Skip to content

Commit e3e5bab

Browse files
committed
Merge branch 'restructure-new' of https://github.com/coder/coder into restructure-new
2 parents 7a55e4c + d58b699 commit e3e5bab

32 files changed

+113
-98
lines changed

docs/admin/infrastructure/validated-architectures/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -161,7 +161,7 @@ compute as users start/stop workspaces at the beginning and end of their day.
161161
Set nodeSelectors, affinities, and tolerations in Coder templates to assign
162162
workspaces to the given node group:
163163

164-
```hcl
164+
```tf
165165
resource "kubernetes_deployment" "coder" {
166166
spec {
167167
template {

docs/admin/integrations/jfrog-artifactory.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ CODER_EXTERNAL_AUTH_1_SCOPES="applied-permissions/user"
9494
[JFrog-OAuth](https://registry.coder.com/modules/jfrog-oauth) module to
9595
configure the integration.
9696

97-
```hcl
97+
```tf
9898
module "jfrog" {
9999
source = "registry.coder.com/modules/jfrog-oauth/coder"
100100
version = "1.0.0"
@@ -129,7 +129,7 @@ To set this up, follow these steps:
129129
store the token in a sensitive terraform variable to prevent it from being
130130
displayed in plain text in the terraform state.
131131

132-
```hcl
132+
```tf
133133
variable "artifactory_access_token" {
134134
type = string
135135
sensitive = true

docs/admin/integrations/multiple-kube-clusters.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ You can start from our
6161
From there, add [template parameters](../../templates/concepts/parameters.md) to
6262
allow developers to pick their desired cluster.
6363

64-
```hcl
64+
```tf
6565
# main.tf
6666
6767
data "coder_parameter" "kube_context" {
@@ -159,7 +159,7 @@ rolebinding.rbac.authorization.k8s.io/coder-v2 created
159159
You can start from our
160160
[example template](https://github.com/coder/coder/tree/main/examples/templates/kubernetes).
161161

162-
```hcl
162+
```tf
163163
variable "host" {
164164
description = "Cluster host address"
165165
sensitive = true

docs/admin/networking/port-forwarding.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ workspace's template. This approach shows a visual application icon in the
6767
dashboard. See the following `coder_app` example for a Node React app and note
6868
the `subdomain` and `share` settings:
6969

70-
```hcl
70+
```tf
7171
# node app
7272
resource "coder_app" "node-react-app" {
7373
agent_id = coder_agent.dev.id

docs/admin/security/secrets.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ which excludes obscure API providers.
4949

5050
Dynamic secrets can be implemented in your template code like so:
5151

52-
```hcl
52+
```tf
5353
resource "twilio_iam_api_key" "api_key" {
5454
account_sid = "ACXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"
5555
friendly_name = "Test API Key"
@@ -80,7 +80,7 @@ can also show them in the Workspace UI with
8080

8181
Can be produced with
8282

83-
```hcl
83+
```tf
8484
resource "twilio_iam_api_key" "api_key" {
8585
account_sid = "ACXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"
8686
friendly_name = "Test API Key"

docs/admin/templates/extending-templates/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ There are a variety of Coder-native features to extend the configuration of your
88

99
For users to connect to a workspace, the template must include a [`coder_agent`](https://registry.terraform.io/providers/coder/coder/latest/docs/resources/agent). The associated agent will facilitate [workspace connections](../../../user-guides/workspace-access/README.md) via SSH, port forwarding, and IDEs. The agent may also display real-time [workspace metadata](./agent-metadata.md) like resource usage.
1010

11-
```hcl
11+
```tf
1212
resource "coder_agent" "dev" {
1313
os = "linux"
1414
arch = "amd64"

docs/admin/templates/extending-templates/agent-metadata.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ usage about the workspace's host.
2222

2323
Here's a standard set of metadata snippets for Linux agents:
2424

25-
```hcl
25+
```tf
2626
resource "coder_agent" "main" {
2727
os = "linux"
2828
...

docs/admin/templates/extending-templates/docker-in-workspaces.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ inside Coder workspaces. See [Systemd in Docker](#systemd-in-docker).
2323
After [installing Sysbox](https://github.com/nestybox/sysbox#installation) on
2424
the Coder host, modify your template to use the sysbox-runc runtime:
2525

26-
```hcl
26+
```tf
2727
resource "docker_container" "workspace" {
2828
# ...
2929
name = "coder-${data.coder_workspace.me.owner}-${lower(data.coder_workspace.me.name)}"
@@ -55,7 +55,7 @@ After
5555
modify your template to use the sysbox-runc RuntimeClass. This requires the
5656
Kubernetes Terraform provider version 2.16.0 or greater.
5757

58-
```hcl
58+
```tf
5959
terraform {
6060
required_providers {
6161
coder = {
@@ -175,7 +175,7 @@ $ kubectl create secret docker-registry <name> \
175175
--docker-email=<service-account-email>
176176
```
177177

178-
```hcl
178+
```tf
179179
env {
180180
name = "CODER_IMAGE_PULL_SECRET"
181181
value_from {
@@ -278,7 +278,7 @@ your nodes cannot run Sysbox.
278278
279279
### Use a privileged sidecar container in Docker-based templates
280280
281-
```hcl
281+
```tf
282282
resource "coder_agent" "main" {
283283
os = "linux"
284284
arch = "amd64"
@@ -315,7 +315,7 @@ resource "docker_container" "workspace" {
315315
316316
### Use a privileged sidecar container in Kubernetes-based templates
317317
318-
```hcl
318+
```tf
319319
terraform {
320320
required_providers {
321321
coder = {
@@ -387,7 +387,7 @@ After
387387
modify your template to use the sysbox-runc RuntimeClass. This requires the
388388
Kubernetes Terraform provider version 2.16.0 or greater.
389389
390-
```hcl
390+
```tf
391391
terraform {
392392
required_providers {
393393
coder = {

docs/admin/templates/extending-templates/external-auth.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ If the token is required to be inserted into the workspace, for example
7070
template. This token will not auto-refresh. The following example will
7171
authenticate via GitHub and auto-clone a repo into the `~/coder` directory.
7272

73-
```hcl
73+
```tf
7474
data "coder_external_auth" "github" {
7575
# Matches the ID of the external auth provider in Coder.
7676
id = "github"

docs/admin/templates/extending-templates/icons.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ come bundled with your Coder deployment.
2222

2323
These can all be configured to use an icon by setting the `icon` field.
2424

25-
```hcl
25+
```tf
2626
data "coder_parameter" "my_parameter" {
2727
icon = "/icon/coder.svg"
2828

0 commit comments

Comments
 (0)