1
0
mirror of https://github.com/openshift/openshift-docs.git synced 2026-02-05 12:46:18 +01:00

authenticate pipelines using git secret

draft

side frills

minor corrections

refactoring

modifying aaaitional resources

some more tweaks to xref anchors

intermediate changes based on comments

incorporating review comments

incorporating review comments

removed vale related stuff from gitignore

small correction
This commit is contained in:
Souvik Sarkar
2021-10-18 13:56:19 +05:30
committed by openshift-cherrypick-robot
parent 0f3087ba59
commit 93e5e2b271
12 changed files with 334 additions and 5 deletions

1
.gitignore vendored
View File

@@ -14,3 +14,4 @@ dev_guide/builds/images/chained-build.png.cache
.gem
bin
commercial_package

View File

@@ -1456,6 +1456,8 @@ Topics:
File: using-pods-in-a-privileged-security-context
- Name: Securing webhooks with event listeners
File: securing-webhooks-with-event-listeners
- Name: Authenticating pipelines using git secret
File: authenticating-pipelines-using-git-secret
- Name: Viewing pipeline logs using the OpenShift Logging Operator
File: viewing-pipeline-logs-using-the-openshift-logging-operator
- Name: GitOps

View File

@@ -0,0 +1,23 @@
[id="authenticating-pipelines-using-git-secret"]
= Authenticating pipelines using git secret
include::modules/common-attributes.adoc[]
include::modules/pipelines-document-attributes.adoc[]
:context: authenticating-pipelines-using-git-secret
toc::[]
A Git secret consists of credentials to securely interact with a Git repository, and is often used to automate authentication. In {pipelines-title}, you can use Git secrets to authenticate pipeline runs and task runs that interact with a Git repository during execution.
A pipeline run or a task run gains access to the secrets through the associated service account. {pipelines-shortname} support the use of Git secrets as annotations (key-value pairs) for basic authentication and SSH-based authentication.
include::modules/op-understanding-credential-selection.adoc[leveloffset=+1]
include::modules/op-configuring-basic-authentication-for-git.adoc[leveloffset=+1]
include::modules/op-configuring-ssh-authentication-for-git.adoc[leveloffset=+1]
include::modules/op-using-ssh-authentication-in-git-type-tasks.adoc[leveloffset=+1]
include::modules/op-using-secrets-as-a-nonroot-user.adoc[leveloffset=+1]
include::modules/op-limiting-secret-access-to-specific-steps.adoc[leveloffset=+1]

View File

@@ -3,11 +3,13 @@
// *openshift_pipelines/op-creating-applications-with-cicd-pipelines.adoc
[id="about-pipelinerun_{context}"]
= Pipeline run
= PipelineRun
A _pipeline run_ is the running instance of a pipeline. It instantiates a pipeline for execution with specific inputs, outputs, and execution parameters on a cluster. A corresponding task run is created for each task automatically in the pipeline run.
A `PipelineRun` is a type of resource that binds a pipeline, workspaces, credentials, and a set of parameter values specific to a scenario to run the CI/CD workflow.
All the tasks in the pipeline are executed in the defined sequence until all tasks are successful or a task fails. The `status` field tracks and stores the progress of each task run in the pipeline run for monitoring and auditing purpose.
A _pipeline run_ is the running instance of a pipeline. It instantiates a pipeline for execution with specific inputs, outputs, and execution parameters on a cluster. It also creates a task run for each task in the pipeline run.
The pipeline runs the tasks sequentially until they are complete or a task fails. The `status` field tracks and the progress of each task run and stores it for monitoring and auditing purposes.
The following example runs the `build-and-deploy` pipeline with relevant resources and parameters:
[source,yaml]
@@ -37,8 +39,12 @@ spec:
storage: 500Mi
----
<1> Pipeline run API version `v1beta1`.
<2> Specifies the type of Kubernetes object. In this example, `PipelineRun`.
<2> The type of Kubernetes object. In this example, `PipelineRun`.
<3> Unique name to identify this pipeline run.
<4> Name of the pipeline to be run. In this example, `build-and-deploy`.
<5> Specifies the list of parameters required to run the pipeline.
<5> The list of parameters required to run the pipeline.
<6> Workspace used by the pipeline run.
.Additional resources
* xref:../../cicd/pipelines/authenticating-pipelines-using-git-secret.adoc#authenticating-pipelines-using-git-secret[Authenticating pipelines using git secret]

View File

@@ -0,0 +1,96 @@
// This module is included in the following assembly:
//
// *openshift-docs/cicd/pipelines/authenticating-pipelines-using-git-secret.adoc
[id="op-configuring-basic-authentication-for-git_{context}"]
= Configuring basic authentication for Git
[role="_abstract"]
For a pipeline to retrieve resources from password-protected repositories, you must configure the basic authentication for that pipeline.
To configure basic authentication for a pipeline, update the `secret.yaml`, `serviceaccount.yaml`, and `run.yaml` files with the credentials from the Git secret for the specified repository. When you complete this process, {pipelines-shortname} can use that information to retrieve the specified pipeline resources.
[NOTE]
====
For GitHub, authentication using plain password is deprecated. Instead, use a link:https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/creating-a-personal-access-token[personal access token].
====
.Procedure
. In the `secret.yaml` file, specify the username and password or link:https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/creating-a-personal-access-token[GitHub personal access token] to access the target Git repository.
+
[source,yaml,subs="attributes+"]
----
apiVersion: v1
kind: Secret
metadata:
name: basic-user-pass <1>
annotations:
tekton.dev/git-0: https://github.com
type: kubernetes.io/basic-auth
stringData:
username: <2>
password: <3>
----
<1> Name of the secret. In this example, `basic-user-pass`.
<2> Username for the Git repository.
<3> Password for the Git repository.
+
. In the `serviceaccount.yaml` file, associate the secret with the appropriate service account.
+
[source,yaml,subs="attributes+"]
----
apiVersion: v1
kind: ServiceAccount
metadata:
name: build-bot <1>
secrets:
- name: basic-user-pass <2>
----
<1> Name of the service account. In this example, `build-bot`.
<2> Name of the secret. In this example, `basic-user-pass`.
+
. In the `run.yaml` file, associate the service account with a task run or a pipeline run.
+
* Associate the service account with a task run:
+
[source,yaml,subs="attributes+"]
----
apiVersion: tekton.dev/v1beta1
kind: TaskRun
metadata:
name: build-push-task-run-2 <1>
spec:
serviceAccountName: build-bot <2>
taskRef:
name: build-push <3>
----
<1> Name of the task run. In this example, `build-push-task-run-2`.
<2> Name of the service account. In this example, `build-bot`.
<3> Name of the task. In this example, `build-push`.
+
* Associate the service account with a `PipelineRun` resource:
+
[source,yaml,subs="attributes+"]
----
apiVersion: tekton.dev/v1beta1
kind: PipelineRun
metadata:
name: demo-pipeline <1>
namespace: default
spec:
serviceAccountName: build-bot <2>
pipelineRef:
name: demo-pipeline <3>
----
<1> Name of the pipeline run. In this example, `demo-pipeline`.
<2> Name of the service account. In this example, `build-bot`.
<3> Name of the pipeline. In this example, `demo-pipeline`.
+
. Apply the changes.
+
[source,terminal]
----
$ kubectl apply --filename secret.yaml,serviceaccount.yaml,run.yaml
----

View File

@@ -0,0 +1,102 @@
// This module is included in the following assembly:
//
// *openshift-docs/cicd/pipelines/authenticating-pipelines-using-git-secret.adoc
[id="op-configuring-ssh-authentication-for-git_{context}"]
= Configuring SSH authentication for Git
[role="_abstract"]
For a pipeline to retrieve resources from repositories configured with SSH keys, you must configure the SSH-based authentication for that pipeline.
To configure SSH-based authentication for a pipeline, update the `secret.yaml`, `serviceaccount.yaml`, and `run.yaml` files with the credentials from the SSH private key for the specified repository. When you complete this process, {pipelines-shortname} can use that information to retrieve the specified pipeline resources.
[NOTE]
====
Consider using SSH-based authentication rather than basic authentication.
====
.Procedure
. Generate an link:https://docs.github.com/en/authentication/connecting-to-github-with-ssh/generating-a-new-ssh-key-and-adding-it-to-the-ssh-agent[SSH private key], or copy an existing private key, which is usually available in the `~/.ssh/id_rsa` file.
. In the `secret.yaml` file, set the value of `ssh-privatekey` to the name of the SSH private key file, and set the value of `known_hosts` to the name of the known hosts file.
+
[source,yaml,subs="attributes+"]
----
apiVersion: v1
kind: Secret
metadata:
name: ssh-key <1>
annotations:
tekton.dev/git-0: github.com
type: kubernetes.io/ssh-auth
stringData:
ssh-privatekey: <2>
known_hosts: <3>
----
<1> Name of the secret containing the SSH private key. In this example, `ssh-key`.
<2> Name of the file containing the SSH private key string.
<3> Name of the file containing a list of known hosts.
+
[CAUTION]
====
If you omit the private key, {pipelines-shortname} accepts the public key of any server.
====
+
. Optional: To specify a custom SSH port, add `:<port number>` to the end of the `annotation` value. For example, `tekton.dev/git-0: github.com:2222`.
. In the `serviceaccount.yaml` file, associate the `ssh-key` secret with the `build-bot` service account.
+
[source,yaml,subs="attributes+"]
----
apiVersion: v1
kind: ServiceAccount
metadata:
name: build-bot <1>
secrets:
- name: ssh-key <2>
----
<1> Name of the service account. In this example, `build-bot`.
<2> Name of the secret containing the SSH private key. In this example, `ssh-key`.
+
. In the `run.yaml` file, associate the service account with a task run or a pipeline run.
+
* Associate the service account with a task run:
+
[source,yaml,subs="attributes+"]
----
apiVersion: tekton.dev/v1beta1
kind: TaskRun
metadata:
name: build-push-task-run-2 <1>
spec:
serviceAccountName: build-bot <2>
taskRef:
name: build-push <3>
----
<1> Name of the task run. In this example, `build-push-task-run-2`.
<2> Name of the service account. In this example, `build-bot`.
<3> Name of the task. In this example, `build-push`.
+
* Associate the service account with a pipeline run:
+
[source,yaml,subs="attributes+"]
----
apiVersion: tekton.dev/v1beta1
kind: PipelineRun
metadata:
name: demo-pipeline <1>
namespace: default
spec:
serviceAccountName: build-bot <2>
pipelineRef:
name: demo-pipeline <3>
----
<1> Name of the pipeline run. In this example, `demo-pipeline`.
<2> Name of the service account. In this example, `build-bot`.
<3> Name of the pipeline. In this example, `demo-pipeline`.
+
. Apply the changes.
+
[source,terminal]
----
$ kubectl apply --filename secret.yaml,serviceaccount.yaml,run.yaml
----

View File

@@ -0,0 +1,10 @@
// This module is included in the following assembly:
//
// *openshift-docs/cicd/pipelines/authenticating-pipelines-using-git-secret.adoc
[id="op-limiting-secret-access-to-specific-steps_{context}"]
= Limiting secret access to specific steps
By default, the secrets for {pipelines-shortname} are stored in the `$HOME/tekton/home` directory, and are available for all the steps in a task.
To limit a secret to specific steps, use the secret definition to specify a volume, and mount the volume in specific steps.

View File

@@ -85,3 +85,7 @@ Note the output of the previous command. You can access the application using th
----
$ tkn pipeline start build-and-deploy --last
----
.Additional resources
* xref:../../cicd/pipelines/authenticating-pipelines-using-git-secret.adoc#authenticating-pipelines-using-git-secret[Authenticating pipelines using git secret]

View File

@@ -33,6 +33,15 @@ Select *Add Credentials* if you want to specify an additional *Registry Server A
* For the *Authentication Type* `Basic Authentication`, specify the values for the *UserName* and *Password or Token* fields.
* For the *Authentication Type* `SSH Keys`, specify the value of the *SSH Private Key* field.
+
[NOTE]
====
For basic authentication and SSH authentication, you can use annotations such as:
* `tekton.dev/git-0: https://github.com`
* `tekton.dev/git-1: https://gitlab.com`.
====
+
... Select the check mark to add the secret.
+

View File

@@ -0,0 +1,45 @@
// This module is included in the following assembly:
//
// *openshift-docs/cicd/pipelines/authenticating-pipelines-using-git-secret.adoc
[id="op-understanding-credential-selection_{context}"]
= Credential selection
A pipeline run or task run might require multiple authentications to access different Git repositories. Annotate each secret with the domains where {pipelines-shortname} can use its credentials.
A credential annotation key for Git secrets must begin with `tekton.dev/git-`, and its value is the URL of the host for which you want {pipelines-shortname} to use that credential.
In the following example, {pipelines-shortname} uses a `basic-auth` secret, which relies on a username and password, to access repositories at `github.com` and `gitlab.com`.
.Example: Multiple credentials for basic authentication
[source,yaml,subs="attributes+"]
----
apiVersion: v1
kind: Secret
metadata:
annotations:
tekton.dev/git-0: github.com
tekton.dev/git-1: gitlab.com
type: kubernetes.io/basic-auth
stringData:
username: <1>
password: <2>
----
<1> Username for the repository
<2> Password or personal access token for the repository
You can also use an `ssh-auth` secret (private key) to access a Git repository.
.Example: Private key for SSH based authentication
[source,yaml,subs="attributes+"]
----
apiVersion: v1
kind: Secret
metadata:
annotations:
tekton.dev/git-0: https://github.com
type: kubernetes.io/ssh-auth
stringData:
ssh-privatekey: <1>
----
<1> Name of the file containing the SSH private key string.

View File

@@ -0,0 +1,19 @@
// This module is included in the following assembly:
//
// *openshift-docs/cicd/pipelines/authenticating-pipelines-using-git-secret.adoc
[id="op-using-secrets-as-a-nonroot-user_{context}"]
= Using secrets as a non-root user
You might need to use secrets as a non-root user in certain scenarios, such as:
* The users and groups that the containers use to execute runs are randomized by the platform.
* The steps in a task define a non-root security context.
* A task specifies a global non-root security context, which applies to all steps in a task.
In such scenarios, consider the following aspects of executing task runs and pipeline runs as a non-root user:
* SSH authentication for Git requires the user to have a valid home directory configured in the `/etc/passwd` directory. Specifying a UID that has no valid home directory results in authentication failure.
* SSH authentication ignores the `$HOME` environment variable. So you must or symlink the appropriate secret files from the `$HOME` directory defined by {pipelines-shortname} (`/tekton/home`), to the non-root user's valid home directory.
In addition, to configure SSH authentication in a non-root security context, refer to the link:https://github.com/tektoncd/pipeline/blob/main/examples/v1beta1/taskruns/authenticating-git-commands.yaml[example for authenticating git commands].

View File

@@ -0,0 +1,12 @@
// This module is included in the following assembly:
//
// *openshift-docs/cicd/pipelines/authenticating-pipelines-using-git-secret.adoc
[id="op-using-ssh-authentication-in-git-type-tasks_{context}"]
= Using SSH authentication in git type tasks
When invoking Git commands, you can use SSH authentication directly in the steps of a task. SSH authentication ignores the `$HOME` variable and only uses the user's home directory specified in the `/etc/passwd` file. So each step in a task must symlink the `/tekton/home/.ssh` directory to the home directory of the associated user.
However, explicit symlinks are not necessary when you use a pipeline resource of the `git` type, or the `git-clone` task available in the Tekton catalog.
As an example of using SSH authentication in `git` type tasks, refer to link:https://github.com/tektoncd/pipeline/blob/main/examples/v1beta1/taskruns/authenticating-git-commands.yaml[authenticating-git-commands.yaml].