How to set up SSH keys for Jenkins Blue Ocean using Kubernetes and Helm
I have a CI system set up using the stable Jenkins Helm chart with the BlueOcean plugin.
In my SCM system (BitBucket Server), I have a Jenkins build user created with SSH keys configured.
What I'd like to do is bootstrap the Jenkins install with the SSH key so that when configuring a BlueOcean pipeline, authentication is handled seamlessly. As it is, I have to go in to the repository I want to build and add access for the SSH key generated by BlueOcean. This is obviously not ideal as it adds an additional manual step for each build pipeline to be configured.
The Jenkins Helm chart documentation specifies an Agent.volumes
value in values.yaml
that can be used to mount, for instance, a Kubernetes secret containing the SSH keys. However, this is agent configuration, so presumably would allow for SCM authentication from a build agent (e.g., from a Jenkinsfile). What I want to do is bootstrap the keys into Jenkins master.
I see that there is a Master.CredentialsXmlSecret
which allows for a Kubernetes secret containing a Credentials XML file, but the documentation on this is sparse (or non-existent).
Has anyone set up Jenkins on Kubernetes/Helm with this kind of SSH configuration?
*Edit: So I have managed to produce a correct credentials.xml
file by logging in to Jenkins and manually setting up the SSH keys, then copying the produced credentials.xml
file, running it through base64
encoding, adding it as a Kubernetes secret and then binding it to Master.CredentialsXmlSecret
in the Jenkins Helm chart's values.yaml
. After doing that, my Jenkins instance loads up with the credentials.xml
file in place (/var/jenkins_home/credentials.xml
). The Credentials don't appear to be loading into the Jenkins UI correctly but I think I'm on the right track.
git jenkins kubernetes kubernetes-helm jenkins-blueocean
add a comment |
I have a CI system set up using the stable Jenkins Helm chart with the BlueOcean plugin.
In my SCM system (BitBucket Server), I have a Jenkins build user created with SSH keys configured.
What I'd like to do is bootstrap the Jenkins install with the SSH key so that when configuring a BlueOcean pipeline, authentication is handled seamlessly. As it is, I have to go in to the repository I want to build and add access for the SSH key generated by BlueOcean. This is obviously not ideal as it adds an additional manual step for each build pipeline to be configured.
The Jenkins Helm chart documentation specifies an Agent.volumes
value in values.yaml
that can be used to mount, for instance, a Kubernetes secret containing the SSH keys. However, this is agent configuration, so presumably would allow for SCM authentication from a build agent (e.g., from a Jenkinsfile). What I want to do is bootstrap the keys into Jenkins master.
I see that there is a Master.CredentialsXmlSecret
which allows for a Kubernetes secret containing a Credentials XML file, but the documentation on this is sparse (or non-existent).
Has anyone set up Jenkins on Kubernetes/Helm with this kind of SSH configuration?
*Edit: So I have managed to produce a correct credentials.xml
file by logging in to Jenkins and manually setting up the SSH keys, then copying the produced credentials.xml
file, running it through base64
encoding, adding it as a Kubernetes secret and then binding it to Master.CredentialsXmlSecret
in the Jenkins Helm chart's values.yaml
. After doing that, my Jenkins instance loads up with the credentials.xml
file in place (/var/jenkins_home/credentials.xml
). The Credentials don't appear to be loading into the Jenkins UI correctly but I think I'm on the right track.
git jenkins kubernetes kubernetes-helm jenkins-blueocean
The path I'm going down (still in progress) is starting up the Jenkins instance, manually configuring SSH credentials in the UI, then copying the/var/jenkins_home/credentials.xml
file, running it throughbase64
encoding, storing it as a Kubernetes secret, and then mounting that secret to theMaster.CredentialsXmlSecret
property invalues.yaml
.
– LiquidPony
Nov 15 '18 at 16:37
add a comment |
I have a CI system set up using the stable Jenkins Helm chart with the BlueOcean plugin.
In my SCM system (BitBucket Server), I have a Jenkins build user created with SSH keys configured.
What I'd like to do is bootstrap the Jenkins install with the SSH key so that when configuring a BlueOcean pipeline, authentication is handled seamlessly. As it is, I have to go in to the repository I want to build and add access for the SSH key generated by BlueOcean. This is obviously not ideal as it adds an additional manual step for each build pipeline to be configured.
The Jenkins Helm chart documentation specifies an Agent.volumes
value in values.yaml
that can be used to mount, for instance, a Kubernetes secret containing the SSH keys. However, this is agent configuration, so presumably would allow for SCM authentication from a build agent (e.g., from a Jenkinsfile). What I want to do is bootstrap the keys into Jenkins master.
I see that there is a Master.CredentialsXmlSecret
which allows for a Kubernetes secret containing a Credentials XML file, but the documentation on this is sparse (or non-existent).
Has anyone set up Jenkins on Kubernetes/Helm with this kind of SSH configuration?
*Edit: So I have managed to produce a correct credentials.xml
file by logging in to Jenkins and manually setting up the SSH keys, then copying the produced credentials.xml
file, running it through base64
encoding, adding it as a Kubernetes secret and then binding it to Master.CredentialsXmlSecret
in the Jenkins Helm chart's values.yaml
. After doing that, my Jenkins instance loads up with the credentials.xml
file in place (/var/jenkins_home/credentials.xml
). The Credentials don't appear to be loading into the Jenkins UI correctly but I think I'm on the right track.
git jenkins kubernetes kubernetes-helm jenkins-blueocean
I have a CI system set up using the stable Jenkins Helm chart with the BlueOcean plugin.
In my SCM system (BitBucket Server), I have a Jenkins build user created with SSH keys configured.
What I'd like to do is bootstrap the Jenkins install with the SSH key so that when configuring a BlueOcean pipeline, authentication is handled seamlessly. As it is, I have to go in to the repository I want to build and add access for the SSH key generated by BlueOcean. This is obviously not ideal as it adds an additional manual step for each build pipeline to be configured.
The Jenkins Helm chart documentation specifies an Agent.volumes
value in values.yaml
that can be used to mount, for instance, a Kubernetes secret containing the SSH keys. However, this is agent configuration, so presumably would allow for SCM authentication from a build agent (e.g., from a Jenkinsfile). What I want to do is bootstrap the keys into Jenkins master.
I see that there is a Master.CredentialsXmlSecret
which allows for a Kubernetes secret containing a Credentials XML file, but the documentation on this is sparse (or non-existent).
Has anyone set up Jenkins on Kubernetes/Helm with this kind of SSH configuration?
*Edit: So I have managed to produce a correct credentials.xml
file by logging in to Jenkins and manually setting up the SSH keys, then copying the produced credentials.xml
file, running it through base64
encoding, adding it as a Kubernetes secret and then binding it to Master.CredentialsXmlSecret
in the Jenkins Helm chart's values.yaml
. After doing that, my Jenkins instance loads up with the credentials.xml
file in place (/var/jenkins_home/credentials.xml
). The Credentials don't appear to be loading into the Jenkins UI correctly but I think I'm on the right track.
git jenkins kubernetes kubernetes-helm jenkins-blueocean
git jenkins kubernetes kubernetes-helm jenkins-blueocean
edited Nov 15 '18 at 16:40
LiquidPony
asked Nov 13 '18 at 20:00
LiquidPonyLiquidPony
1,702915
1,702915
The path I'm going down (still in progress) is starting up the Jenkins instance, manually configuring SSH credentials in the UI, then copying the/var/jenkins_home/credentials.xml
file, running it throughbase64
encoding, storing it as a Kubernetes secret, and then mounting that secret to theMaster.CredentialsXmlSecret
property invalues.yaml
.
– LiquidPony
Nov 15 '18 at 16:37
add a comment |
The path I'm going down (still in progress) is starting up the Jenkins instance, manually configuring SSH credentials in the UI, then copying the/var/jenkins_home/credentials.xml
file, running it throughbase64
encoding, storing it as a Kubernetes secret, and then mounting that secret to theMaster.CredentialsXmlSecret
property invalues.yaml
.
– LiquidPony
Nov 15 '18 at 16:37
The path I'm going down (still in progress) is starting up the Jenkins instance, manually configuring SSH credentials in the UI, then copying the
/var/jenkins_home/credentials.xml
file, running it through base64
encoding, storing it as a Kubernetes secret, and then mounting that secret to the Master.CredentialsXmlSecret
property in values.yaml
.– LiquidPony
Nov 15 '18 at 16:37
The path I'm going down (still in progress) is starting up the Jenkins instance, manually configuring SSH credentials in the UI, then copying the
/var/jenkins_home/credentials.xml
file, running it through base64
encoding, storing it as a Kubernetes secret, and then mounting that secret to the Master.CredentialsXmlSecret
property in values.yaml
.– LiquidPony
Nov 15 '18 at 16:37
add a comment |
1 Answer
1
active
oldest
votes
You can probably set it up with an API call to bitbucket to set up the SSH key. Something like this with API 1.0
$ curl --user <USER>:<PASSWORD> -X POST
https://bitbucket.org/api/1.0/users/<USER>/ssh-keys
--data-urlencode "key=<PUBLIC_KEY>"
--data-urlencode "label=<LABEL>"
Documented here, or API 2.0:
$ curl -X POST -H "Content-Type: application/json"
-d '{"key": "ssh-ed25519 ...."}'
https://api.bitbucket.org/2.0/users/<USER</ssh-keys
Documented here
Not sure what type of permissions you are looking for but you may want a repo SSH key pair for Jenkins Blue Ocean pipelines.
In either case, you will have to build your custom docker image with an entrypoint script that picks up the ssh key generated and posts it wherever you want to post it.
add a comment |
Your Answer
StackExchange.ifUsing("editor", function () {
StackExchange.using("externalEditor", function () {
StackExchange.using("snippets", function () {
StackExchange.snippets.init();
});
});
}, "code-snippets");
StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "1"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});
function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});
}
});
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53288619%2fhow-to-set-up-ssh-keys-for-jenkins-blue-ocean-using-kubernetes-and-helm%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
1 Answer
1
active
oldest
votes
1 Answer
1
active
oldest
votes
active
oldest
votes
active
oldest
votes
You can probably set it up with an API call to bitbucket to set up the SSH key. Something like this with API 1.0
$ curl --user <USER>:<PASSWORD> -X POST
https://bitbucket.org/api/1.0/users/<USER>/ssh-keys
--data-urlencode "key=<PUBLIC_KEY>"
--data-urlencode "label=<LABEL>"
Documented here, or API 2.0:
$ curl -X POST -H "Content-Type: application/json"
-d '{"key": "ssh-ed25519 ...."}'
https://api.bitbucket.org/2.0/users/<USER</ssh-keys
Documented here
Not sure what type of permissions you are looking for but you may want a repo SSH key pair for Jenkins Blue Ocean pipelines.
In either case, you will have to build your custom docker image with an entrypoint script that picks up the ssh key generated and posts it wherever you want to post it.
add a comment |
You can probably set it up with an API call to bitbucket to set up the SSH key. Something like this with API 1.0
$ curl --user <USER>:<PASSWORD> -X POST
https://bitbucket.org/api/1.0/users/<USER>/ssh-keys
--data-urlencode "key=<PUBLIC_KEY>"
--data-urlencode "label=<LABEL>"
Documented here, or API 2.0:
$ curl -X POST -H "Content-Type: application/json"
-d '{"key": "ssh-ed25519 ...."}'
https://api.bitbucket.org/2.0/users/<USER</ssh-keys
Documented here
Not sure what type of permissions you are looking for but you may want a repo SSH key pair for Jenkins Blue Ocean pipelines.
In either case, you will have to build your custom docker image with an entrypoint script that picks up the ssh key generated and posts it wherever you want to post it.
add a comment |
You can probably set it up with an API call to bitbucket to set up the SSH key. Something like this with API 1.0
$ curl --user <USER>:<PASSWORD> -X POST
https://bitbucket.org/api/1.0/users/<USER>/ssh-keys
--data-urlencode "key=<PUBLIC_KEY>"
--data-urlencode "label=<LABEL>"
Documented here, or API 2.0:
$ curl -X POST -H "Content-Type: application/json"
-d '{"key": "ssh-ed25519 ...."}'
https://api.bitbucket.org/2.0/users/<USER</ssh-keys
Documented here
Not sure what type of permissions you are looking for but you may want a repo SSH key pair for Jenkins Blue Ocean pipelines.
In either case, you will have to build your custom docker image with an entrypoint script that picks up the ssh key generated and posts it wherever you want to post it.
You can probably set it up with an API call to bitbucket to set up the SSH key. Something like this with API 1.0
$ curl --user <USER>:<PASSWORD> -X POST
https://bitbucket.org/api/1.0/users/<USER>/ssh-keys
--data-urlencode "key=<PUBLIC_KEY>"
--data-urlencode "label=<LABEL>"
Documented here, or API 2.0:
$ curl -X POST -H "Content-Type: application/json"
-d '{"key": "ssh-ed25519 ...."}'
https://api.bitbucket.org/2.0/users/<USER</ssh-keys
Documented here
Not sure what type of permissions you are looking for but you may want a repo SSH key pair for Jenkins Blue Ocean pipelines.
In either case, you will have to build your custom docker image with an entrypoint script that picks up the ssh key generated and posts it wherever you want to post it.
answered Nov 13 '18 at 23:08
RicoRico
27.8k94966
27.8k94966
add a comment |
add a comment |
Thanks for contributing an answer to Stack Overflow!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53288619%2fhow-to-set-up-ssh-keys-for-jenkins-blue-ocean-using-kubernetes-and-helm%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
The path I'm going down (still in progress) is starting up the Jenkins instance, manually configuring SSH credentials in the UI, then copying the
/var/jenkins_home/credentials.xml
file, running it throughbase64
encoding, storing it as a Kubernetes secret, and then mounting that secret to theMaster.CredentialsXmlSecret
property invalues.yaml
.– LiquidPony
Nov 15 '18 at 16:37