Skip to content

Commit

Permalink
Add docs for bitbucket commit status
Browse files Browse the repository at this point in the history
Signed-off-by: Somtochi Onyekwere <[email protected]>
Signed-off-by: Alan Hollis <[email protected]>
  • Loading branch information
somtochiama authored and Alan01252 committed Oct 6, 2021
1 parent 8ff5f75 commit fadafc2
Show file tree
Hide file tree
Showing 2 changed files with 12 additions and 0 deletions.
8 changes: 8 additions & 0 deletions docs/spec/v1beta1/provider.md
Original file line number Diff line number Diff line change
Expand Up @@ -274,6 +274,14 @@ spec:

The provider type can be: `github`, `gitlab`, `bitbucket` or `azuredevops`.

For bitbucket, the token should contain the username and [app password](https://support.atlassian.com/bitbucket-cloud/docs/app-passwords/#Create-an-app-password)
in the format `<username>:<password>`. The app password should have `Repositories (Read/Write)` permission.

You can create the secret using this command:
```shell
kubectl create secret generic api-token --from-literal=token=<username>:<app-password>
```

#### Authentication

GitHub. GitLab, and Azure DevOps use personal access tokens to authenticate with their API:
Expand Down
4 changes: 4 additions & 0 deletions docs/spec/v1beta1/receiver.md
Original file line number Diff line number Diff line change
Expand Up @@ -249,6 +249,10 @@ spec:
Note that you have to set the generated token as the Bitbucket server webhook secret value.
The controller uses the `X-Hub-Signature` HTTP header to verify that the request is legitimate.

Also note, the *Bitbucket cloud* service does not yet provide any support for signing webhook requests.
([1](https://jira.atlassian.com/browse/BCLOUD-14683), [2](https://jira.atlassian.com/browse/BCLOUD-12195)).
If your repositories are on Bitbucket cloud, you will need to use the Generic receiver instead.

### Harbor receiver

```yaml
Expand Down

0 comments on commit fadafc2

Please sign in to comment.