Skip to content

Commit 08f77cc

Browse files
authored
chore: use tab group ids (#2672)
1 parent 54f3777 commit 08f77cc

File tree

7 files changed

+16
-16
lines changed

7 files changed

+16
-16
lines changed

docs/2.0/docs/pipelines/architecture/security-controls.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ By default, the only repository/group required to interact with infrastructure u
1313
import Tabs from "@theme/Tabs"
1414
import TabItem from "@theme/TabItem"
1515

16-
<Tabs>
16+
<Tabs groupId="platform">
1717
<TabItem value="github" label="GitHub" default>
1818

1919
- The AWS IAM role assumed via OIDC when pull requests are opened or updated has a trust policy that restricts access to the repository itself and provides read-only permissions
@@ -45,7 +45,7 @@ Unlike the infrastructure-live-root repository, this repository focuses on manag
4545

4646
## Token Strategy
4747

48-
<Tabs>
48+
<Tabs groupId="platform">
4949
<TabItem value="github" label="GitHub" default>
5050

5151
### GitHub App Installation Strategy (Recommended)
@@ -83,7 +83,7 @@ Pipelines provisions an OpenID Connect identity provider in AWS IAM for each acc
8383

8484
For more details, see the [official AWS documentation](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_oidc.html). Below is an example of a trust policy used by Pipelines.
8585

86-
<Tabs>
86+
<Tabs groupId="platform">
8787
<TabItem value="github" label="GitHub" default>
8888

8989
```json

docs/2.0/docs/pipelines/guides/extending-pipelines.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ Extending Gruntwork Pipelines requires managing code across three distinct repos
99
import Tabs from "@theme/Tabs"
1010
import TabItem from "@theme/TabItem"
1111

12-
<Tabs>
12+
<Tabs groupId="platform">
1313
<TabItem value="github" label="GitHub" default>
1414

1515
The repositories are:
@@ -36,7 +36,7 @@ This structure ensures that customers rarely need to modify Gruntwork-managed co
3636

3737
<img alt="Diagram of Gruntwork Pipelines Repositories" className="img_node_modules-@docusaurus-theme-classic-lib-theme-MDXComponents-Img-styles-module medium-zoom-image" src="/img/pipelines/pipelines_customization_code_locations.svg" />
3838

39-
<Tabs>
39+
<Tabs groupId="platform">
4040
<TabItem value="github" label="GitHub" default>
4141

4242
Gruntwork Pipelines for GitHub is implemented as a [Reusable Workflow](https://docs.github.com/en/actions/using-workflows/reusing-workflows). This allows you to reference a specific pinned version in your `.github/workflows/pipelines.yml` file without hosting the workflow code yourself.
@@ -73,7 +73,7 @@ The recommended approach for customizing `pipelines-workflows` is to inject [cus
7373

7474
#### Procedure
7575

76-
<Tabs>
76+
<Tabs groupId="platform">
7777
<TabItem value="github" label="GitHub" default>
7878

7979
This step-by-step guide outlines best practices for implementing custom actions:
@@ -123,7 +123,7 @@ Contact Gruntwork support for assistance setting up custom actions for Gruntwork
123123

124124
#### Background / Explanation
125125

126-
<Tabs>
126+
<Tabs groupId="platform">
127127
<TabItem value="github" label="GitHub" default>
128128

129129
The `pipelines-root.yml` file includes several sample custom actions by default. Below is an example of the pre-provision new account custom hook:

docs/2.0/docs/pipelines/guides/managing-secrets.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ Continuous Integration systems often require access to sensitive resources, whic
77
import Tabs from "@theme/Tabs"
88
import TabItem from "@theme/TabItem"
99

10-
<Tabs>
10+
<Tabs groupId="platform">
1111
<TabItem value="github" label="GitHub" default>
1212

1313
To interact with the GitHub API, Pipelines uses either a GitHub App or Machine User [Personal Access Tokens (PATs)](https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/managing-your-personal-access-tokens), depending on your installation method. For information on creating and managing these tokens, see the [Machine Users documentation](/2.0/docs/pipelines/installation/viamachineusers).
@@ -27,7 +27,7 @@ Pipelines requires authentication with AWS but avoids long-lived credentials by
2727
The role assumption process operates as follows:
2828

2929

30-
<Tabs>
30+
<Tabs groupId="platform">
3131
<TabItem value="github" label="GitHub" default>
3232

3333
```mermaid
@@ -176,7 +176,7 @@ terraform {
176176

177177
When configuring providers and Pipelines, it's important to store secrets in a secure and accessible location. Several options are available for managing secrets, each with its advantages and trade-offs.
178178

179-
<Tabs>
179+
<Tabs groupId="platform">
180180
<TabItem value="github" label="GitHub" default>
181181

182182
#### GitHub Secrets

docs/2.0/docs/pipelines/guides/running-plan-apply.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ Pipelines automatically detects infrastructure changes in your committed IaC and
55
import Tabs from "@theme/Tabs"
66
import TabItem from "@theme/TabItem"
77

8-
<Tabs>
8+
<Tabs groupId="platform">
99
<TabItem value="github" label="GitHub" default>
1010

1111
The preferred workflow when working with Pipelines involves creating a new Pull Request with the desired changes, then reviewing the Terragrunt Plan output to ensure the infrastructure changes align with expectations. It is advisable to enforce [Branch Protection](/2.0/docs/pipelines/installation/branch-protection/#recommended-settings), particularly the [Require branches to be up to date](https://docs.github.com/en/repositories/configuring-branches-and-merges-in-your-repository/managing-protected-branches/about-protected-branches#require-status-checks-before-merging) status check. This ensures the PR cannot be merged if the Plan is outdated.
@@ -32,7 +32,7 @@ Pipelines will add a comment to the merged merge request/pull request containing
3232

3333
## Skipping Pipelines plan/apply
3434

35-
<Tabs>
35+
<Tabs groupId="platform">
3636
<TabItem value="github" label="GitHub" default>
3737

3838
In certain scenarios, it may be necessary to skip Pipelines for specific commits. To do this, include one of the [workflow skip messages](https://docs.github.com/en/actions/managing-workflow-runs-and-deployments/managing-workflow-runs/skipping-workflow-runs), such as `[no ci]`, in the commit message.

docs/2.0/docs/pipelines/guides/updating-pipelines.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ Keeping Gruntwork Pipelines updated is straightforward. Regular updates are rele
55
import Tabs from "@theme/Tabs"
66
import TabItem from "@theme/TabItem"
77

8-
<Tabs>
8+
<Tabs groupId="platform">
99
<TabItem value="github" label="GitHub" default>
1010

1111
Regular updates are released for the Pipelines CLI, associated GitHub Actions Workflows, and custom GitHub Actions. To apply the latest updates across these components, modify the `pipelines.yml` file located in the `.github/workflows` directory of any repository integrated with Gruntwork Pipelines. Update the file to reference the latest version of the Pipelines GitHub Actions Workflow:

docs/2.0/docs/pipelines/tutorials/deploying-your-first-infrastructure-change.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ This section covers creating a resource in your AWS account using Pipelines and
6464

6565
### Planning the changes
6666

67-
<Tabs>
67+
<Tabs groupId="platform">
6868
<TabItem value="github" label="GitHub" default>
6969

7070
1. Create a new branch for your changes.
@@ -98,7 +98,7 @@ Click the *View Pipeline Logs* link to see the complete output of the Gruntwork
9898

9999
### Applying the changes
100100

101-
<Tabs>
101+
<Tabs groupId="platform">
102102
<TabItem value="github" label="GitHub" default>
103103

104104
If you are satisfied with the `terragrunt plan` output, proceed to merge the PR to create the S3 bucket.

docs/2.0/docs/pipelines/tutorials/destroying-infrastructure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ This section explains how to destroy AWS resources using Pipelines and GitOps wo
3737

3838
### Planning the destruction
3939

40-
<Tabs>
40+
<Tabs groupId="platform">
4141
<TabItem value="github" label="GitHub" default>
4242

4343
Create a Pull Request (PR) for the branch you just pushed, targeting `main` (the default branch in your repository).

0 commit comments

Comments
 (0)