You signed in with another tab or window.Reload to refresh your session.You signed out in another tab or window.Reload to refresh your session.You switched accounts on another tab or window.Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: _docs/integrations/git-providers.md
+55Lines changed: 55 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -114,6 +114,25 @@ alt="GitHub permissions"
114
114
115
115
For GitHub on-premises you also need to provide the URL of the GitHub server in your organization. If enabled in your account you can setup[Pipeline definition restrictions]({{site.baseurl}}/docs/administration/access-control/#pipeline-definition-restrictions) by expanding the*YAML Options* segment.
116
116
117
+
118
+
###Using external secrets for the token
119
+
120
+
If your GitHub installation is behind your firewall, you can also
121
+
use any[external secrets that you have defined]({{site.baseurl}}/docs/integrations/secret-storage/) (such as Kubernetes secrets) as values by clicking on the lock icon that appears next to field.
122
+
123
+
{% include
124
+
image.html
125
+
lightbox="true"
126
+
file="/images/pipeline/secrets/lock-icon.png"
127
+
url="/images/pipeline/secrets/lock-icon.png"
128
+
alt="Using a connected secret in the Codefresh GUI"
129
+
caption="Using a connected secret in the Codefresh GUI"
130
+
max-width="50%"
131
+
%}
132
+
133
+
If you have already specified the resource field during secret definition the just enter on the text field the name of the secret directly, i.e.`my-secret-key`.
134
+
If you didn't include a resource name during secret creation then enter the full name in the field like`my-secret-resource@my-secret-key`.
135
+
117
136
##GitHub-App
118
137
119
138
>This is an incubating feature not enabled by default. Please contact us for updates.
@@ -173,6 +192,24 @@ now save the git integration.
173
192
174
193
For GitLab on-premises you also need to provide the URL of the GitLab server in your organization. If enabled in your account you can setup[Pipeline definition restrictions]({{site.baseurl}}/docs/administration/access-control/#pipeline-definition-restrictions) by expanding the*YAML Options* segment.
175
194
195
+
###Using external secrets for the token
196
+
197
+
If your GitLab installation is behind your firewall, you can also
198
+
use any[external secrets that you have defined]({{site.baseurl}}/docs/integrations/secret-storage/) (such as Kubernetes secrets) as values by clicking on the lock icon that appears next to field.
199
+
200
+
{% include
201
+
image.html
202
+
lightbox="true"
203
+
file="/images/pipeline/secrets/lock-icon.png"
204
+
url="/images/pipeline/secrets/lock-icon.png"
205
+
alt="Using a connected secret in the Codefresh GUI"
206
+
caption="Using a connected secret in the Codefresh GUI"
207
+
max-width="50%"
208
+
%}
209
+
210
+
If you have already specified the resource field during secret definition the just enter on the text field the name of the secret directly, i.e.`my-secret-key`.
211
+
If you didn't include a resource name during secret creation then enter the full name in the field like`my-secret-resource@my-secret-key`.
212
+
176
213
##Bitbucket
177
214
178
215
For the**OAuth2 method** you only need to enter a name for your connection and click*Save*. Then accept the permissions dialog. This is the easiest and recommended way to integrate Bitbucket. Notice that if
@@ -287,6 +324,24 @@ installation.
287
324
288
325
Codefresh supports Bitbucket server versions 5.4.0+ since those expose the API used by the integration.
289
326
327
+
###Using external secrets for the token
328
+
329
+
If your Bitbucket Server installation is behind your firewall, you can also
330
+
use any[external secrets that you have defined]({{site.baseurl}}/docs/integrations/secret-storage/) (such as Kubernetes secrets) as values by clicking on the lock icon that appears next to field.
331
+
332
+
{% include
333
+
image.html
334
+
lightbox="true"
335
+
file="/images/pipeline/secrets/lock-icon.png"
336
+
url="/images/pipeline/secrets/lock-icon.png"
337
+
alt="Using a connected secret in the Codefresh GUI"
338
+
caption="Using a connected secret in the Codefresh GUI"
339
+
max-width="50%"
340
+
%}
341
+
342
+
If you have already specified the resource field during secret definition the just enter on the text field the name of the secret directly, i.e.`my-secret-key`.
343
+
If you didn't include a resource name during secret creation then enter the full name in the field like`my-secret-resource@my-secret-key`.
Copy file name to clipboardExpand all lines: _docs/whats-new/whats-new.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,6 +11,10 @@ toc: true
11
11
12
12
###January 2021
13
13
14
+
- Using external secrets in Codefresh GUI -[documentation]({{site.baseurl}}/docs/configure-ci-cd-pipeline/secrets-store/#using-secrets-in-the-codefresh-gui)
15
+
- Using external secrets in Github, Gitlab and Bitbucket server integration -[documentation]({{site.baseurl}}/docs/integrations/git-providers/#using-external-secrets-for-the-token)
16
+
- Using external secrets in shared configuration -[documentation]({{site.baseurl}}/docs/configure-ci-cd-pipeline/shared-configuration/#using-external-secrets-as-values)
17
+
- Using external secrets in cloud storage integration -[documentation]({{site.baseurl}}/docs/testing/test-reports/#connecting-an-s3-bucket)
14
18
- Get Code Coverage Reports with Codacy -[documentation]({{site.baseurl}}/docs/yaml-examples/examples/codacy-testing)
15
19
- Git clone now supports a proxy connection -[documentation]({{site.baseurl}}/docs/codefresh-yaml/steps/git-clone/#using-git-behind-a-proxy)
16
20
- Support for other container runtimes (containerd, cri-o) in the Runner -[documentation]({{site.baseurl}}/docs/administration/codefresh-runner/#prerequisites)