You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/op-installing-tekton-hub-with-login-and-rating.adoc
+4-4Lines changed: 4 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -15,13 +15,13 @@ You can install {tekton-hub} on your cluster with custom configuration that supp
15
15
[discrete]
16
16
.Procedure
17
17
18
-
. Create an OAuth application with your Git repository hosting provider, and note the Client ID and Client Secret. The supported providers are GitHub, GitLab, and BitBucket.
18
+
. Create an OAuth application with your Git repository hosting provider, and note the Client ID and Client Secret. The supported providers are GitHub, GitLab, and Bitbucket.
19
19
20
20
** For a link:https://docs.github.com/en/developers/apps/creating-an-oauth-app[GitHub OAuth application], set the Homepage URL and the Authorization callback URL as `<auth-route>`.
21
21
22
22
** For a link:https://docs.gitlab.com/ee/integration/oauth_provider.html#user-owned-applications[GitLab OAuth application], set the `REDIRECT_URI` as `<auth-route>/auth/gitlab/callback`.
23
23
24
-
** For a link:https://support.atlassian.com/bitbucket-cloud/docs/use-oauth-on-bitbucket-cloud[BitBucket OAuth application], set the `Callback URL` as `<auth-route>`.
24
+
** For a link:https://support.atlassian.com/bitbucket-cloud/docs/use-oauth-on-bitbucket-cloud[Bitbucket OAuth application], set the `Callback URL` as `<auth-route>`.
25
25
26
26
. Edit the `<tekton_hub_root>/config/02-api/20-api-secret.yaml` file to include the {tekton-hub} API secrets. For example:
27
27
+
@@ -51,8 +51,8 @@ stringData:
51
51
<2> The Client Secret from the GitHub OAuth application.
52
52
<3> The Client ID from the GitLab OAuth application.
53
53
<4> The Client Secret from the GitLab OAuth application.
54
-
<5> The Client ID from the BitBucket OAuth application.
55
-
<6> The Client Secret from the BitBucket OAuth application.
54
+
<5> The Client ID from the Bitbucket OAuth application.
55
+
<6> The Client Secret from the Bitbucket OAuth application.
56
56
<7> A long, random string used to sign the JSON Web Token (JWT) created for users.
57
57
<8> Add the time limit after which the access token expires. For example, `1m`, where m denotes minutes. The supported units of time are seconds (`s`), minutes (`m`), hours (`h`), days (`d`), and weeks (`w`).
58
58
<9> Add the time limit after which the refresh token expires. For example, `1m`, where `m` denotes minutes. The supported units of time are seconds (`s`), minutes (`m`), hours (`h`), days (`d`), and weeks (`w`). Ensure that the expiry time set for token refresh is greater than the expiry time set for token access.
Copy file name to clipboardExpand all lines: modules/op-resolver-git-config-scm.adoc
+3-3Lines changed: 3 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -13,8 +13,8 @@ You can use Git repository providers that are supported by the `go-scm` library.
13
13
* `github.com` and GitHub Enterprise
14
14
* `gitlab.com` and self-hosted Gitlab
15
15
* Gitea
16
-
* BitBucket Server
17
-
* BitBucket Cloud
16
+
* Bitbucket Data Center
17
+
* Bitbucket Cloud
18
18
19
19
[NOTE]
20
20
====
@@ -56,7 +56,7 @@ spec:
56
56
<1> The default Git revision to use if none is specified.
57
57
<2> The maximum time any single Git clone resolution may take, for example, `1m`, `2s`, `700ms`. {pipelines-title} also enforces a global maximum timeout of 1 minute on all resolution requests.
58
58
<3> The SCM provider type.
59
-
<4> The base URL for use with the authenticated SCM API. This setting is not required if you are using `github.com`, `gitlab.com`, or BitBucket Cloud.
59
+
<4> The base URL for use with the authenticated SCM API. This setting is not required if you are using `github.com`, `gitlab.com`, or Bitbucket Cloud.
60
60
<5> The name of the secret that contains the SCM provider API token.
61
61
<6> The key within the token secret that contains the token.
62
62
<7> The namespace containing the token secret, if not `default`.
If your organization or project uses Bitbucket Server as the preferred platform, you can use {pac} for your repository with a webhook on Bitbucket Server.
9
+
If your organization or project uses Bitbucket Data Center as the preferred platform, you can use {pac} for your repository with a webhook on Bitbucket Data Center.
10
10
11
11
[discrete]
12
12
.Prerequisites
13
13
14
14
* Ensure that {pac} is installed on the cluster.
15
15
16
-
* Generate a personal access token as the manager of the project on Bitbucket Server, and save a copy of it in an alternate location.
16
+
* Generate a personal access token as the manager of the project on Bitbucket Data Center, and save a copy of it in an alternate location.
17
17
+
18
18
[NOTE]
19
19
====
@@ -31,7 +31,7 @@ If your organization or project uses Bitbucket Server as the preferred platform,
31
31
$ echo https://$(oc get route -n openshift-pipelines pipelines-as-code-controller -o jsonpath='{.spec.host}')
32
32
----
33
33
34
-
. On Bitbucket Server, perform the following steps:
34
+
. On Bitbucket Data Center, perform the following steps:
35
35
36
36
.. Use the left navigation pane of your Bitbucket Data Center repository to go to *Repository settings* –> *Webhooks* and click *Add webhook*.
* link:https://support.atlassian.com/bitbucket-cloud/docs/app-passwords/[Creating app password on Bitbucket Cloud]
57
-
* link:https://developer.atlassian.com/cloud/bitbucket/bitbucket-api-changes-gdpr/#introducing-atlassian-account-id-and-nicknames[Introducing Altassian Account ID and Nicknames]
56
+
* link:https://support.atlassian.com/bitbucket-cloud/docs/app-passwords/[Creating app password on Bitbucket Cloud] (Atlassian documentation)
57
+
* link:https://developer.atlassian.com/cloud/bitbucket/bitbucket-api-changes-gdpr/#introducing-atlassian-account-id-and-nicknames[Introducing Altassian Account ID and Nicknames] in the Atlassian documentation
* link:https://confluence.atlassian.com/bitbucketserver/personal-access-tokens-939515499.html[Creating personal tokens on Bitbucket Server]
64
-
* link:https://support.atlassian.com/bitbucket-cloud/docs/manage-webhooks/#Create-webhooks[Creating webhooks on Bitbucket server]
63
+
* link:https://confluence.atlassian.com/bitbucketserver/personal-access-tokens-939515499.html[Creating personal tokens on Bitbucket Data Center] (Atlassian documentation)
64
+
* link:https://confluence.atlassian.com/bitbucketserver/manage-webhooks-938025878.html[Managing webhooks on Bitbucket Data Center] (Atlassian documentation)
0 commit comments