Skip to content

Commit 672c1df

Browse files
author
edge-katanomi-app2[bot]
committed
📚 Sync docs from alaudadevops/connectors-operator on 0b818cebe6bfd989edaf3ead7b883cd138bc666b
Source: add docs about connector secret (#268) Author: chengjingtao Ref: refs/heads/main Commit: 0b818cebe6bfd989edaf3ead7b883cd138bc666b This commit automatically syncs documentation changes from the source-docs repository. 🔗 View source commit: https://github.com/alaudadevops/connectors-operator/commit/0b818cebe6bfd989edaf3ead7b883cd138bc666b 🤖 Synced on 2025-10-23 05:52:38 UTC
1 parent ca83221 commit 672c1df

File tree

13 files changed

+177
-17
lines changed

13 files changed

+177
-17
lines changed

‎.github/SYNC_INFO.md‎

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
# Documentation Sync Information
22

3-
- **Last synced**: 2025-10-20 06:36:10 UTC
3+
- **Last synced**: 2025-10-23 05:52:38 UTC
44
- **Source repository**: alaudadevops/connectors-operator
5-
- **Source commit**: [feac31821b436633665111c9e50e399e5c46e77a](https://github.com/alaudadevops/connectors-operator/commit/feac31821b436633665111c9e50e399e5c46e77a)
5+
- **Source commit**: [0b818cebe6bfd989edaf3ead7b883cd138bc666b](https://github.com/alaudadevops/connectors-operator/commit/0b818cebe6bfd989edaf3ead7b883cd138bc666b)
66
- **Triggered by**: edge-katanomi-app2[bot]
7-
- **Workflow run**: [#42](https://github.com/alaudadevops/connectors-operator/actions/runs/18644280828)
7+
- **Workflow run**: [#43](https://github.com/alaudadevops/connectors-operator/actions/runs/18738918779)
88

99
## Files synced:
1010
- docs/

‎docs/en/connectors-git/concepts/git_connectorclass.mdx‎

Lines changed: 18 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -69,9 +69,11 @@ metadata:
6969

7070
### Authentication
7171

72-
The Git connectorclass supports the following authentication types:
72+
The Git connector supports the following authentication types:
7373

74-
- `basicAuth`: Username and password-based authentication (optional), corresponding credential type: `kubernetes.io/basic-auth`
74+
- `basicAuth`: Username and password-based authentication (optional), corresponding secret type: `kubernetes.io/basic-auth`
75+
76+
#### Using Basic Authentication
7577

7678
For example:
7779

@@ -102,7 +104,9 @@ metadata:
102104
type: kubernetes.io/basic-auth
103105
```
104106

105-
If the Git server does not require authentication, you can omit the authentication information.
107+
**Note**: The `password` field is not restricted to actual user passwords. You can use other types of credentials such as Personal Access Tokens (PAT) or API keys, as long as they meet the permission requirements outlined in the [Secret Permissions Required](#secret_permissions_required) section.
108+
109+
If the Git server does not require authentication, you can omit the `secretRef` field:
106110

107111
```yaml
108112
apiVersion: connectors.alauda.io/v1alpha1
@@ -116,7 +120,17 @@ spec:
116120
name: basicAuth
117121
```
118122

119-
### Authentication Parameters
123+
#### Credential Permissions Required
124+
125+
The required permissions for the configured credential depend on how you intend to use it in your Pods/Pipelines. Additionally, the credential must have clone permissions for the authentication repository specified in the [Authentication Parameters](#authentication_parameters) section.
126+
127+
For example:
128+
- If you need to perform both clone and push operations in pipelines using this connector, the credential must have both clone and push permissions for the target repository. In other words, the credential should allow you to both clone from and push to the repository.
129+
- If you only need to clone repositories in pipelines, the credential only requires clone permissions for the target repository.
130+
131+
For security best practices, we recommend creating credential with minimal required permissions. When privileges are needed, create separate Connectors with more privileged secret and use namespace isolation to control which users can access each Connector.
132+
133+
### Authentication Parameters \{#authentication_parameters}
120134

121135
To check whether the credentials are valid, you need to specify a Git repository path. The connector will use the credentials to access that repository at runtime to determine the validity of the credentials.
122136

‎docs/en/connectors-git/concepts/index.mdx‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
weight: 30
2+
weight: 40
33
i18n:
44
title:
55
en: Concepts

‎docs/en/connectors-git/functions/index.mdx‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
weight: 30
2+
weight: 50
33
i18n:
44
title:
55
en: Functions
File renamed without changes.

‎docs/en/connectors-git/quick_start.mdx‎

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
---
2-
weight: 40
3-
sourceSHA: 01ab94c9b10d116d533d7a17d0b31a1e30e19ba399fc844cbc8f96f1aa8a5457
2+
weight: 30
43
---
54

65
# Quick Start

‎docs/en/connectors-k8s/concepts/k8s_connectorclass.mdx‎

Lines changed: 23 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -66,12 +66,14 @@ It also supports url with path, for example: `https://192.168.1.100:6443/kuberne
6666

6767
**spec.auth**:
6868

69-
specifies the authentication method of the kubernetes cluster
69+
specifies the authentication method of the kubernetes cluster.
7070

7171
- `spec.auth.name`: should be `bearerTokenAuth` for kubernetes connector.
7272

7373
- `spec.auth.secretRef`: specifies the secret that contains the authentication information of the kubernetes cluster, the secret should be created in the same namespace as the connector.
7474

75+
For more information about authentication, see [Authentication](#authentication).
76+
7577
**Optional Metadata fields**:
7678

7779
- `cpaas.io/description`: Description information for the kubernetes connector, for example:
@@ -87,13 +89,13 @@ specifies the authentication method of the kubernetes cluster
8789

8890
## Capabilities of Kubernetes Connector
8991

90-
### Authentication
92+
### Authentication \{#authentication}
9193

9294
The Kubernetes connector supports the following authentication types:
9395

9496
- `bearerTokenAuth`: Bearer token-based authentication, corresponding secret type: `connectors.cpaas.io/bearer-token`
9597

96-
For example:
98+
#### Using Bearer Token-based Authentication
9799

98100
```yaml
99101
apiVersion: v1
@@ -123,6 +125,24 @@ status:
123125

124126
For comprehensive status information, see [Connector Status Documentation](../../connectors/concepts/connector.mdx#status-information).
125127

128+
#### Token Permissions Required \{#token_permissions_required}
129+
130+
The required permissions for the configured token depend on how you intend to use it in your Pods/Pipelines.
131+
132+
For example:
133+
- If you need to create workloads (Deployments, Jobs, etc.) using this connector, the token must have `create` permissions for the corresponding resources in the target cluster.
134+
- If you only need to read cluster information, the token only requires `get` and `list` permissions for the relevant resources.
135+
136+
For security best practices, we recommend creating tokens with minimal required permissions. When additional privileges are needed, create separate Connectors with more privileged tokens and use namespace isolation to control which users can access each Connector.
137+
138+
#### Token Generation \{#token-generation}
139+
140+
Bearer tokens are typically generated from ServiceAccounts in the target Kubernetes cluster. You can create a ServiceAccount with appropriate RBAC permissions and use its token. For detailed information about ServiceAccount tokens and RBAC configuration, see the [Kubernetes Authentication documentation](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#service-account-tokens).
141+
142+
:::info
143+
If you are using an API endpoint provided by the <ExternalSiteLink name="acp" href="/" children="Alauda Container Platform" /> to access your cluster (e.g., https://platform.example.com/kubernetes/global), you must configure an ACP platform token instead of a token generated directly from the Kubernetes cluster. For information about platform tokens, see the <ExternalSiteLink name="acp" href="/apis/overview/intro.html" children="Alauda Container Platform API" /> documentation.
144+
:::
145+
126146
### Proxy and Kubeconfig Configuration
127147

128148
To provide clients with the ability to access kubernetes resources without credentials, the Kubernetes connector provides a proxy server to automatically inject authentication information.

‎docs/en/connectors-maven/concepts/maven_connectorclass.mdx‎

Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -97,6 +97,8 @@ The Maven connector supports the following authentication types:
9797

9898
- `basicAuth`: Username and password-based authentication, corresponding secret type: `kubernetes.io/basic-auth`
9999

100+
#### Using Basic Authentication
101+
100102
For example:
101103

102104
```yaml
@@ -110,8 +112,48 @@ metadata:
110112
type: kubernetes.io/basic-auth
111113
```
112114

115+
If the secret is not correct, the `status.conditions` field in the maven connector will show the error message.
116+
117+
```yaml
118+
apiVersion: connectors.alauda.io/v1alpha1
119+
kind: Connector
120+
metadata:
121+
name: maven-connector
122+
spec: {}
123+
status:
124+
conditions:
125+
- type: Ready
126+
status: False
127+
reason: "xxxxx"
128+
message: "xxxx"
129+
```
130+
113131
For comprehensive status information, see [Connector Status Documentation](../../connectors/concepts/connector.mdx#status-information).
114132

133+
If the Maven registry does not require authentication, you can omit the `secretRef` field:
134+
135+
```yaml
136+
apiVersion: connectors.alauda.io/v1alpha1
137+
kind: Connector
138+
metadata:
139+
name: maven-connector
140+
spec:
141+
connectorClassName: maven
142+
address: https://repo.maven.apache.org/maven2
143+
auth:
144+
name: basicAuth
145+
```
146+
147+
#### Credential Permissions Required \{#credential_permissions_required}
148+
149+
The required permissions for the configured credential depend on how you intend to use it in your Pods/Pipelines.
150+
151+
For example:
152+
- **Package operations**: If you only need to download dependencies using `mvn package` or `mvn install`, the credential only require read permissions for the target Maven repository.
153+
- **Package and Deploy operations**: If you need to publish artifacts using `mvn deploy`, the credentials must have both read and write permissions for the target repository.
154+
155+
For security best practices, we recommend creating credentials with minimal required permissions. When additional privileges are needed, create separate Connectors with more privileged secret and use namespace isolation to control which users can access each Connector.
156+
115157
### Proxy and settings.xml Configuration
116158

117159
To provide clients with the ability to access maven registry without credentials, the Maven connector provides a proxy server to automatically inject authentication information.
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
---
2+
weight: 40
3+
i18n:
4+
title:
5+
en: Concepts
6+
title: Concepts
7+
---
8+
9+
# Concepts
10+
11+
<Overview />

‎docs/en/connectors-oci/concepts/oci_connectorclass.mdx‎

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,11 +67,13 @@ The `spec.address` specifies the access address of the OCI Registry, for example
6767

6868
### Authentication
6969

70-
Supported authentication types for the OCI Connector:
70+
The OCI Connector supports the following authentication types:
7171

7272
- `tokenAuth`: Token-based authentication (optional)
7373
- Corresponding credential type: `cpaas.io/distribution-registry-token`, this type of credential is used for the authentication process defined in the [CNCF Distribution Token Authentication Specification](https://distribution.github.io/distribution/spec/auth/token/), and the credential must provide `username` and `password` information.
7474

75+
#### Using Token-based Authentication
76+
7577
For example:
7678

7779
```yaml
@@ -112,6 +114,16 @@ spec:
112114
name: tokenAuth
113115
```
114116

117+
#### Token Permissions Required \{#token_permissions_required}
118+
119+
The required permissions for the configured token depend on how you intend to use it in your Pods/Pipelines.
120+
121+
For example:
122+
- **Image pull operations**: If you only need to pull images using this connector, the token only require read permissions for the target repositories.
123+
- **Image pull and push operations**: If you need to push images using this connector, the token must have both read and write permissions for the target repositories. In other words, the token should allow you to both pull from and push to the registry.
124+
125+
For security best practices, we recommend creating token with minimal required permissions. When additional privileges are needed, create separate Connectors with more privileged secret and use namespace isolation to control which users can access each Connector.
126+
115127
## Proxy and Configuration
116128

117129
To provide clients with the ability to access OCI repositories without credentials, the OCI Connector type offers a proxy server to automatically inject authentication information.

0 commit comments

Comments
 (0)