You signed in with another tab or window.Reload to refresh your session.You signed out in another tab or window.Reload to refresh your session.You switched accounts on another tab or window.Reload to refresh your session.Dismiss alert
@@ -13,12 +13,19 @@ As a user in Codefresh, you can manage your account by authorizing access to you
13
13
* Authorize Git providers
14
14
The Git personal token is a user-specific access token, required to authenticate Git-based actions from Codefresh clients, per provisioned runtime.
15
15
16
-
The authorization method depends on the Git provider and on what authorization has been set up by ypur adin.
16
+
17
+
The authorization method depends on the Git provider and on what authorization has been set up by your account admin.
18
+
19
+
17
20
If your admin has set up authentication with OAuth2, you can authorize access using OAuth2.
18
21
Or, you can always generate a personal access token from your Git provider and then add the same to Codefresh to authorize access.
19
22
20
23
>If you have access to more than one runtime, you can use the same token for multiple runtimes.
21
-
You must however authorize access individually for each runtime.
24
+
You must however authorize access individually for each runtime.
25
+
26
+
{::nomarkdown}
27
+
</br>
28
+
{:/}
22
29
23
30
###Enable access for Codefresh support
24
31
Enable Codefresh support personnel to access your user account. Access to your account is useful for visibility during troubleshooting.
@@ -40,87 +47,137 @@ You can disable this security setting at any time.
40
47
max-width="50%"
41
48
%}
42
49
43
-
###Authorize Git access with OAuth or personal access tokens
44
-
Authorize Git access with OAuth2 if your account admin has set up Codefresh as an OAuth application, or alternatively through personal access tokens from your Git provider.
45
-
* For OAuth2: The adminstrator pre-configures the permissions and expiry date. Once you supply your credentials for authorization, you are automatically directed to the Git Personal Tokens page.
46
-
47
-
####Generate personal access token for GitHub
48
-
49
-
####Authorize access for Bitbucket
50
-
Bitbucket requires your Bitbucket account name and a personal access token to authorize access.
51
-
52
-
**Generate personal access token**
53
-
54
-
1. Log in to your Bitbucket Cloud or Server account.
55
-
1. Select**Manage account > Account settings > Personal access tokens**.
56
-
1. Select these scopes:`repository write`,`Project read`.
57
-
1. Copy the personal access token generated as you will need it to authorize access.
58
-
59
-
**How to**
60
-
1. In the Codefresh UI, go to[User Settings](https://g.codefresh.io/2.0/user-settings){:target="\_blank"}.
61
-
1. Select the runtime, and then select one of the following:
62
-
* To add a token, select**Add Token**.
63
-
* To update an existing token by replacing it with a new token, select**Update Token**.
64
-
1. From the**Select Git provider** drop-down, select**Bitbucket**.
65
-
1. In the**Bitbucket username field**, enter the username of your Bitbucket account.
66
-
1. In the**Bitbucket Personal Access Token** field, paste the token you generated.
67
-
68
-
<!---add new screenshot>-->
50
+
{::nomarkdown}
51
+
</br>
52
+
{:/}
69
53
54
+
###Authorize Git access in Codefresh
55
+
Authorize Git access with OAuth2 if your account admin has set up Codefresh as an OAuth application, or alternatively through personal access tokens from your Git provider.
56
+
>Notes:
57
+
For OAuth2: The adminstrator pre-configures the permissions and expiry date. Once you supply your credentials for authorization, you are automatically directed to the Git Personal Tokens page.
70
58
71
-
{:start="6"}
72
-
1. Click**Add Token**.
73
-
In the Git Personal Access Tokens list, you can see that the new token is assigned to the runtime.
59
+
**Before you begin**
74
60
75
-
####Authorize access for GitHub
76
-
**Before you begin**
77
61
Make sure you have:
78
62
* For Bitbucket only, your Bitbucket account username
79
-
* If needed, a_personal access token_ with the required scopes:
If you have not provisioned a hosted runtime, Codefresh presents you with the setup instructions in the**Home** dashboard.
16
15
@@ -119,17 +118,19 @@ max-width="70%"
119
118
*[Download the CLI]({{site.baseurl}}/docs/clients/csdp-cli/).
120
119
121
120
1. Uninstall the failed hosted runtime:
122
-
`cf runtime uninstallhosted-codefresh --force`
121
+
`cf runtime uninstall codefresh-hosted --force`
123
122
where:
124
123
`hosted-codefresh` is the name of your hosted runtime, automatically assigned by Codefresh.
125
124
1. In the Codefresh UI, return to Codefresh[Home](https://g.codefresh.io/2.0/?time=LAST_7_DAYS){:target="\_blank"}.
126
125
1. Refresh the page and start with_1. Provision hosted runtime_ above.
127
126
128
127
129
128
###2. Connect Git provider
130
-
Connect your hosted runtime to a Git provider for Codefresh to create the required Git repos. First authorize access to your Git provider through an OAuth token, and then select the Git organizations or accounts in which to create the required Git repos.
129
+
Connect your hosted runtime to a Git provider for Codefresh to create the required Git repos. First authorize access to your Git provider through an OAuth token, and then select the Git organizations or accounts in which to create the required Git repos.
130
+
131
131
>Only authorized organizations are displayed in the list. To authorize organizations for the Codefresh application in GitHub, see[Authorize organizations/projects]({{site.baseurl}}/docs/administration/hosted-authorize-orgs/).
132
132
133
+
133
134
{% include
134
135
image.html
135
136
lightbox="true"
@@ -140,17 +141,11 @@ caption="Step 2: Connect to Git provider"
140
141
max-width="80%"
141
142
%}
142
143
143
-
You can connect your hosted runtime to any of these Git providers:
144
-
* GitHub (the default)
145
-
* Bitbucket Cloud
146
-
<!---* GitLab-->
147
-
148
-
>If the hosted runtime is the first runtime you are provisioning for your account, the Git provider you connect to is used for any hybrid runtimes you provision for the same account. This is because of the configuration repo that is created and shared by runtimes in the same account.
149
144
150
145
Once you authorize access, Codefresh creates two Git repositories, one to store the runtime configuration settings, and the other to store the runtime's application settings:
151
146
* Shared runtime configuration repo
152
147
153
-
The shared runtime configuration repo is a centralized Git repository that stores configuration settings for the hosted runtime. Additional runtimes provisioned for the account point to this repo to retrieve and reuse the configuration.
148
+
The shared runtime configuration repo is a centralized Git repository that stores configuration settings for the hosted runtime. Additional runtimes provisioned for the accountcanpoint to this repo to retrieve and reuse the configuration.
Copy file name to clipboardExpand all lines: _docs/runtime/installation-options.md
+3-6Lines changed: 3 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,16 +50,13 @@ Codefresh Runtime creates three repositories in your organization's Git provider
50
50
51
51
* Codefresh runtime installation repository
52
52
* Codefresh Git Sources
53
-
* Codefresh shared configuration repository
53
+
* Codefresh shared configuration repository. It does so for two types of entities:
54
54
55
-
<!---**Codefresh Runtime functionality**
56
-
57
-
58
-
**Codefresh Runtime functionality**
55
+
**Codefresh Runtime finctionality**
59
56
The runtime:
60
57
* Ensures that the installation repository and the Git Sources are always in sync, and applies Git changes back to the cluster
61
58
* Receives events and information from the user's organization systems to execute workflows
62
-
By default, the ingress controller directs all requests and events to the Codefresh Application Proxy. When internal and an external ingress hosts are configured, the ingress comtroller directs webhook events to the relevant Event Source and then to Argo Events (not via the Codefresh Application Proxy).-->
59
+
By default, the ingress controller directs all requests and events to the Codefresh Application Proxy. When internal and an external ingress hosts are configured, the ingress comtroller directs webhook events to the relevant Event Source and then to Argo Events (not via the Codefresh Application Proxy).