Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commit7ce28eb

Browse files
authored
Remove oatuh2 setup for gitops (#1293)
* Remove oatuh2 setup for gitopsRemoved toc entries for OAuth2 setup for gitops and updated Manage Git PATS article with conditions as needed* Update git-tokens.md* Update oauth-setup.md* Update manage-runtimes.md
1 parenta5ae684 commit7ce28eb

File tree

8 files changed

+74
-21
lines changed

8 files changed

+74
-21
lines changed

‎_data/argohub-home-content.yml‎

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -162,8 +162,6 @@
162162
localurl:/gitops/administration/account-user-management/create-codefresh-account/
163163
-title:Adding users and teams
164164
localurl:/gitops/administration/account-user-management/add-users/
165-
-title:Set up OAuth2 for GitOps
166-
localurl:/gitops/administration/account-user-management/oauth-setup/
167165
-title:Access control for GitOps
168166
localurl:/gitops/administration/account-user-management/gitops-abac/
169167
-title:User settings

‎_data/argohub-nav.yml‎

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -116,8 +116,6 @@
116116
url:"/service-accounts"
117117
-title:Configuring access control for GitOps
118118
url:"/gitops-abac"
119-
-title:Setting up OAuth2 for GitOps
120-
url:"/oauth-setup"
121119
-title:Authorize access to organizations/projects
122120
url:"/hosted-authorize-orgs"
123121
-title:Single Sign-On

‎_docs/administration/account-user-management/oauth-setup.md‎

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -127,10 +127,9 @@ Create and register an OAuth App under your organization to authorize Codefresh.
127127
{:start="2"}
128128
1. Note down the following, as you will need them to create the K8s secret for the Git OAuth2 application:
129129
* GitHub: Application ID from the URL, Client ID, and the client secret
130-
{% if page.collection != site.gitops_collection %}
131130
* GitLab Cloud and Server: Application ID and Secret
132131
* Bitbucket Data Center: Key and Secret
133-
{% endif %}
132+
134133

135134
<br>
136135

‎_docs/administration/user-self-management/manage-pats.md‎

Lines changed: 42 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ toc: true
88
##Git user token management
99
As a user in Codefresh, you must authorize access to your Git provider accounts and authenticate Git-based actions from Codefresh clients, per provisioned GitOps Runtime. This is done through the Git user token, which is an access token unique to each user. For more details, including required scopes and how the Git user token differs from the Git Runtime token, see[Git tokens in Codefresh]({{site.baseurl}}/docs/security/git-tokens/).
1010

11-
11+
{% if page.collection != site.gitops_collection %}
1212
The authorization mode depends on the authorization method set up by your account admin:
1313
***OAuth2**
1414
If your admin has set up authentication with OAuth2, you can authorize access using OAuth2.
@@ -27,18 +27,14 @@ If you have access to more than one GitOps Runtime in the same or in different a
2727
For OAuth2, the administrator pre-configures the permissions and expiry date. Once you supply your credentials for authorization, you are automatically directed to the Git Personal Tokens page.
2828

2929
#####Before you begin
30-
{% if page.collection != site.gitops_collection %}
3130
Make sure you have:
3231
* For Bitbucket only, your Bitbucket account username
3332
* If needed, a_user access token_ from your Git provider with the required scopes:
3433
*[GitHub](#generate-github-user-access-tokens)
3534
*[GitLab](#generate-gitlab-user-access-tokens)
3635
*[Bitbucket](#generate-bitbucket-user-access-tokens)
37-
{% endif %}
3836

39-
{% if page.collection== site.gitops_collection %}
4037
* Make sure you have a_user access token_ with the required scopes for[GitHub](#generate-github-user-access-tokens)
41-
{% endif %}
4238

4339
#####How to
4440
1. In the Codefresh UI, on the toolbar, click your avatar, and then select**Git Personal Access Token**.
@@ -50,9 +46,7 @@ Make sure you have:
5046
1. Complete the verification if required, as when two-factor authentication is configured, for example.
5147
* For**Git user tokens**:
5248
1. Expand**Advanced authorization options**.
53-
{% if page.collection != site.gitops_collection %}
5449
1. For Bitbucket, enter your**Bitbucket username**.
55-
{% endif %}
5650
1. In the**Personal Access Token** field, paste the token you generated.
5751

5852
{%
@@ -69,15 +63,54 @@ max-width="50%"
6963
{:start="4"}
7064
1. Click**Add Token**.
7165
In the Git Personal Access Tokens list, you can see that the new token is assigned to the GitOps Runtime.
66+
{% endif %}
67+
68+
69+
{% if page.collection == site.gitops_collection %}
70+
>**NOTE**
71+
Codefresh GitOps does not officially support fine-grained tokens, or tokens with custom scopes. If you are using such tokens, make sure you turn off validation for Git tokens in the`values.yaml` file, as described in[Skipping token values.yaml]({{site.baseurl}}/docs/security/git-tokens#skipping-token-validation-in-valuesyaml).
72+
73+
##Authorize Git access to GitOps Runtimes
74+
Authorize Git access to GitOps Runtimes through Git user access tokens from your Git provider.
75+
76+
If you have access to more than one GitOps Runtime in the same or in different accounts, you can use the same Git user token for all the Runtimes you have access to._You must however authorize access for each GitOps Runtime individually_.
77+
78+
79+
#####Before you begin
80+
81+
* Make sure you have a_user access token_ with the required scopes for[GitHub](#generate-github-user-access-tokens)
82+
83+
#####How to
84+
1. In the Codefresh UI, on the toolbar, click your avatar, and then select**Git Personal Access Token**.
85+
1. Select the GitOps Runtime to authenticate to, and then click**Add Token**.
86+
1. For**Git user tokens**:
87+
1. Expand**Advanced authorization options**.
88+
1. In the**Personal Access Token** field, paste the token you generated.
89+
90+
{%
91+
include
92+
image.html
93+
lightbox="true"
94+
file="/images/runtime/gitops-user-authorize-runtime-access.png"
95+
url="/images/runtime/gitops-user-authorize-runtime-access.png"
96+
alt="Authorize access to GitOps Runtime with OAuth/Git user token"
97+
caption="Authorize access to GitOps Runtime with OAuth/Git user token"
98+
max-width="50%"
99+
%}
100+
101+
{:start="4"}
102+
1. Click**Add Token**.
103+
In the Git Personal Access Tokens list, you can see that the new token is assigned to the GitOps Runtime.
104+
{% endif %}
72105

73106
##Manage Git user tokens for GitOps Runtimes
74-
Once you authorize access to one or more GitOps Runtimes through OAuth or Git user tokens, the GitOps Runtimes and their associated tokens are listed in the Git Personal Access Tokens page.
107+
Once you authorize access to one or more GitOps Runtimes through{% if page.collection != site.gitops_collection %}OAuth or{% endif %} Git user tokens, the GitOps Runtimes and their associated tokens are listed in the Git Personal Access Tokens page.
75108

76109
#####Manage Git user access tokens
77110
You can manage Git user tokens for any GitOps Runtime, without affecting the GitOps Runtime at the account-level. Deleting the Git user token for a GitOps Runtime will deny_you_ access to the Git repositories, Git Sources and other resources associated with that Runtime, while the Runtime itself is not affected.
78111

79112
#####Notifications for GitOps Runtimes
80-
If you have turned on notifications for GitOps Runtimes, Codefresh alerts you toGitOps Runtimes with invalid or expired Git personal access tokens.
113+
If you have turned on notifications for GitOps Runtimes, Codefresh alerts you tothose Runtimes with invalid or expired Git personal access tokens.
81114
You can turn off these notifications for selectively for Runtimes for which these alerts are less critical.
82115

83116
#####Before you begin

‎_docs/installation/gitops/manage-runtimes.md‎

Lines changed: 31 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -255,17 +255,21 @@ Otherwise, you have to update Git tokens in the following situations:
255255
* Invalid, revoked, or expired tokens<br>
256256
Codefresh automatically flags Runtimes with such tokens. It is mandatory to update the Git tokens to continue working with the platform.
257257

258+
{% if page.collection != site.gitops_collection %}
258259
**Update methods**<br>
259260
The methods for updating any Git token are the same regardless of the reason for the update:
260261
* OAuth2 authorization, if your admin has registered an OAuth Application for Codefresh.
261-
* Git access token authentication, by generating a Git Runtime token in your Git provider account with the correct scopes.
262-
You can update your Git Runtime token in the UI or through the CLI.
262+
* Git access token authentication, by generating a Git user token in your Git provider account with the correct scopes.
263+
You can update your Git token in the UI or through the CLI.
264+
{% endif %}
265+
263266

264267
### Update Git Runtime credentials in Codefresh UI
265268

266269
**Before you begin**
267270
* To authenticate through a Git Runtime token, make sure your token is valid and has the [required scopes]({{site.baseurl}}/docs/security/git-tokens/#git-runtime-token-scopes)
268271

272+
{% if page.collection != site.gitops_collection %}
269273
**How to**
270274
1. In the Codefresh UI, on the toolbar, click the **Settings** icon.
271275
1. From the sidebar, select **GitOps Runtimes**.
@@ -310,6 +314,31 @@ The methods for updating any Git token are the same regardless of the reason for
310314
{:start="7"}
311315
1. For Git token authentication, paste the generated token in the **Git runtime token** field.
312316
1. Click **Update Credentials**.
317+
{% endif %}
318+
319+
{% if page.collection == site.gitops_collection %}
320+
**How to**
321+
1. In the Codefresh UI, on the toolbar, click the **Settings** icon.
322+
1. From the sidebar, select **GitOps Runtimes**.
323+
1. Switch to the **List View**.
324+
1. Do one of the following:
325+
* To the right of the row with the Runtime to update, click the context menu and select **Update Git Runtime Credentials**.
326+
* Click the Runtime name, click the context-menu on the top-right, and then select **Update Git Runtime Credentials**.
327+
328+
{% include
329+
image.html
330+
lightbox="true"
331+
file="/images/runtime/update-git-runtime-token.png"
332+
url="/images/runtime/update-git-runtime-token.png"
333+
alt="Update Git Runtime credentials"
334+
caption="Update Git Runtime credentials"
335+
max-width="60%"
336+
%}
337+
338+
{:start="5"}
339+
1. Paste the generated token in the **Git runtime token** field.
340+
1. Click **Update Credentials**.
341+
{% endif %}
313342

314343
{% if page.collection != site.gitops_collection %}
315344
### Update Git Runtime token through CLI

‎_docs/security/git-tokens.md‎

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,8 +36,6 @@ Codefresh needs access to Git repositories for reading and writing to configurat
3636
###GitOps Runtime token and secret
3737
The Git Runtime token is the personal access token provided during Runtime installation and is automatically converted to a secret. The secret for the Runtime repository is stored in the`runtime-repo-creds-secret` secret, labeled with`argocd.argoproj.io/secret-type: repo-creds`.
3838

39-
This label
40-
The Runtime uses the same credentials
4139

4240
The secret:
4341
* Allows Argo CD to use the credentials to clone and pull data from the repositories it syncs from for read-only operations.

‎_gitops/administration/account-user-management/oauth-setup.md‎

Lines changed: 0 additions & 1 deletion
This file was deleted.

‎assets/js/src/argohub-redirect-mapping.json‎

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,6 @@
77
"/docs/administration/account-user-management/create-codefresh-account/":"/gitops/administration/account-user-management/create-codefresh-account/",
88
"/docs/administration/account-user-management/gitops-abac/":"/gitops/administration/account-user-management/gitops-abac/",
99
"/docs/administration/account-user-management/hosted-authorize-orgs/":"/gitops/administration/account-user-management/hosted-authorize-orgs/",
10-
"/docs/administration/account-user-management/oauth-setup/":"/gitops/administration/account-user-management/oauth-setup/",
1110
"/docs/administration/account-user-management/service-accounts/":"/gitops/administration/account-user-management/service-accounts/",
1211
"/docs/administration/single-sign-on/ldap/":"/gitops/administration/single-sign-on/ldap/",
1312
"/docs/administration/single-sign-on/oidc/":"/gitops/administration/single-sign-on/oidc/",

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp