Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commita8fca51

Browse files
Use expression for git providers
1 parent94898cf commita8fca51

File tree

1 file changed

+10
-38
lines changed

1 file changed

+10
-38
lines changed

‎_docs/integrations/git-providers.md‎

Lines changed: 10 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -118,20 +118,12 @@ For GitHub on-premises you also need to provide the URL of the GitHub server in
118118
###Using external secrets for the token
119119

120120
If your GitHub installation is behind your firewall, you can also
121-
use any[external secrets that you have defined]({{site.baseurl}}/docs/integrations/secret-storage/) (such as Kubernetes secrets) as values by clicking on the lock icon that appears next to field.
121+
use any[external secrets that you have defined]({{site.baseurl}}/docs/integrations/secret-storage/) (such as Kubernetes secrets) as values by entering a secrets value
122+
with the same syntax[shown in pipelines]({{site.baseurl}}/docs/configure-ci-cd-pipeline/secrets-store/).
123+
124+
For example if you already have a`token` on a resource call`git-credentials` you can put in the token field the expression {% raw %}`${{secrets.git-credentials@token}}`{% endraw %}.
122125

123-
{% include
124-
image.html
125-
lightbox="true"
126-
file="/images/pipeline/secrets/lock-icon.png"
127-
url="/images/pipeline/secrets/lock-icon.png"
128-
alt="Using a connected secret in the Codefresh GUI"
129-
caption="Using a connected secret in the Codefresh GUI"
130-
max-width="50%"
131-
%}
132126

133-
If you have already specified the resource field during secret definition the just enter on the text field the name of the secret directly, i.e.`my-secret-key`.
134-
If you didn't include a resource name during secret creation then enter the full name in the field like`my-secret-resource@my-secret-key`.
135127

136128
##GitHub-App
137129

@@ -195,20 +187,10 @@ For GitLab on-premises you also need to provide the URL of the GitLab server in
195187
###Using external secrets for the token
196188

197189
If your GitLab installation is behind your firewall, you can also
198-
use any[external secrets that you have defined]({{site.baseurl}}/docs/integrations/secret-storage/) (such as Kubernetes secrets) as values by clicking on the lock icon that appears next to field.
190+
use any[external secrets that you have defined]({{site.baseurl}}/docs/integrations/secret-storage/) (such as Kubernetes secrets) as values by entering a secrets value
191+
with the same syntax[shown in pipelines]({{site.baseurl}}/docs/configure-ci-cd-pipeline/secrets-store/).
199192

200-
{% include
201-
image.html
202-
lightbox="true"
203-
file="/images/pipeline/secrets/lock-icon.png"
204-
url="/images/pipeline/secrets/lock-icon.png"
205-
alt="Using a connected secret in the Codefresh GUI"
206-
caption="Using a connected secret in the Codefresh GUI"
207-
max-width="50%"
208-
%}
209-
210-
If you have already specified the resource field during secret definition the just enter on the text field the name of the secret directly, i.e.`my-secret-key`.
211-
If you didn't include a resource name during secret creation then enter the full name in the field like`my-secret-resource@my-secret-key`.
193+
For example if you already have a`token` on a resource call`git-credentials` you can put in the token field the expression {% raw %}`${{secrets.git-credentials@token}}`{% endraw %}.
212194

213195
##Bitbucket
214196

@@ -327,20 +309,10 @@ Codefresh supports Bitbucket server versions 5.4.0+ since those expose the API u
327309
###Using external secrets for the token
328310

329311
If your Bitbucket Server installation is behind your firewall, you can also
330-
use any[external secrets that you have defined]({{site.baseurl}}/docs/integrations/secret-storage/) (such as Kubernetes secrets) as values by clicking on the lock icon that appears next to field.
331-
332-
{% include
333-
image.html
334-
lightbox="true"
335-
file="/images/pipeline/secrets/lock-icon.png"
336-
url="/images/pipeline/secrets/lock-icon.png"
337-
alt="Using a connected secret in the Codefresh GUI"
338-
caption="Using a connected secret in the Codefresh GUI"
339-
max-width="50%"
340-
%}
312+
use any[external secrets that you have defined]({{site.baseurl}}/docs/integrations/secret-storage/) (such as Kubernetes secrets) as values by entering a secrets value
313+
with the same syntax[shown in pipelines]({{site.baseurl}}/docs/configure-ci-cd-pipeline/secrets-store/).
341314

342-
If you have already specified the resource field during secret definition the just enter on the text field the name of the secret directly, i.e.`my-secret-key`.
343-
If you didn't include a resource name during secret creation then enter the full name in the field like`my-secret-resource@my-secret-key`.
315+
For example if you already have a`token` on a resource call`git-credentials` you can put in the token field the expression {% raw %}`${{secrets.git-credentials@token}}`{% endraw %}.
344316

345317

346318
##Using your git provider

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp