project
dwp/project/gitlab
Terraform module to manage GitLab projects (a.k.a. repositories)
project This module creates a GitLab project with a default set of permissions. Terraform module to manage GitLab projects with DWP default settings. This module is published on Terraform Registry and it should be referred to for usage documentation. Requirements - See the versions.tf file for required Terraform and provider versions. - GitLab personal access token with the following permissions: - api - A GitLub group Usage ``hcl module "my_gitlab_project" { source = "dwp/project/gitlab" group_id = 123 name = "my-project" } ` Example `hcl variable "gitlab_token" { type = string description = "GitLab personal access token for managing projects" } provider "gitlab" { token = var.gitlab_token } resource "gitlab_group" "my_group" { name = "my-group" path = "my-group" description = "An example
| Name | Type | Description | Default |
|---|---|---|---|
| name | string | The name of the project to be created | required |
| group_id | number | The ID of the GitLab group that repositories will be created in | required |
| merge_method | string | (Optional) Set to `ff` to create fast-forward merges. Valid values are `merge`, | "ff" |
| initialize_with_readme | bool | (Optional) Create main branch with first commit containing a README.md file. | false |
| lfs_enabled | bool | (Optional) Enable LFS for the project. | false |
| disable_overriding_approvers_per_merge_request | bool | (Optional) By default, users are able to edit the approval rules in merge reques | true |
| remove_source_branch_after_merge | bool | (Optional) Enable `Delete source branch` option by default for all new merge req | true |
| tag_create_access_level | string | (Optional) One of five levels of access to the project e.g. `no one`, `developer | "maintainer" |
| reset_approvals_on_push | bool | (Optional) Set to true if you want to remove all approvals in a merge request wh | true |
| description | string | (Optional) A description of the project. | "" |
| commit_committer_check | bool | (Optional, bool) Users can only push commits to this repository that were commit | true |
| member_check | bool | (Optional) Restrict commits by author (email) to existing GitLab users. | true |
| merge_requests_author_approval | bool | (Optional) Set to true if you want to allow merge request authors to self-approv | true |
| approvals_before_merge | string | (Optional) Number of merge request approvals required for merging. Default is 0. | 1 |
| prevent_secrets | bool | (Optional) GitLab will reject any files that are likely to contain secrets. | true |
| merge_access_level | string | (Optional) One of five levels of access to the project e.g. `no one`, `developer | "developer" |
| request_access_enabled | bool | (Optional) Allow users to request member access. | true |
| wiki_enabled | bool | (Optional) Enable wiki for the project. | false |
| deny_delete_tag | bool | (Optional) Deny deleting a tag. | true |
| branch_name_regex | string | (Optional) Regular expression to enforce on branch names | "" |
| merge_requests_disable_committers_approval | bool | (Optional) Set to true if you want to prevent approval of merge requests by merg | true |
| pages_access_level | string | (Optional) Enable pages access control. Valid values are `disabled`, `private`, | "private" |
project — The GitLab project resourceA batteries included cloud-init config to quickly and easily deploy a single Doc
Terraform module to create VPC resource on AWS.
Terraform module to create default S3 bucket with logging and encryption type sp
This terraform module is used to create ECR on AWS.