Please Note: this Task is only compatible with Tekton Pipelines versions 0.21.0 and greater!
This Task
has two required inputs:
- The URL of a git repo to clone provided with the
url
param. - A Workspace called
output
.
The git-clone
Task
will clone a repo from the provided url
into the
output
Workspace. By default the repo will be cloned into the root of
your Workspace. You can clone into a subdirectory by setting this Task
's
subdirectory
param. If the directory where the repo will be cloned is
already populated then by default the contents will be deleted before the
clone takes place. This behaviour can be disabled by setting the
deleteExisting
param to "false"
.
-
output: A workspace for this Task to fetch the git repository in to.
-
ssh-directory: An optional workspace to provide SSH credentials. At minimum this should include a private key but can also include other common files from
.ssh
includingconfig
andknown_hosts
. It is strongly recommended that this workspace be bound to a KubernetesSecret
. -
basic-auth: An optional workspace containing
.gitconfig
and.git-credentials
files. This allows username/password/access token to be provided for basic auth.It is strongly recommended that this workspace be bound to a Kubernetes
Secret
. For details on the correct format of the files in this Workspace see Using basic-auth Credentials below.Note: Settings provided as part of a
.gitconfig
file can affect the execution ofgit
in ways that conflict with the parameters of this Task. For example, specifying proxy settings in.gitconfig
could conflict with thehttpProxy
andhttpsProxy
parameters this Task provides. Nothing prevents you setting these parameters but it is not advised.
- url: Repository URL to clone from. (required)
- revision: Revision to checkout. (branch, tag, sha, ref, etc...) (default: "")
- refspec: Refspec to fetch before checking out revision. (default:"")
- submodules: Initialize and fetch git submodules. (default: true)
- depth: Perform a shallow clone, fetching only the most recent N commits. (default: 1)
- sslVerify: Set the
http.sslVerify
global git config. Setting this tofalse
is not advised unless you are sure that you trust your git remote. (default: true) - subdirectory: Subdirectory inside the
output
workspace to clone the repo into. (default: "") - deleteExisting: Clean out the contents of the destination directory if it already exists before cloning. (default: true)
- httpProxy: HTTP proxy server for non-SSL requests. (default: "")
- httpsProxy: HTTPS proxy server for SSL requests. (default: "")
- noProxy: Opt out of proxying HTTP/HTTPS requests. (default: "")
- verbose: Log the commands that are executed during
git-clone
's operation. (default: true) - sparseCheckoutDirectories: which directories to match or exclude when performing a sparse checkout (default: "")
- gitInitImage: The image providing the git-init binary that this Task runs. (default: "gcr.io/tekton-releases/github.com/tektoncd/pipeline/cmd/git-init:TODO")
- userHome: The user's home directory. Set this explicitly if you are running the image as a non-root user. (default: "/tekton/home")
- commit: The precise commit SHA that was fetched by this Task
- url: The precise URL that was fetched by this Task
The Task can be run on linux/amd64
, linux/s390x
, linux/arm64
, and linux/ppc64le
platforms.
If the revision
is not provided in the param of the taskrun
then it will auto-detect the branch as specified by the default
in the respective git repository.
The following pipelines demonstrate usage of the git-clone Task:
- Cloning a branch
- Checking out a specific git commit
- Checking out a git tag and using the "commit" Task Result
This Task supports fetching private repositories. There are two ways to authenticate:
-
The simplest approach is to bind an
ssh-directory
workspace to this Task. The workspace should contain private keys (e.g.id_rsa
),config
andknown_hosts
files - anything you need to interact with your git remote via SSH. It's strongly recommended that you use KubernetesSecrets
to hold your credentials and bind to this workspace.In a TaskRun that would look something like this:
kind: TaskRun spec: workspaces: - name: ssh-directory secret: secretName: my-ssh-credentials
And in a Pipeline and PipelineRun it would look like this:
kind: Pipeline spec: workspaces: - name: ssh-creds # ... tasks: - name: fetch-source taskRef: name: git-clone workspaces: - name: ssh-directory workspace: ssh-creds # ... --- kind: PipelineRun spec: workspaces: - name: ssh-creds secret: secretName: my-ssh-credentials # ...
The
Secret
would appear the same in both cases - structured like a.ssh
directory:kind: Secret apiVersion: v1 metadata: name: my-ssh-credentials data: id_rsa: # ... base64-encoded private key ... known_hosts: # ... base64-encoded known_hosts file ... config: # ... base64-encoded ssh config file ...
Including
known_hosts
is optional but strongly recommended. Without it thegit-clone
Task will blindly accept the remote server's identity. -
Use Tekton Pipelines' built-in credentials support as documented in Pipelines' auth.md.
The git-init
image that this Task utilizes offers a built in nonroot
user. In combination with support from other Tasks this allows your
Pipelines to run without needing root permissions. There are some extra
steps you'll need to take for this to work:
-
In the security context for the Task make sure you're using UID 65532.
In a TaskRun that looks like this:
kind: TaskRun spec: podTemplate: securityContext: runAsNonRoot: true runAsUser: 65532
And in a PipelineRun it looks like this:
kind: PipelineRun spec: taskRunSpecs: - pipelineTaskName: footask # ...your git-clone PipelineTask name... taskPodTemplate: securityContext: runAsNonRoot: true runAsUser: 65532
-
Make sure to provide the
userHome
param and set it to nonroot's home directory:params: - name: userHome value: /home/nonroot
Once these two modifications are in effect you should now see your
git-clone
Task run as nonroot. The files cloned on to the output
workspace will end up owned by user 65532.
Note: It is strongly advised that you use ssh
credentials when the option
is available to you before using basic auth. You can use generate a short
lived token from WebVCS platforms (Github, Gitlab, Bitbucket etc..) to be use
as password and generally be able to use git
as the username.
On bitbucket server the token may have a / into it so you would need
to urlquote them before in the Secret
, see this stackoverflow answer :
https://stackoverflow.com/a/24719496
To support basic-auth this Task exposes an optional basic-auth
Workspace.
The bound Workspace must contain a .gitconfig
and .git-credentials
file.
Any other files on this Workspace are ignored. A typical Secret
containing
these credentials looks as follows:
kind: Secret
apiVersion: v1
metadata:
name: my-basic-auth-secret
type: Opaque
stringData:
.gitconfig: |
[credential "https://<hostname>"]
helper = store
.git-credentials: |
https://<user>:<pass>@<hostname>