File tree Expand file tree Collapse file tree 6 files changed +12
-12
lines changed
src/shared/Microsoft.AzureRepos Expand file tree Collapse file tree 6 files changed +12
-12
lines changed Original file line number Diff line number Diff line change @@ -239,11 +239,11 @@ See detailed information [here](https://aka.ms/gcm/httpproxy).
239
239
- [ Credential stores] ( docs/credstores.md )
240
240
- [ Architectural overview] ( docs/architecture.md )
241
241
- [ Host provider specification] ( docs/hostprovider.md )
242
+ - [ Azure Repos OAuth tokens] ( docs/azrepos-users-and-tokens.md )
242
243
243
244
## Experimental Features
244
245
245
246
- [ Windows broker (experimental)] ( docs/windows-broker.md )
246
- - [ Azure Repos OAuth tokens (experimental)] ( docs/azrepos-users-and-tokens.md )
247
247
248
248
## Contributing
249
249
Original file line number Diff line number Diff line change 5
5
The Azure Repos host provider supports creating multiple types of credential:
6
6
7
7
- Azure DevOps personal access tokens
8
- - Microsoft identity OAuth tokens (experimental)
8
+ - Microsoft identity OAuth tokens
9
9
10
10
To select which type of credential the Azure Repos host provider will create
11
- and use, you can set the [ ` credential.azreposCredentialType ` ] ( configuration.md#credentialazreposcredentialtype-experimental )
12
- configuration entry (or [ ` GCM_AZREPOS_CREDENTIALTYPE ` ] ( environment.md#GCM_AZREPOS_CREDENTIALTYPE-experimental )
11
+ and use, you can set the [ ` credential.azreposCredentialType ` ] ( configuration.md#credentialazreposcredentialtype )
12
+ configuration entry (or [ ` GCM_AZREPOS_CREDENTIALTYPE ` ] ( environment.md#GCM_AZREPOS_CREDENTIALTYPE )
13
13
environment variable).
14
14
15
15
### Azure DevOps personal access tokens
@@ -24,7 +24,7 @@ PATs have a limited lifetime and new tokens must be created once they expire. In
24
24
Git Credential Manager, when a PAT expired (or was manually revoked) this
25
25
resulted in a new authentication prompt.
26
26
27
- ### Microsoft identity OAuth tokens (experimental)
27
+ ### Microsoft identity OAuth tokens
28
28
29
29
"Microsoft identity OAuth token" is the generic term for OAuth-based access
30
30
tokens issued by Azure Active Directory for either Work and School Accounts
Original file line number Diff line number Diff line change @@ -508,7 +508,7 @@ Credential: "git:https://
[email protected] /example/myrepo" (user = bob)
508
508
509
509
---
510
510
511
- ### credential.azreposCredentialType _ (experimental) _
511
+ ### credential.azreposCredentialType
512
512
513
513
Specify the type of credential the Azure Repos host provider should return.
514
514
@@ -527,4 +527,4 @@ More information about Azure Access tokens can be found [here](azrepos-azuretoke
527
527
git config --global credential.azreposCredentialType oauth
528
528
```
529
529
530
- ** Also see: [ GCM_AZREPOS_CREDENTIALTYPE] ( environment.md#GCM_AZREPOS_CREDENTIALTYPE-experimental ) **
530
+ ** Also see: [ GCM_AZREPOS_CREDENTIALTYPE] ( environment.md#GCM_AZREPOS_CREDENTIALTYPE ) **
Original file line number Diff line number Diff line change @@ -670,7 +670,7 @@ export GCM_MSAUTH_USEBROKER="false"
670
670
671
671
---
672
672
673
- ### GCM_AZREPOS_CREDENTIALTYPE _ (experimental) _
673
+ ### GCM_AZREPOS_CREDENTIALTYPE
674
674
675
675
Specify the type of credential the Azure Repos host provider should return.
676
676
@@ -695,4 +695,4 @@ SET GCM_AZREPOS_CREDENTIALTYPE="oauth"
695
695
export GCM_AZREPOS_CREDENTIALTYPE=" oauth"
696
696
```
697
697
698
- ** Also see: [ credential.azreposCredentialType] ( configuration.md#azreposcredentialtype-experimental ) **
698
+ ** Also see: [ credential.azreposCredentialType] ( configuration.md#azreposcredentialtype ) **
Original file line number Diff line number Diff line change @@ -31,7 +31,7 @@ Set your user-level Git configuration (`~/.gitconfig`) to use GCM. If you pass
31
31
`--system` to these commands, they act on the system-level Git configuration
32
32
(`/etc/gitconfig`) instead.
33
33
34
- ### azure-repos (experimental)
34
+ ### azure-repos
35
35
36
36
Interact with the Azure Repos host provider to bind/unbind user accounts to Azure DevOps
37
37
organizations or specific remote URLs, and manage the authentication authority cache.
Original file line number Diff line number Diff line change @@ -389,7 +389,7 @@ private static string GetAccountNameForCredentialQuery(InputArguments input)
389
389
/// <returns>True if Personal Access Tokens should be used, false otherwise.</returns>
390
390
private bool UsePersonalAccessTokens ( )
391
391
{
392
- // Default to using PATs whilst the Azure AT functionality is being tested
392
+ // Default to using PATs
393
393
const bool defaultValue = true ;
394
394
395
395
if ( _context . Settings . TryGetSetting (
@@ -410,7 +410,7 @@ private bool UsePersonalAccessTokens()
410
410
411
411
default :
412
412
_context . Streams . Error . WriteLine (
413
- $ "warning: unknown Azure Repos credential type '{ valueStr } ' - using default option ") ;
413
+ $ "warning: unknown Azure Repos credential type '{ valueStr } ' - using PATs ") ;
414
414
return defaultValue ;
415
415
}
416
416
}
You can’t perform that action at this time.
0 commit comments