You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/ce/getting-started/with-opentofu.mdx
+17-9Lines changed: 17 additions & 9 deletions
Original file line number
Diff line number
Diff line change
@@ -4,21 +4,22 @@ title: "With OpenTofu"
4
4
5
5
In this tutorial, you will set up Digger to automate OpenTofu pull requests using Github Actions
6
6
7
-
# Prerequisites
8
-
7
+
**Prerequisites**
9
8
- A GitHub repository with valid OpenTofu code
10
9
- Your cloud provider credentials:
11
10
- For AWS: [Hashicorp's AWS tutorial](https://developer.hashicorp.com/terraform/tutorials/aws-get-started/aws-build)
12
11
- For GCP: [Hashicorp's GCP tutorial](https://developer.hashicorp.com/terraform/tutorials/gcp-get-started/google-cloud-platform-build)
13
12
- For Azure: [Hashicorp's Azure tutorial](https://developer.hashicorp.com/terraform/tutorials/azure-get-started/azure-build)
14
13
15
-
# Step 1: create your Digger account
14
+
<Steps>
15
+
<Steptitle="Create your Digger account">
16
16
17
17
Head to [ui.digger.dev](https://ui.digger.dev) and sign up using your preferred method.
18
18
19
19
You should see an empty dashboard after you sign up.
20
+
</Step>
20
21
21
-
# Step 2: install the Digger GitHub App
22
+
<Steptitle="Install the Digger GitHub App">
22
23
23
24
Install the Digger [GitHub App](https://github.com/apps/digger-pro/installations/select_target) into your repository.
24
25
@@ -28,8 +29,9 @@ Digger GitHub App does not need access to your cloud account, it just starts job
28
29
You can also [self-host Digger orchestrator](/ce/self-host/deploy-docker) with a private GiHub app and issue your own token
29
30
30
31
</Note>
32
+
</Step>
31
33
32
-
# Step 3: Create Action Secrets with cloud credentials
34
+
<Steptitle="Create Action Secrets with cloud credentials">
33
35
34
36
In GitHub repository settings, go to Secrets and Variables - Actions. Create the following secrets:
35
37
@@ -51,8 +53,9 @@ In GitHub repository settings, go to Secrets and Variables - Actions. Create the
51
53
You'll need to configure OIDC authentication by setting up federated credentials in your Azure App Registration. See [Azure OIDC setup](/ce/azure-specific/azure) for details.
52
54
</Tab>
53
55
</Tabs>
56
+
</Step>
54
57
55
-
# Step 4: Create digger.yml
58
+
<Steptitle="Create digger.yml">
56
59
57
60
This file contains Digger configuration and needs to be placed at the root level of your repository. Assuming your OpenTofu code is in the `prod` directory:
58
61
@@ -61,8 +64,9 @@ projects:
61
64
- name: production
62
65
dir: prod
63
66
```
67
+
</Step>
64
68
65
-
# Step 5: Create Github Actions workflow file
69
+
<Steptitle="Create Github Actions workflow file">
66
70
67
71
Place it at `.github/workflows/digger_workflow.yml` (name is important!)
68
72
@@ -218,16 +222,20 @@ Place it at `.github/workflows/digger_workflow.yml` (name is important!)
218
222
- ARM_* environment variables for the Azure Terraform provider
219
223
</Tab>
220
224
</Tabs>
225
+
</Step>
221
226
222
-
#Step 6: Create a PR to verify that it works
227
+
<Step title="Create a PR to verify that it works">
223
228
224
229
OpenTofu will run an existing plan against your code.
225
230
226
231
Make any change to your OpenTofu code e.g. add a blank line. An action run should start (you can see log output in Actions). After some time you should see output of OpenTofu Plan added as a comment to your PR.
227
232
228
233
Then you can add a comment like `digger apply` and shortly after apply output will be added as comment too.
Copy file name to clipboardExpand all lines: docs/ce/getting-started/with-terraform.mdx
+17-9Lines changed: 17 additions & 9 deletions
Original file line number
Diff line number
Diff line change
@@ -4,21 +4,22 @@ title: "With Terraform"
4
4
5
5
In this tutorial, you will set up Digger to automate terraform pull requests using Github Actions
6
6
7
-
# Prerequisites
8
-
7
+
**Prerequisites**
9
8
- A GitHub repository with valid terraform code
10
9
- Your cloud provider credentials:
11
10
- For AWS: [Hashicorp's AWS tutorial](https://developer.hashicorp.com/terraform/tutorials/aws-get-started/aws-build)
12
11
- For GCP: [Hashicorp's GCP tutorial](https://developer.hashicorp.com/terraform/tutorials/gcp-get-started/google-cloud-platform-build)
13
12
- For Azure: [Hashicorp's Azure tutorial](https://developer.hashicorp.com/terraform/tutorials/azure-get-started/azure-build)
14
13
15
-
# Step 1: create your Digger account
14
+
<Steps>
15
+
<Steptitle="Create your Digger account">
16
16
17
17
Head to [ui.digger.dev](https://ui.digger.dev) and sign up using your preferred method.
18
18
19
19
You should see an empty dashboard after you sign up.
20
+
</Step>
20
21
21
-
# Step 2: install the Digger GitHub App
22
+
<Steptitle="Install the Digger GitHub App">
22
23
23
24
Install the Digger [GitHub App](https://github.com/apps/digger-pro/installations/select_target) into your repository.
24
25
@@ -28,8 +29,9 @@ Digger GitHub App does not need access to your cloud account, it just starts job
28
29
You can also [self-host Digger orchestrator](/ce/self-host/deploy-docker) with a private GiHub app and issue your own token
29
30
30
31
</Note>
32
+
</Step>
31
33
32
-
# Step 3: Create Action Secrets with cloud credentials
34
+
<Steptitle="Create Action Secrets with cloud credentials">
33
35
34
36
In GitHub repository settings, go to Secrets and Variables - Actions. Create the following secrets:
35
37
@@ -51,8 +53,9 @@ In GitHub repository settings, go to Secrets and Variables - Actions. Create the
51
53
You'll need to configure OIDC authentication by setting up federated credentials in your Azure App Registration. See [Azure OIDC setup](/ce/azure-specific/azure) for details.
52
54
</Tab>
53
55
</Tabs>
56
+
</Step>
54
57
55
-
# Step 4: Create digger.yml
58
+
<Steptitle="Create digger.yml">
56
59
57
60
This file contains Digger configuration and needs to be placed at the root level of your repository. Assuming your terraform code is in the `prod` directory:
58
61
@@ -61,8 +64,9 @@ projects:
61
64
- name: production
62
65
dir: prod
63
66
```
67
+
</Step>
64
68
65
-
# Step 5: Create Github Actions workflow file
69
+
<Steptitle="Create Github Actions workflow file">
66
70
67
71
Place it at `.github/workflows/digger_workflow.yml` (name is important!)
68
72
@@ -218,16 +222,20 @@ Place it at `.github/workflows/digger_workflow.yml` (name is important!)
218
222
- ARM_* environment variables for the Azure Terraform provider
219
223
</Tab>
220
224
</Tabs>
225
+
</Step>
221
226
222
-
#Step 6: Create a PR to verify that it works
227
+
<Step title="Create a PR to verify that it works">
223
228
224
229
Terraform will run an existing plan against your code.
225
230
226
231
Make any change to your terraform code e.g. add a blank line. An action run should start (you can see log output in Actions). After some time you should see output of Terraform Plan added as a comment to your PR.
227
232
228
233
Then you can add a comment like `digger apply` and shortly after apply output will be added as comment too.
Copy file name to clipboardExpand all lines: docs/ce/getting-started/with-terragrunt.mdx
+19-11Lines changed: 19 additions & 11 deletions
Original file line number
Diff line number
Diff line change
@@ -4,21 +4,22 @@ title: "With Terragrunt"
4
4
5
5
In this tutorial, you will set up Digger to automate Terragrunt pull requests using Github Actions
6
6
7
-
# Prerequisites
8
-
7
+
**Prerequisites**
9
8
- A GitHub repository with valid Terragrunt code
10
9
- Your cloud provider credentials:
11
10
- For AWS: [Hashicorp's AWS tutorial](https://developer.hashicorp.com/terraform/tutorials/aws-get-started/aws-build)
12
11
- For GCP: [Hashicorp's GCP tutorial](https://developer.hashicorp.com/terraform/tutorials/gcp-get-started/google-cloud-platform-build)
13
12
- For Azure: [Hashicorp's Azure tutorial](https://developer.hashicorp.com/terraform/tutorials/azure-get-started/azure-build)
14
13
15
-
# Step 1: create your Digger account
14
+
<Steps>
15
+
<Steptitle="Create your Digger account">
16
16
17
17
Head to [ui.digger.dev](https://ui.digger.dev) and sign up using your preferred method.
18
18
19
19
You should see an empty dashboard after you sign up.
20
+
</Step>
20
21
21
-
# Step 2: install the Digger GitHub App
22
+
<Steptitle="Install the Digger GitHub App">
22
23
23
24
Install the Digger [GitHub App](https://github.com/apps/digger-pro/installations/select_target) into your repository.
24
25
@@ -28,8 +29,9 @@ Digger GitHub App does not need access to your cloud account, it just starts job
28
29
You can also [self-host Digger orchestrator](/ce/self-host/deploy-docker) with a private GiHub app and issue your own token
29
30
30
31
</Note>
32
+
</Step>
31
33
32
-
# Step 3: Create Action Secrets with cloud credentials
34
+
<Steptitle="Create Action Secrets with cloud credentials">
33
35
34
36
In GitHub repository settings, go to Secrets and Variables - Actions. Create the following secrets:
35
37
@@ -53,8 +55,9 @@ In GitHub repository settings, go to Secrets and Variables - Actions. Create the
53
55
You'll need to configure OIDC authentication by setting up federated credentials in your Azure App Registration. See [Azure OIDC setup](/ce/azure-specific/azure) for details.
54
56
</Tab>
55
57
</Tabs>
58
+
</Step>
56
59
57
-
# Step 4: Create digger.yml
60
+
<Steptitle="Create digger.yml">
58
61
59
62
Terragrunt projects can be configured in two ways:
60
63
@@ -109,8 +112,9 @@ This approach automatically discovers all Terragrunt modules under each director
109
112
<Note>
110
113
For more advanced configurations and performance optimization for large monorepos, see [Using Terragrunt](/ce/howto/using-terragrunt) and [Generate Projects](/ce/howto/generate-projects#blocks-syntax-with-terragrunt).
Place it at `.github/workflows/digger_workflow.yml` (name is important!)
116
120
@@ -268,23 +272,27 @@ Place it at `.github/workflows/digger_workflow.yml` (name is important!)
268
272
<Note>
269
273
Notice that we use `setup-terragrunt: true` instead of `setup-terraform`. Terragrunt will handle the Terraform binary installation internally.
270
274
</Note>
275
+
</Step>
271
276
272
-
#Step 6: Create a PR to verify that it works
277
+
<Step title="Create a PR to verify that it works">
273
278
274
279
Terragrunt will run an existing plan against your code.
275
280
276
281
Make any change to your Terragrunt code e.g. add a blank line. An action run should start (you can see log output in Actions). After some time you should see output of Terragrunt Plan added as a comment to your PR.
277
282
278
283
Then you can add a comment like `digger apply` and shortly after apply output will be added as comment too.
If you use `sops_decrypt_file` in your `terragrunt.hcl`, you need to handle the case when Digger generates projects in the backend. Use the `DIGGER_GENERATE_PROJECT` environment variable:
0 commit comments