You signed in with another tab or window.Reload to refresh your session.You signed out in another tab or window.Reload to refresh your session.You switched accounts on another tab or window.Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: _docs/integrations/git-providers.md
+10-38Lines changed: 10 additions & 38 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -118,20 +118,12 @@ For GitHub on-premises you also need to provide the URL of the GitHub server in
118
118
###Using external secrets for the token
119
119
120
120
If your GitHub installation is behind your firewall, you can also
121
-
use any[external secrets that you have defined]({{site.baseurl}}/docs/integrations/secret-storage/) (such as Kubernetes secrets) as values by clicking on the lock icon that appears next to field.
121
+
use any[external secrets that you have defined]({{site.baseurl}}/docs/integrations/secret-storage/) (such as Kubernetes secrets) as values by entering a secrets value
122
+
with the same syntax[shown in pipelines]({{site.baseurl}}/docs/configure-ci-cd-pipeline/secrets-store/).
123
+
124
+
For example if you already have a`token` on a resource call`git-credentials` you can put in the token field the expression {% raw %}`${{secrets.git-credentials@token}}`{% endraw %}.
122
125
123
-
{% include
124
-
image.html
125
-
lightbox="true"
126
-
file="/images/pipeline/secrets/lock-icon.png"
127
-
url="/images/pipeline/secrets/lock-icon.png"
128
-
alt="Using a connected secret in the Codefresh GUI"
129
-
caption="Using a connected secret in the Codefresh GUI"
130
-
max-width="50%"
131
-
%}
132
126
133
-
If you have already specified the resource field during secret definition the just enter on the text field the name of the secret directly, i.e.`my-secret-key`.
134
-
If you didn't include a resource name during secret creation then enter the full name in the field like`my-secret-resource@my-secret-key`.
135
127
136
128
##GitHub-App
137
129
@@ -195,20 +187,10 @@ For GitLab on-premises you also need to provide the URL of the GitLab server in
195
187
###Using external secrets for the token
196
188
197
189
If your GitLab installation is behind your firewall, you can also
198
-
use any[external secrets that you have defined]({{site.baseurl}}/docs/integrations/secret-storage/) (such as Kubernetes secrets) as values by clicking on the lock icon that appears next to field.
190
+
use any[external secrets that you have defined]({{site.baseurl}}/docs/integrations/secret-storage/) (such as Kubernetes secrets) as values by entering a secrets value
191
+
with the same syntax[shown in pipelines]({{site.baseurl}}/docs/configure-ci-cd-pipeline/secrets-store/).
199
192
200
-
{% include
201
-
image.html
202
-
lightbox="true"
203
-
file="/images/pipeline/secrets/lock-icon.png"
204
-
url="/images/pipeline/secrets/lock-icon.png"
205
-
alt="Using a connected secret in the Codefresh GUI"
206
-
caption="Using a connected secret in the Codefresh GUI"
207
-
max-width="50%"
208
-
%}
209
-
210
-
If you have already specified the resource field during secret definition the just enter on the text field the name of the secret directly, i.e.`my-secret-key`.
211
-
If you didn't include a resource name during secret creation then enter the full name in the field like`my-secret-resource@my-secret-key`.
193
+
For example if you already have a`token` on a resource call`git-credentials` you can put in the token field the expression {% raw %}`${{secrets.git-credentials@token}}`{% endraw %}.
212
194
213
195
##Bitbucket
214
196
@@ -327,20 +309,10 @@ Codefresh supports Bitbucket server versions 5.4.0+ since those expose the API u
327
309
###Using external secrets for the token
328
310
329
311
If your Bitbucket Server installation is behind your firewall, you can also
330
-
use any[external secrets that you have defined]({{site.baseurl}}/docs/integrations/secret-storage/) (such as Kubernetes secrets) as values by clicking on the lock icon that appears next to field.
331
-
332
-
{% include
333
-
image.html
334
-
lightbox="true"
335
-
file="/images/pipeline/secrets/lock-icon.png"
336
-
url="/images/pipeline/secrets/lock-icon.png"
337
-
alt="Using a connected secret in the Codefresh GUI"
338
-
caption="Using a connected secret in the Codefresh GUI"
339
-
max-width="50%"
340
-
%}
312
+
use any[external secrets that you have defined]({{site.baseurl}}/docs/integrations/secret-storage/) (such as Kubernetes secrets) as values by entering a secrets value
313
+
with the same syntax[shown in pipelines]({{site.baseurl}}/docs/configure-ci-cd-pipeline/secrets-store/).
341
314
342
-
If you have already specified the resource field during secret definition the just enter on the text field the name of the secret directly, i.e.`my-secret-key`.
343
-
If you didn't include a resource name during secret creation then enter the full name in the field like`my-secret-resource@my-secret-key`.
315
+
For example if you already have a`token` on a resource call`git-credentials` you can put in the token field the expression {% raw %}`${{secrets.git-credentials@token}}`{% endraw %}.