Skip to main content
Version: Next

Using Private Git Repositories

OpenChoreo supports building components from private Git repositories using basic authentication or SSH authentication. Credentials are securely managed through external secret stores and are never stored in OpenChoreo's control plane.

Prerequisites​

Before configuring private repository access, ensure you have:

  • External Secret Store: A configured secret store (e.g., Vault, AWS Secrets Manager, OpenBao)
  • ClusterSecretStore: A ClusterSecretStore resource in the build plane that connects to your secret store
  • Git Credentials: One of the following:
    • For Basic Auth: Personal access token (PAT) or username/password with repository read access
    • For SSH Auth: SSH private key registered with your Git provider

Authentication Methods​

MethodUse Case
Basic AuthHTTPS Git URLs (e.g., https://github.com/org/repo.git)
SSH AuthSSH Git URLs (e.g., git@github.com:org/repo.git)

From UI​

The easiest way to configure private repository access is through the OpenChoreo UI. You can create secrets either during component creation or pre-create them for reuse.

During Component Creation​

  1. When creating a component that uses a private repository, select Create New Git Secret from the secret reference dropdown:
Secret Reference Field in the Parameters Section
  1. Enter your Git credentials (username/token or SSH key) and click Create.
Create a Git Secret
  1. The newly created secret will be automatically selected. Use it for component creation.

Secret Management Page​

You can also pre-create secrets in the Secret Management page for reuse across multiple components.

  1. Navigate to the Secret Management page and create a new Git secret:
Git Secret Management Section
  1. When creating a component, select the secret from the dropdown in the secret reference field.

From YAML​

For manual configuration, create a SecretReference custom resource that points to credentials in your external secret store.

apiVersion: openchoreo.dev/v1alpha1
kind: SecretReference
metadata:
name: github-credentials
namespace: default
spec:
template:
type: kubernetes.io/basic-auth
data:
- secretKey: username
remoteRef:
key: secret/git/github-token
property: username
- secretKey: password
remoteRef:
key: secret/git/github-token
property: token
refreshInterval: 1h

Reference the secret in your component's workflow configuration:

apiVersion: openchoreo.dev/v1alpha1
kind: Component
metadata:
name: my-service
spec:
owner:
projectName: my-project
componentType:
kind: ComponentType
name: deployment/service
workflow:
name: docker
parameters:
repository:
url: https://github.com/myorg/private-repo.git
secretRef: github-credentials
revision:
branch: main
appPath: /
docker:
context: .
filePath: ./Dockerfile

How It Works​

Private Repository Authentication Flow

When a workflow run is triggered:

  1. Control Plane: WorkflowRun references the Workflow, which has an externalRef pointing to the SecretReference
  2. Build Plane: ExternalSecret is created, syncing credentials from your secret store via ClusterSecretStore
  3. Workflow Execution: Argo Workflow uses the synced secret for Git authentication
  4. Cleanup: Secrets are automatically removed when the workflow run is deleted

Additional Resources​