\_secret\_value](#input\_privateworker\_secret\_value)| The private worker service api key that will be added to the `privateworker_credentials_secret_name` secret in the secrets provider. |`string`|`""`| no |
563
571
| <aname="input_registry_namespace"></a> [registry\_namespace](#input\_registry\_namespace)| A unique namespace within the IBM Cloud Container Registry region where the application image is stored. |`string`|`""`| no |
564
572
| <aname="input_repo_blind_connection"></a> [repo\_blind\_connection](#input\_repo\_blind\_connection)| Setting this value to `true` means the server is not addressable on the public internet. IBM Cloud will not be able to validate the connection details you provide. Certain functionality that requires API access to the git server will be disabled. Delivery pipeline will only work using a private worker that has network access to the git server. |`string`|`""`| no |
565
573
| <aname="input_repo_git_id"></a> [repo\_git\_id](#input\_repo\_git\_id)| The Git ID for the compliance repositories. |`string`|`""`| no |
0 commit comments