PipelineResources
in a pipeline are the set of objects that are going to be
used as inputs to a Task
and can be output by a Task
.
A Task
can have multiple inputs and outputs.
For example:
- A
Task
's input could be a GitHub source which contains your application code. - A
Task
's output can be your application container image which can be then deployed in a cluster. - A
Task
's output can be a jar file to be uploaded to a storage bucket.
To define a configuration file for a PipelineResource
, you can specify the
following fields:
- Required:
apiVersion
- Specifies the API version, for exampletekton.dev/v1alpha1
.kind
- Specify thePipelineResource
resource object.metadata
- Specifies data to uniquely identify thePipelineResource
object, for example aname
.spec
- Specifies the configuration information for yourPipelineResource
resource object.type
- Specifies thetype
of thePipelineResource
- Optional:
params
- Parameters which are specific to each type ofPipelineResource
Resources can be used in Tasks and Conditions.
Input resources, like source code (git) or artifacts, are dumped at path
/workspace/task_resource_name
within a mounted
volume and are available
to all steps
of your Task
. The path that the resources are mounted
at can be overridden with the targetPath
field.
Steps can use the path
variable substitution key to refer to the local path to the mounted resource.
Task
and Condition
specs can refer resource params as well as pre-defined variables such as
path
using the variable substitution syntax below where <name>
is the resource's name
and <key>
is one of the resource's params
:
For an input resource in a Task
spec:
$(inputs.resources.<name>.<key>)
Or for an output resource:
$(outputs.resources.<name>.<key>)
Input resources can be accessed by:
$(resources.<name>.<key>)
The path
key is pre-defined and refers to the local path to a resource on the mounted volume
$(inputs.resources.<name>.path)
The optional field targetPath
can be used to initialize a resource in a specific
directory. If targetPath
is set, the resource will be initialized under
/workspace/targetPath
. If targetPath
is not specified, the resource will be
initialized under /workspace
. The following example demonstrates how git input
repository could be initialized in $GOPATH
to run tests:
apiVersion: tekton.dev/v1alpha1
kind: Task
metadata:
name: task-with-input
namespace: default
spec:
inputs:
resources:
- name: workspace
type: git
targetPath: go/src/github.com/tektoncd/pipeline
steps:
- name: unit-tests
image: golang
command: ["go"]
args:
- "test"
- "./..."
workingDir: "/workspace/go/src/github.com/tektoncd/pipeline"
env:
- name: GOPATH
value: /workspace/go
When specifying input and output PipelineResources
, you can optionally specify
paths
for each resource. paths
will be used by TaskRun
as the resource's
new source paths i.e., copy the resource from a specified list of paths. TaskRun
expects the folder and contents to be already present in specified paths.
The paths
feature could be used to provide extra files or altered version of
existing resources before the execution of steps.
The output resource includes the name and reference to the pipeline resource and optionally
paths
. paths
will be used by TaskRun
as the resource's new destination
paths i.e., copy the resource entirely to specified paths. TaskRun
will be
responsible for the creation of required directories and content transition.
The paths
feature could be used to inspect the results of TaskRun
after the execution of steps.
paths
feature for input and output resources is heavily used to pass the same
version of resources across tasks in context of PipelineRun
.
In the following example, Task
and TaskRun
are defined with an input resource,
output resource and step, which builds a war artifact. After the execution of
TaskRun
(volume-taskrun
), custom
volume will have the entire resource
java-git-resource
(including the war artifact) copied to the destination path
/custom/workspace/
.
apiVersion: tekton.dev/v1alpha1
kind: Task
metadata:
name: volume-task
namespace: default
spec:
inputs:
resources:
- name: workspace
type: git
outputs:
resources:
- name: workspace
steps:
- name: build-war
image: objectuser/run-java-jar #https://hub.docker.com/r/objectuser/run-java-jar/
command: jar
args: ["-cvf", "projectname.war", "*"]
volumeMounts:
- name: custom-volume
mountPath: /custom
apiVersion: tekton.dev/v1alpha1
kind: TaskRun
metadata:
name: volume-taskrun
namespace: default
spec:
taskRef:
name: volume-task
inputs:
resources:
- name: workspace
resourceRef:
name: java-git-resource
outputs:
resources:
- name: workspace
paths:
- /custom/workspace/
resourceRef:
name: java-git-resource
volumes:
- name: custom-volume
emptyDir: {}
When resources are bound inside a TaskRun
, they can include extra information in the TaskRun
Status.ResourcesResult field.
This information can be useful for auditing the exact resources used by a TaskRun
later.
Currently the Image and Git resources use this mechanism.
For an example of what this output looks like:
resourcesResult:
- key: digest
value: sha256:a08412a4164b85ae521b0c00cf328e3aab30ba94a526821367534b81e51cb1cb
resourceRef:
name: skaffold-image-leeroy-web
The git
resource represents a git repository, that contains
the source code to be built by the pipeline. Adding the git
resource as an input
to a Task
will clone this repository and allow the Task
to perform the required
actions on the contents of the repo.
To create a git resource using the PipelineResource
CRD:
apiVersion: tekton.dev/v1alpha1
kind: PipelineResource
metadata:
name: wizzbang-git
namespace: default
spec:
type: git
params:
- name: url
value: https://github.com/wizzbangcorp/wizzbang.git
- name: revision
value: master
Params that can be added are the following:
url
: represents the location of the git repository, you can use this to change the repo, e.g. to use a forkrevision
: Git revision (branch, tag, commit SHA or ref) to clone. You can use this to control what commit or branch is used. If no revision is specified, the resource will default tolatest
frommaster
.
When used as an input, the Git resource includes the exact commit fetched in the resourceResults
section of the taskRun
's status object:
resourceResults:
- key: commit
value: 6ed7aad5e8a36052ee5f6079fc91368e362121f7
resourceRef:
name: skaffold-git
The Url
parameter can be used to point at any git repository, for example to
use a GitHub fork at master:
spec:
type: git
params:
- name: url
value: https://github.com/bobcatfish/wizzbang.git
The revision
can be any
git commit-ish (revision).
You can use this to create a git PipelineResource
that points at a branch, for
example:
spec:
type: git
params:
- name: url
value: https://github.com/wizzbangcorp/wizzbang.git
- name: revision
value: some_awesome_feature
To point at a pull request, you can use the pull requests's branch:
spec:
type: git
params:
- name: url
value: https://github.com/wizzbangcorp/wizzbang.git
- name: revision
value: refs/pull/52525/head
The pullRequest
resource represents a pull request event from a source control
system.
Adding the Pull Request resource as an input to a Task
will populate the
workspace with a set of files containing generic pull request related metadata
such as base/head commit, comments, and labels.
The payloads will also contain links to raw service-specific payloads where appropriate.
Adding the Pull Request resource as an output of a Task
will update the source
control system with any changes made to the pull request resource during the
pipeline.
Example file structure:
/workspace/
/workspace/<resource>/
/workspace/<resource>/labels/
/workspace/<resource>/labels/<label>
/workspace/<resource>/status/
/workspace/<resource>/status/<status>
/workspace/<resource>/comments/
/workspace/<resource>/comments/<comment>
/workspace/<resource>/head
/workspace/<resource>/base
More details:
Labels are empty files, named after the desired label string.
Status is represented as a set of json files, structured like this:
{
"ID": "foobar",
"Description": "description",
"URL": "https://www.example.com",
"Code": "success"
}
References (head and base) are a set of json files, structured like this:
{
"Repo": "https://gitlab.com/foo/bar",
"Branch": "master",
"SHA": "b813c8fcb1e6245dcbe5ab3c14259fac2e75a799"
}
Comments are a set of json files, structured like this:
{
"Text": "comment body",
"Author": "author",
"ID": 202131633
}
See types.go for the full payload spec.
To create a pull request resource using the PipelineResource
CRD:
apiVersion: tekton.dev/v1alpha1
kind: PipelineResource
metadata:
name: wizzbang-pr
namespace: default
spec:
type: pullRequest
params:
- name: url
value: https://github.com/wizzbangcorp/wizzbang/pulls/1
secrets:
- fieldName: githubToken
secretName: github-secrets
secretKey: token
---
apiVersion: v1
kind: Secret
metadata:
name: github-secrets
type: Opaque
data:
token: github_personal_access_token_secret # in base64 encoded form
Params that can be added are the following:
url
: represents the location of the pull request to fetch.
The following status codes are available to use for the Pull Request resource:
Status |
---|
success |
neutral |
queued |
in_progress |
failure |
unknown |
error |
timeout |
canceled |
action_required |
Note: Status codes are currently case sensitive.
For more information on how Tekton Pull Request status codes convert to SCM provider statuses, see pullrequest-init/README.md.
The pullRequest
resource will look for GitHub OAuth authentication tokens in
spec secrets with a field name called githubToken
.
URLs should be of the form: tektoncd#1
An image
resource represents an image that lives in a remote repository. It is
usually used as a Task
output
for Tasks
that build
images. This allows the same Tasks
to be used to generically push to any
registry.
Params that can be added are the following:
url
: The complete path to the image, including the registry and the image tagdigest
: The image digest which uniquely identifies a particular build of an image with a particular tag. While this can be provided as a parameter, there is not yet a way to update this value after an image is built, but this is planned in #216.
For example:
apiVersion: tekton.dev/v1alpha1
kind: PipelineResource
metadata:
name: kritis-resources-image
namespace: default
spec:
type: image
params:
- name: url
value: gcr.io/staging-images/kritis
To surface the image digest in the output of the taskRun
the builder tool
should produce this information in a
OCI Image Spec
index.json
file. This file should be placed on a location as specified in the
task definition under the default resource directory, or the specified targetPath
.
If there is only one image in the index.json
file, the digest of that image is exported;
otherwise, the digest of the whole image index would be exported.
For example this build-push task defines the outputImageDir
for the
builtImage
resource in /workspace/buildImage
apiVersion: tekton.dev/v1alpha1
kind: Task
metadata:
name: build-push
spec:
inputs:
resources:
- name: workspace
type: git
outputs:
resources:
- name: builtImage
type: image
targetPath: /workspace/builtImage
steps: ...
If no value is specified for targetPath
, it will default to
/workspace/output/{resource-name}
.
Please check the builder tool used on how to pass this path to create the output file.
The taskRun
will include the image digest in the resourcesResult
field that
is part of the taskRun.Status
for example:
status:
...
resourcesResult:
- digest: sha256:eed29cd0b6feeb1a92bc3c4f977fd203c63b376a638731c88cacefe3adb1c660
name: skaffold-image-leeroy-web
...
If the index.json
file is not produced, the image digest will not be included
in the taskRun
output.
A cluster
resource represents a Kubernetes cluster other than the current cluster
Tekton Pipelines is running on. A common use case for this resource is to deploy
your application/function on different clusters.
The resource will use the provided parameters to create a
kubeconfig
file that can be used by other steps in the pipeline Task
to access the target
cluster. The kubeconfig will be placed in
/workspace/<your-cluster-name>/kubeconfig
on your Task
container
The Cluster resource has the following parameters:
name
(required): The name to be given to the target cluster, will be used in the kubeconfig and also as part of the path to the kubeconfig fileurl
(required): Host url of the master nodeusername
(required): the user with access to the clusterpassword
: to be used for clusters with basic authnamespace
: The namespace to target in the clustertoken
: to be used for authentication, if present will be used ahead of the passwordinsecure
: to indicate server should be accessed without verifying the TLS certificate.cadata
(required): holds PEM-encoded bytes (typically read from a root certificates bundle).
Note: Since only one authentication technique is allowed per user, either a
token
or a password
should be provided, if both are provided, the password
will be ignored.
The following example shows the syntax and structure of a cluster
resource:
apiVersion: tekton.dev/v1alpha1
kind: PipelineResource
metadata:
name: test-cluster
spec:
type: cluster
params:
- name: url
value: https://10.10.10.10 # url to the cluster master node
- name: cadata
value: LS0tLS1CRUdJTiBDRVJ.....
- name: token
value: ZXlKaGJHY2lPaU....
For added security, you can add the sensitive information in a Kubernetes Secret and populate the kubeconfig from them.
For example, create a secret like the following example:
apiVersion: v1
kind: Secret
metadata:
name: target-cluster-secrets
data:
cadatakey: LS0tLS1CRUdJTiBDRVJUSUZ......tLQo=
tokenkey: ZXlKaGJHY2lPaUpTVXpJMU5pSXNJbX....M2ZiCg==
and then apply secrets to the cluster resource
apiVersion: tekton.dev/v1alpha1
kind: PipelineResource
metadata:
name: test-cluster
spec:
type: cluster
params:
- name: url
value: https://10.10.10.10
- name: username
value: admin
secrets:
- fieldName: token
secretKey: tokenKey
secretName: target-cluster-secrets
- fieldName: cadata
secretKey: cadataKey
secretName: target-cluster-secrets
Example usage of the cluster
resource in a Task
, using variable substitution:
apiVersion: tekton.dev/v1alpha1
kind: Task
metadata:
name: deploy-image
namespace: default
spec:
inputs:
resources:
- name: workspace
type: git
- name: dockerimage
type: image
- name: testcluster
type: cluster
steps:
- name: deploy
image: image-with-kubectl
command: ["bash"]
args:
- "-c"
- kubectl --kubeconfig
/workspace/$(inputs.resources.testCluster.name)/kubeconfig --context
$(inputs.resources.testCluster.name) apply -f /workspace/service.yaml'
To use the cluster
resource with Google Kubernetes Engine, you should use the cadata
authentication
mechanism.
To determine the caData, you can use the following gcloud
commands:
gcloud container clusters describe <cluster-name> --format='value(masterAuth.clusterCaCertificate)'
To create a secret with this information, you can use:
CADATA=$(gcloud container clusters describe <cluster-name> --format='value(masterAuth.clusterCaCertificate)')
kubectl create secret generic cluster-ca-data --from-literal=cadata=$CADATA
To retrieve the URL, you can use this gcloud command:
gcloud container clusters describe <cluster-name> --format='value(endpoint)'
Then to use these in a resource, reference the cadata from the secret you created above, and use the IP address from the gcloud command as your url (prefixed with https://):
spec:
type: cluster
params:
- name: url
value: https://<ip address determined above>
- name: name
value: mycluster
secrets:
- fieldName: cadata
secretName: cluster-ca-data
secretKey: cadata
The storage
resource represents blob storage, that contains either an object or
directory. Adding the storage resource as an input to a Task
will download the
blob and allow the Task
to perform the required actions on the contents of the
blob.
Only blob storage type Google Cloud Storage(gcs) is supported as of now via GCS storage resource and BuildGCS storage resource.
The gcs
storage resource points to
Google Cloud Storage blob.
To create a GCS type of storage resource using the PipelineResource
CRD:
apiVersion: tekton.dev/v1alpha1
kind: PipelineResource
metadata:
name: wizzbang-storage
namespace: default
spec:
type: storage
params:
- name: type
value: gcs
- name: location
value: gs://some-bucket
- name: dir
value: "y" # This can have any value to be considered "true"
Params that can be added are the following:
-
location
: represents the location of the blob storage. -
type
: represents the type of blob storage. For GCS storage resource this value should be set togcs
. -
dir
: represents whether the blob storage is a directory or not. By default a storage artifact is not considered a directory.- If the artifact is a directory then
-r
(recursive) flag is used, to copy all files under the source directory to a GCS bucket. Eg:gsutil cp -r source_dir/* gs://some-bucket
- If an artifact is a single file like a zip or tar, then the copy will be only
1 level deep(not recursive). It will not trigger a copy of sub directories
in the source directory. Eg:
gsutil cp source.tar gs://some-bucket.tar
.
- If the artifact is a directory then
Private buckets can also be configured as storage resources. To access GCS
private buckets, service accounts with correct permissions are required. The
secrets
field on the storage resource is used for configuring this
information. Below is an example on how to create a storage resource with a
service account.
-
Refer to the official documentation on how to create service accounts and configuring IAM permissions to access buckets.
-
Create a Kubernetes secret from a downloaded service account json key
kubectl create secret generic bucket-sa --from-file=./service_account.json
-
To access the GCS private bucket environment variable
GOOGLE_APPLICATION_CREDENTIALS
should be set, so apply the above created secret to the GCS storage resource under thefieldName
key.apiVersion: tekton.dev/v1alpha1 kind: PipelineResource metadata: name: wizzbang-storage namespace: default spec: type: storage params: - name: type value: gcs - name: location value: gs://some-private-bucket - name: dir value: "y" secrets: - fieldName: GOOGLE_APPLICATION_CREDENTIALS secretName: bucket-sa secretKey: service_account.json
The build-gcs
storage resource points to a
Google Cloud Storage blob like
GCS Storage Resource, either in the form of a .zip
archive, or based on the contents of a source manifest file.
In addition to fetching an .zip archive, BuildGCS also unzips it.
A
Source Manifest File
is a JSON object, which is listing other objects in a Cloud Storage that should be fetched.
The format of the manifest is a mapping of the destination file path to the location
in a Cloud Storage, where the file's contents can be found. The build-gcs
resource can
also do incremental uploads of sources via the Source Manifest File.
To create a build-gcs
type of storage resource using the PipelineResource
CRD:
apiVersion: tekton.dev/v1alpha1
kind: PipelineResource
metadata:
name: build-gcs-storage
namespace: default
spec:
type: storage
params:
- name: type
value: build-gcs
- name: location
value: gs://build-crd-tests/rules_docker-master.zip
- name: artifactType
value: Archive
Params that can be added are the following:
location
: represents the location of the blob storage.type
: represents the type of blob storage. For BuildGCS, this value should be set tobuild-gcs
artifactType
: represent the type ofgcs
resource. Right now, we support following types:
ZipArchive
:- ZipArchive indicates that the resource fetched is an archive file in the zip format.
- It unzips the archive and places all the files in the directory, which is set at runtime.
Archive
is also supported and is equivalent toZipArchive
, but is deprecated.
TarGzArchive
:- TarGzArchive indicates that the resource fetched is a gzipped archive file in the tar format.
- It unzips the archive and places all the files in the directory, which is set at runtime.
Manifest
:- Manifest indicates that the resource should be fetched using a source manifest file.
Private buckets other than the ones accessible by a
TaskRun Service Account can not be configured
as storage
resources for the build-gcs
storage resource right now. This is because
the container image
gcr.io/cloud-builders//gcs-fetcher
does not support configuring secrets.
The cloudevent
resource represents a cloud event
that is sent to a target URI
upon completion of a TaskRun
.
The cloudevent
resource sends Tekton specific events; the body of the event includes
the entire TaskRun
spec plus status; the types of events defined for now are:
- dev.tekton.event.task.unknown
- dev.tekton.event.task.successful
- dev.tekton.event.task.failed
cloudevent
resources are useful to notify a third party upon the completion and
status of a TaskRun
. In combinations with the Tekton triggers
project they can be used to link Task/PipelineRuns
asynchronously.
To create a CloudEvent resource using the PipelineResource
CRD:
apiVersion: tekton.dev/v1alpha1
kind: PipelineResource
metadata:
name: event-to-sink
spec:
type: cloudevent
params:
- name: targetURI
value: http://sink:8080
The content of an event is for example:
Context Attributes,
SpecVersion: 0.2
Type: dev.tekton.event.task.successful
Source: /apis/tekton.dev/v1alpha1/namespaces/default/taskruns/pipeline-run-api-16aa55-source-to-image-task-rpndl
ID: pipeline-run-api-16aa55-source-to-image-task-rpndl
Time: 2019-07-04T11:03:53.058694712Z
ContentType: application/json
Transport Context,
URI: /
Host: my-sink.default.my-cluster.containers.appdomain.cloud
Method: POST
Data,
{
"taskRun": {
"metadata": {...}
"spec": {
"inputs": {...}
"outputs": {...}
"serviceAccount": "default",
"taskRef": {
"name": "source-to-image",
"kind": "Task"
},
"timeout": "1h0m0s"
},
"status": {...}
}
}
Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License.