You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+73-12Lines changed: 73 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -121,7 +121,13 @@ you can find examples of correct environments [below](#environment).
121
121
122
122
Please note that it is now recommended to declare the _same_`format_version` in each `*.gopipeline.json` or `*.goenvironment.json` file.
123
123
124
-
#### GoCD server version from 19.3.0 and beyond
124
+
#### GoCD server version from 19.4.0 and beyond
125
+
126
+
Supports `format_version` value of `5`. In this version, support of `username` and `encrypted_password` for [git](#git-material-update) and [hg](#hg-material-update) material has been added. In addition to that, [hg](#hg-material-update) will also support `branch` attribute.
127
+
128
+
Using a newer `format_version` includes all the behavior of the previous versions too.
129
+
130
+
#### GoCD server version from 19.3.0 to 19.4.0
125
131
126
132
Supports `format_version` value of `4`. In this version, support has been added to control the [display order of pipelines](#display-order-of-pipelines).
127
133
@@ -529,17 +535,42 @@ All scm materials can have filter object:
529
535
"auto_update": false,
530
536
"name": "gitMaterial1",
531
537
"type": "git",
532
-
"shallow_clone": true
538
+
"shallow_clone": true,
539
+
"username": "user1",
540
+
"encrypted_password": "encrypted_value"
541
+
}
542
+
```
543
+
<aname="git-material-update"/>
544
+
545
+
For **GoCD >= 19.4.0 and `format_version: 5` and above**:
546
+
547
+
You are advised to utilize `username` and `encrypted_password` for passing in material credentials as:
548
+
549
+
```json
550
+
{
551
+
"url": "http://my.git.repository.com",
552
+
"branch": "feature12",
553
+
"username": "user1",
554
+
"encrypted_password": "encrypted_value"
533
555
}
534
556
```
535
557
558
+
- Instead of `encrypted_password` you may specify `password` but `encrypted_password` makes more sense considering that the value is stored in SCM.
559
+
- Specifying credentials both in `attributes` and `url` will result in a validation error e.g.
560
+
```log
561
+
INVALID MERGED CONFIGURATION
562
+
Number of errors: 1+
563
+
1. Ambiguous credentials, must be provided either in URL or as attributes.;;
564
+
- For Config Repo: https://your.config.repo.url at cbb047d78c239ab23b9565099e800c6fe4cc0anc
565
+
```
566
+
536
567
## Svn
537
568
538
569
```json
539
570
{
540
571
"url": "http://svn",
541
572
"username": "user1",
542
-
"password": "pass1",
573
+
"encrypted_password": "encrypted_value",
543
574
"check_externals": true,
544
575
"filter": {
545
576
"ignore": [
@@ -554,8 +585,7 @@ All scm materials can have filter object:
554
585
}
555
586
```
556
587
557
-
Instead of plain `password` you may specify `encrypted_password` with encrypted content
558
-
which usually makes more sense considering that value is stored in SCM.
588
+
Instead of `encrypted_password` you may specify `password` but `encrypted_password` makes more sense considering that the value is stored in SCM.
559
589
560
590
## Hg
561
591
@@ -571,7 +601,40 @@ which usually makes more sense considering that value is stored in SCM.
571
601
"destination": "dir1",
572
602
"auto_update": false,
573
603
"name": "hgMaterial1",
574
-
"type": "hg"
604
+
"type": "hg",
605
+
"username": "user1",
606
+
"encrypted_password": "encrypted_value",
607
+
"branch": "feature"
608
+
}
609
+
```
610
+
<aname="hg-material-update"/>
611
+
612
+
For **GoCD >= 19.4.0 and `format_version: 5` and above**:
613
+
614
+
You are advised to utilize `username` and `encrypted_password` for passing in material credentials as:
615
+
616
+
```json
617
+
{
618
+
"url": "repos/myhg",
619
+
"username": "user1",
620
+
"encrypted_password": "encrypted_value"
621
+
}
622
+
```
623
+
624
+
- Instead of `encrypted_password` you may specify `password` but `encrypted_password` makes more sense considering that the value is stored in SCM.
625
+
- Specifying credentials both in `attributes` and `url` will result in a validation error e.g.
626
+
```log
627
+
INVALID MERGED CONFIGURATION
628
+
Number of errors: 1+
629
+
1. Ambiguous credentials, must be provided either in URL or as attributes.;;
630
+
- For Config Repo: https://your.config.repo.url at cbb047d78c239ab23b9565099e800c6fe4cc0anc
631
+
```
632
+
633
+
In addition to that, you can also leverage `branch` attribute to specify the branch for material
634
+
635
+
```json
636
+
{
637
+
"branch": "feature"
575
638
}
576
639
```
577
640
@@ -581,7 +644,7 @@ which usually makes more sense considering that value is stored in SCM.
581
644
{
582
645
"port": "10.18.3.102:1666",
583
646
"username": "user1",
584
-
"password": "pass1",
647
+
"encrypted_password": "encrypted_value",
585
648
"use_tickets": false,
586
649
"view": "//depot/dev/src... //anything/src/...",
587
650
"filter": {
@@ -597,8 +660,7 @@ which usually makes more sense considering that value is stored in SCM.
597
660
}
598
661
```
599
662
600
-
Instead of plain `password` you may specify `encrypted_password` with encrypted content
601
-
which usually makes more sense considering that value is stored in SCM.
663
+
Instead of `encrypted_password` you may specify `password` but `encrypted_password` makes more sense considering that the value is stored in SCM.
602
664
603
665
## Tfs
604
666
@@ -607,7 +669,7 @@ which usually makes more sense considering that value is stored in SCM.
607
669
"url": "url3",
608
670
"username": "user4",
609
671
"domain": "example.com",
610
-
"password": "pass",
672
+
"encrypted_password": "encrypted_value",
611
673
"project": "projectDir",
612
674
"filter": {
613
675
"ignore": [
@@ -622,8 +684,7 @@ which usually makes more sense considering that value is stored in SCM.
622
684
}
623
685
```
624
686
625
-
Instead of plain `password` you may specify `encrypted_password` with encrypted content
626
-
which usually makes more sense considering that value is stored in SCM.
687
+
Instead of `encrypted_password` you may specify `password` but `encrypted_password` makes more sense considering that the value is stored in SCM.
0 commit comments