Skip to main content
Version: 3.9.0

Add Git Server

This page describes how to integrate KubeRocketCI with GitLab or GitHub.

Integration Procedure​

To start from, it is required to add both Secret with SSH key, API token, and GitServer resources by taking the steps below.

  1. Generate an SSH key pair and add a public key to GitLab or GitHub account.

    ssh-keygen -t ed25519 -C "email@example.com"
  2. Generate access token for GitLab or GitHub account with read/write access to the API. Both personal and project access tokens are applicable.

    To create access token in GitHub, follow the steps below:

    • Log in to GitHub.
    • Click the profile account and navigate to Settings -> Developer Settings.
    • Select Personal access tokens (classic) and generate a new token with the following parameters:

    Repo permission

    note

    The access below is required for the codebase operator to setup hooks.

    Admin permission Admin permission User permission

    warning

    Make sure to save a new personal access token because it won`t be displayed later.

  3. Create a secret in the namespace where KubeRocketCI is installed (edp by default) for the Git account with the id_rsa, username, and token fields.

    Navigate to Configuration -> Version Control System. Fill in the required fields:

    VCS Integration in KubeRocketCI portal

As a result, you will be able to create codebases using an integrated Version Control System.

Advanced Configuration: Using a Custom Webhook URL​

Custom Webhook URL configuration is effectively utilized in Kubernetes clusters facing specific restrictions on traffic routing or requiring customized webhook event handling. Beyond the conventional Ingress, alternative traffic routing solutions such as Service Mesh (e.g., Istio), NodePort services, or external Load Balancers can be employed to manage traffic into the cluster, offering flexibility in addressing diverse networking policies and security requirements.

warning

When deploying a custom webhook URL, it's important to note that the KubeRocketCI platform does not automatically handle the Ingress and the Tekton EventListener.

User is responsible for the following action:

  • Ingress Traffic Routing: The configuration and management of Ingress for custom webhook URL. This entails ensuring that the custom URL is configured to accept incoming traffic and webhook events from your VCS (e.g., GitHub, GitLab). It's essential that your networking setup, including firewalls and DNS, allows your git hosting service to reach the specified URL endpoint.

  • Tekton EventListener Setup: The creation and configuration of the Tekton EventListener, which processes webhook events directed to the custom URL. This setup involves defining the EventListener to capture and handle events from your VCS, triggering the necessary CI/CD pipelines within KubeRocketCI based on these events.

For more information on setting up a Ingress and Tekton EventListener for custom webhook URL, refer to the Helm Chart.