-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support kerberos authentication for private git repos #17782
Comments
@pdaverh this documentation article describes how to inject git credential store files using secrets. Wouldn't that work? |
@pdaverh I successfully created and injected git credentials store file to my Che deployment as @l0rd mentioned in the previous comment. Could you give us a bit more details about your case you are trying to solve? It looks like it's not a question to Che, but configuration issue. |
The issue is specific to kerberos tokens, as they are different than traditional git credentials. |
@vitaliy-guliy please have a look at https://www.openshift.com/blog/kerberos-sidecar-container The article explains how a kerberos token is requested/refreshed using the command line tool I believe that including The article goes also into the details of a sidecar approach to automatically refresh the Kerberos tokens. This sidecar approach can be easily implemented with a So for now I would only document how we can currently configure a Che workspace to:
@vitaliy-guliy ping me if you need help to setup a git repo using Kerberos auth. |
Thanks for the guidance Mario, we'll revisit this issue next sprint (192). |
Issues go stale after Mark the issue as fresh with If this issue is safe to close now please do so. Moderators: Add |
Is your enhancement related to a problem? Please describe.
Currently, Eclipse Che does not allow credentials known to the cluster to authenticate private git repo access.
Describe the solution you'd like
Instead of user/password authentication for private git repos, I would like Che to leverage kerberos token already known to the cluster. When a project is added to a Che workspace, the git credentials for the source repository should be based on the kerberos credentials of the user running the workspace.
Describe alternatives you've considered
An alternative is to use SSH keys for private git repos, but that will not work in the environment.
Additional context
The text was updated successfully, but these errors were encountered: