You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
See [this](../admin/integrations/jfrog-artifactory.md) guide on instructions on
172
-
how to set up for JFrog Artifactory.
171
+
Visit the [JFrog Artifactory](../admin/integrations/jfrog-artifactory.md) guide for instructions on how to set up for JFrog Artifactory.
173
172
174
173
## Custom scopes
175
174
@@ -190,6 +189,16 @@ Multiple providers is an Enterprise and Premium feature.
190
189
191
190
Below is an example configuration with multiple providers:
192
191
192
+
<blockquoteclass="admonition warning">
193
+
194
+
**Note:** To support regex matching for paths like `github\.com/org`, add the following `git config` line to the [Coder agent startup script](https://registry.terraform.io/providers/coder/coder/latest/docs/resources/agent#startup_script):
1.Create a conditional access policy for your configured identity provider.
111
+
Create a conditional access policy for your configured identity provider.
118
112
119
-
> Note: the configured IdP must be the same for both Coder and Island
113
+
Note that the configured IdP must be the same for both Coder and Island.
120
114
121
115
-[Azure Active Directory/Entra ID](https://documentation.island.io/docs/configure-browser-enforcement-for-island-with-azure-ad#create-and-apply-a-conditional-access-policy)
Copy file name to clipboardExpand all lines: docs/admin/integrations/jfrog-artifactory.md
+23-44
Original file line number
Diff line number
Diff line change
@@ -36,14 +36,11 @@ two type of modules that automate the JFrog Artifactory and Coder integration.
36
36
### JFrog-OAuth
37
37
38
38
This module is usable by JFrog self-hosted (on-premises) Artifactory as it
39
-
requires configuring a custom integration. This integration benefits from
40
-
Coder's [external-auth](../../admin/external-auth.md) feature and allows each
41
-
user to authenticate with Artifactory using an OAuth flow and issues user-scoped
42
-
tokens to each user.
39
+
requires configuring a custom integration. This integration benefits from Coder's [external-auth](../../admin/external-auth.md) feature allows each user to authenticate with Artifactory using an OAuth flow and issues user-scoped tokens to each user.
43
40
44
41
To set this up, follow these steps:
45
42
46
-
1.Modify your Helm chart `values.yaml` for JFrog Artifactory to add,
43
+
1.Add the following to your Helm chart `values.yaml` for JFrog Artifactory. Replace `CODER_URL` with your JFrog Artifactory base URL:
47
44
48
45
```yaml
49
46
artifactory:
@@ -62,17 +59,12 @@ To set this up, follow these steps:
62
59
scope: "applied-permissions/user"
63
60
```
64
61
65
-
> Note Replace `CODER_URL` with your Coder deployment URL, e.g.,
66
-
> <coder.example.com>
67
-
68
62
1. Create a new Application Integration by going to
69
-
<https://JFROG_URL/ui/admin/configuration/integrations/new> and select the
63
+
`https://JFROG_URL/ui/admin/configuration/integrations/new` and select the
70
64
Application Type as the integration you created in step 1.
71
65
72
-

73
-
74
-
1. Add a new [external authentication](../../admin/external-auth.md) to Coder by
75
-
setting these env variables,
66
+
1. Add a new [external authentication](../../admin/external-auth.md) to Coder by setting these
67
+
environment variables in a manner consistent with your Coder deployment. Replace `JFROG_URL` with your JFrog Artifactory base URL:
76
68
77
69
```env
78
70
# JFrog Artifactory External Auth
@@ -86,12 +78,7 @@ To set this up, follow these steps:
[JFrog-Token](https://registry.coder.com/modules/jfrog-token) module to
127
-
configure the integration and pass the admin token. It is recommended to
128
-
store the token in a sensitive terraform variable to prevent it from being
129
-
displayed in plain text in the terraform state.
109
+
1. Get a JFrog access token from your Artifactory instance. The token must be an [admin token](https://registry.terraform.io/providers/jfrog/artifactory/latest/docs#access-token) with scope `applied-permissions/admin`.
110
+
111
+
1. Create or edit a Coder template and use the [JFrog-Token](https://registry.coder.com/modules/jfrog-token) module to configure the integration and pass the admin token. It is recommended to store the token in a sensitive Terraform variable to prevent it from being displayed in plain text in the terraform state:
130
112
131
113
```tf
132
114
variable "artifactory_access_token" {
@@ -150,24 +132,21 @@ To set this up, follow these steps:
150
132
```
151
133
152
134
<blockquote class="info">
135
+
153
136
The admin-level access token is used to provision user tokens and is never exposed to developers or stored in workspaces.
137
+
154
138
</blockquote>
155
139
156
-
If you do not want to use the official modules, you can check example template
157
-
that uses Docker as the underlying compute
158
-
[here](https://github.com/coder/coder/tree/main/examples/jfrog/docker). The same
159
-
concepts apply to all compute types.
140
+
If you don't want to use the official modules, you can read through the [example template](https://github.com/coder/coder/tree/main/examples/jfrog/docker), which uses Docker as the underlying compute. The
section for instructions on how to use coder-modules in an offline environment
166
-
with Artifactory.
145
+
See the [offline deployments](../templates/extending-templates/modules.md#offline-installations) section for instructions on how to use Coder modules in an offline environment with Artifactory.
146
+
147
+
## Next Steps
167
148
168
-
## More reading
149
+
- See the [full example Docker template](https://github.com/coder/coder/tree/main/examples/jfrog/docker).
0 commit comments