Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commitd8f7874

Browse files
authored
Remove unsupported Git providers from OAuth (#1307)
* Remove unsupported Git providers from OAuthRemoved content for Oauth setup for unsupported git providers in enterprise* Update oauth-setup.md* Content editsFixed content and image* Update oauth-setup.md
1 parent73c8ae6 commitd8f7874

File tree

5 files changed

+33
-76
lines changed

5 files changed

+33
-76
lines changed

‎_docs/administration/account-user-management/add-users.md‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,7 @@ As an administrator, you can optionally define session timeouts to automatically
136136
##Related articles
137137
[Single sign-on]({{site.baseurl}}/docs/administration/single-sign-on/)
138138
[Configuring access control for GitOps]({{site.baseurl}}/docs/administration/account-user-management/gitops-abac/)
139-
[Setting up OAuth authentication for Git providers]({{site.baseurl}}/docs/administration/account-user-management/oauth-setup)
140139
{% if page.collection != site.gitops_collection %}
140+
[Setting up OAuth authentication for Git providers]({{site.baseurl}}/docs/administration/account-user-management/oauth-setup)
141141
[Configuring access control for pipelines]({{site.baseurl}}/docs/administration/account-user-management/access-control/)
142142
{% endif %}

‎_docs/administration/account-user-management/hosted-authorize-orgs.md‎

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,5 +28,7 @@ caption="Authorize Codefresh organizations in GitHub"
2828
max-width="70%"
2929
%}
3030

31+
{% if page.collection != site.gitops_collection %}
3132
##Related articles
3233
[Setting up OAuth2 for GitOps]({{site.baseurl}}/docs/administration/account-user-management/oauth-setup/)
34+
{% endif %}

‎_docs/administration/account-user-management/oauth-setup.md‎

Lines changed: 26 additions & 75 deletions
Original file line numberDiff line numberDiff line change
@@ -7,12 +7,11 @@ toc: true
77
---
88

99
##OAuth2 authentication for GitOps
10-
Codefresh integrates with the Git provider defined for the GitOps Runtime to sync repositories to your clusters, implementing Git-based operations when creating resources such as applications, and enriching images with valuable information.
10+
Codefresh integrates withGitHub Cloud asthe Git provider defined for the GitOps Runtime to sync repositories to your clusters, implementing Git-based operations when creating resources such as applications, and enriching images with valuable information.
1111

1212
As the account administrator, you can select the authentication method for the account associated with the Runtime.
13-
Users in the account can then authorize access to the Git provider through the defined mechanism.
13+
Users in the account can then authorize access toGitHub asthe Git provider through the defined mechanism.
1414

15-
{% if page.collection != site.gitops_collection %}
1615
{% include
1716
image.html
1817
lightbox="true"
@@ -26,30 +25,15 @@ Users in the account can then authorize access to the Git provider through the d
2625
Codefresh supports OAuth2 or personal access tokens (PATs) for authentication:
2726

2827
***OAuth2 with Codefresh OAuth Application or custom OAuth2 Application**
29-
OAuth2 is the preferred authentication mechanism, supported forpopular Git providers such asGitHub, GitHub Enterprise, GitLab Cloud and Server, and Bitbucket Cloud and Server.
28+
OAuth2 is the preferred authentication mechanism, supported for GitHub.
3029
You have the option to use the default predefined Codefresh OAuth Application, or a custom Oauth2 Application for Codefresh in your Git provider account.
3130

32-
To use a custom Oauth2 Application for Codefresh, first create the application in yourGit provider account, then create a secret on your K8s cluster, and finally configure OAuth2 access for the custom application in Authentication > Settings. <br>
31+
To use a custom Oauth2 Application for Codefresh, first create the application in yourGitHub account, then create a secret on your K8s cluster, and finally configure OAuth2 access for the custom application in Authentication > Settings. <br>
3332
See[Create a custom OAuth2 Application for Git provider](#create-a-custom-oauth2-application-for-git-provider) in this article.
3433

3534
***Token-based authentication using PAT**
36-
With token-based authentication, users must generate personal access tokensfrom theirGit providers with the required scopes and enter their personal access tokens when prompted to authorize access.<br>
35+
With token-based authentication, users must generate personal access tokensfor theirGitHub accounts with the required scopes and enter their personal access tokens when prompted to authorize access.<br>
3736
See[Authorize Git access in Codefresh]({{site.baseurl}}/docs/administration/user-self-management/user-settings/#git-provider-private-access).
38-
{% endif %}
39-
40-
{% if page.collection == site.gitops_collection %}
41-
Codefresh supports OAuth2 or personal access tokens (PATs) for authentication:
42-
43-
***OAuth2 with Codefresh OAuth Application or custom OAuth2 Application**
44-
OAuth2 is the preferred authentication mechanism for GitHub. You have the option to use the default predefined Codefresh OAuth Application, or a custom Oauth2 Application for Codefresh in your Git provider account.
45-
46-
To use a custom Oauth2 Application for Codefresh, first create the application in your Git provider account, then create a secret on your K8s cluster, and finally configure OAuth2 access for the custom application in Authentication > Settings. <br>
47-
See[Create a custom OAuth2 Application for Git provider](#create-a-custom-oauth2-application-for-git-provider) in this article.
48-
49-
***Token-based authentication using PAT**
50-
With token-based authentication, users must generate personal access tokens with the required scopes in their GitHub accounts, and enter their personal access tokens when prompted to authorize access.<br>
51-
See[Authorize Git access in Codefresh]({{site.baseurl}}/docs/administration/user-self-management/user-settings/#git-provider-private-access).
52-
{% endif %}
5337

5438

5539
##Authentication for Git providers and Runtime accounts
@@ -72,16 +56,7 @@ As the account administrator, you can change the authentication method for a Git
7256

7357

7458
##Create a custom OAuth2 Application for Git provider
75-
Create a custom OAuth2 Application for Codefresh in your Git provider account with the correct scopes, and set up authentication for the same within Codefresh. Users can then authorize access to the Git provider using OAuth2, instead of a personal access token.
76-
77-
{% if page.collection != site.gitops_collection %}
78-
Supported Git providers:
79-
* GitHub and GitHub Enterprise
80-
* GitLab Cloud and GitLab Server
81-
* Bitbucket Cloud (hosted) and Bitbucket Data Center (hybrid)
82-
{% endif %}
83-
84-
<br>
59+
Create a custom OAuth2 Application for Codefresh in your GitHub account with the correct scopes, and set up authentication for the same within Codefresh. Users can then authorize access using OAuth2, instead of a personal access token.
8560

8661

8762
To set up OAuth2 authorization in Codefresh, you must:
@@ -94,48 +69,27 @@ To set up OAuth2 authorization in Codefresh, you must:
9469
###Step 1: Create a custom OAuth2 Application in Git
9570
Create and register an OAuth App under your organization to authorize Codefresh.
9671

97-
1. Follow the step-by-step instructions for your Git provider:
98-
99-
*[GitHub](https://docs.github.com/en/developers/apps/building-oauth-apps/creating-an-oauth-app){:target="\_blank"}:
100-
* For**Authorization callback URL**, enter this value:
101-
`<ingressHost>/app-proxy/api/git-auth/github/callback`
102-
where:
103-
`<ingressHost>` is the IP address or URL of the ingress host in the Runtime cluster as defined in your`values.yaml`. <br>For
104-
tunnel-based access modes, run the command`codefresh runtime list` to retrieve the correct host.
105-
* Make sure**Enable Device Flow** is_not_ selected.
106-
* Select**Register application**.
107-
The client ID is automatically generated, and you are prompted to generate the client secret.
108-
* Select**Generate a new client secret**, and copy the generated secret.
109-
110-
{% if page.collection != site.gitops_collection %}
111-
*[GitLab Cloud and Server](https://docs.gitlab.com/ee/integration/oauth_provider.html#user-owned-applications){:target="\_blank"}:
112-
* For**Redirect URI**, enter this value:
113-
`<ingressHost>/app-proxy/api/git-auth/gitlab/callback`
114-
where:
115-
`<ingressHost>` is the IP address or URL of the ingress host in the runtime cluster.
116-
117-
*[Bitbucket Data Center](https://confluence.atlassian.com/adminjiraserver0902/configure-an-outgoing-link-1168853925.html){:target="\_blank"}:
118-
* For**Callback URL**, enter this value:
119-
`<ingressHost>/app-proxy/api/git-auth/bitbucket-server/callback`
120-
where:
121-
`<ingressHost>` is the IP address or URL of the ingress host in the runtime cluster.
122-
123-
>**NOTE**
124-
OAuth2 is not supported for hybrid runtimes with Bitbucket Cloud as the Git provider. Users can authorize access with their[Git personal access tokens]({{site.baseurl}}/docs/administration/user-self-management/user-settings/#authorize-git-access-in-codefresh) in such cases.
125-
{% endif %}
72+
{:start="1"}
73+
1. For[GitHub](https://docs.github.com/en/developers/apps/building-oauth-apps/creating-an-oauth-app){:target="\_blank"}, do the following:
74+
* For**Authorization callback URL**, enter this value:
75+
`<ingressHost>/app-proxy/api/git-auth/github/callback`
76+
where:
77+
`<ingressHost>` is the IP address or URL of the ingress host in the Runtime cluster as defined in your`values.yaml`. <br>
78+
For tunnel-based access modes, run the command`codefresh runtime list` to retrieve the correct host.
79+
* Make sure**Enable Device Flow** is_not_ selected.
80+
* Select**Register application**.<br>
81+
The client ID is automatically generated, and you are prompted to generate the client secret.
82+
* Select**Generate a new client secret**, and copy the generated secret.
12683

12784
{:start="2"}
128-
1. Note down the following, as you will need them to create the K8s secret for the Git OAuth2 application:
129-
* GitHub: Application ID from the URL, Client ID, and the client secret
130-
* GitLab Cloud and Server: Application ID and Secret
131-
* Bitbucket Data Center: Key and Secret
132-
85+
1. Note down the following, as you will need them to create the K8s secret for the Git OAuth2 application:<br>
86+
* Application ID from the URL, Client ID, and the client secret
13387

13488
<br>
13589

13690

13791
###Step 2: Create a K8s secret resource in the runtime cluster
138-
Create a K8s secret in theruntime cluster, using the example below as a guideline. You must define the application ID (`appId`), client ID (`clientId`) and the client secret (`clientSecret`) from the OAuth2 Application you created in yourGit provider, and the Git URL (`url`).
92+
Create a K8s secret in theRuntime cluster, using the example below as a guideline. You must define the application ID (`appId`), client ID (`clientId`) and the client secret (`clientSecret`) from the OAuth2 Application you created in yourGitHub account, and the Git URL (`url`).
13993

14094
>**NOTE**
14195
All fields in the secret_must be_ encoded in`base64`.
@@ -145,11 +99,8 @@ Create a K8s secret in the runtime cluster, using the example below as a guideli
14599
#####Before you begin
146100

147101
Make sure you have the following handy:
148-
* GitHub: Application ID from the URL, Client ID, and the client secret
149-
{% if page.collection != site.gitops_collection %}
150-
* GitLab Cloud and Server: Application ID and Secret
151-
* Bitbucket Data Center: Key and Secret
152-
{% endif %}
102+
* Application ID from the URL, Client ID, and the client secret
103+
153104

154105
#####How to
155106

@@ -199,7 +150,7 @@ The values for all the settings in the ConfigMap are the `keys` in the secret fi
199150
If you have managed clusters registered to the selected Runtime, the authentication account is available to all the clusters.
200151
{{site.data.callout.end}}
201152

202-
The settings pageis opened in **Form** mode.
153+
The settings pageopens in **Form** mode.
203154

204155
{% include
205156
image.html
@@ -211,7 +162,7 @@ The values for all the settings in the ConfigMap are the `keys` in the secret fi
211162
max-width="50%"
212163
%}
213164

214-
{:start="4"}
165+
{:start="5"}
215166
1. Configure the settings for the **Git OAuth2 Application**, either in **Form** or in **YAML** modes:
216167
* **Secret Name**: The name of the K8s secret file you created in the runtime cluster.
217168
* **Secret Namespace**: The namespace in the runtime cluster where you created the K8s secret.
@@ -220,7 +171,7 @@ The values for all the settings in the ConfigMap are the `keys` in the secret fi
220171
* **Client Secret**: The `key` representing the client secret in the K8s secret. For example, `clientSecret`.
221172
* **URL**: The `key` representing the Git provider URL in the K8s secret. For example, `url`.
222173

223-
{:start="5"}
174+
{:start="6"}
224175
1. Click **Commit**.
225176
The Commit Changes panel shows a summary of the settings and the final version of the YAML manifest in read-only mode.
226177

@@ -234,7 +185,7 @@ The values for all the settings in the ConfigMap are the `keys` in the secret fi
234185
max-width="50%"
235186
%}
236187

237-
{:start="6"}
188+
{:start="7"}
238189
1. From the **Select Git Source** list, select the Git Source in which to store the manifest for the `ConfigMap` you are creating.
239190
The list displays all the Git Sources created for the selected runtime.
240191
1. Optional. Enter a commit message.

‎_docs/administration/user-self-management/manage-pats.md‎

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -171,6 +171,8 @@ max-width="70%"
171171
1. Copy the user access token generated as you will need it to authorize access.
172172

173173

174+
<!--- commenting this out as these providers are not currently supported in Enterprise
175+
174176
{% if page.collection != site.gitops_collection %}
175177
## Generate GitLab user access tokens
176178
1. Log in to your GitLab Cloud or Server account.
@@ -216,5 +218,7 @@ max-width="70%"
216218
1. Copy the user access token generated as you will need it to authorize access.
217219
{% endif %}
218220
221+
-->
222+
219223
##Related articles
220224
[Git tokens in Codefresh]({{site.baseurl}}/docs/security/git-tokens/)
-921 Bytes
Loading

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp