Skip to main content
Version: 1.20

GitHub integration

You can configure Okteto to use a GitHub App to give your developers access to private GitHub repositories.

There are several reasons for considering this approach including:

  • Your users can select a repo from a list, instead of having to type the full repository URL.
  • Give everyone on your cluster read-only access to private repositories.
  • Control access to Okteto and the repositories at the Organization level, or per repository.
  • The pipelines use an app-scoped token, instead of a shared ssh key.

Configuration Steps

Setting up the GitHub integration requires several steps in both GitHub and your Okteto instance. Complete the following steps in GitHub:

  1. Create the GitHub Application
  2. Generate a private key for the GitHub App

Complete the following steps in your Okteto Self-Hosted instance:

  1. Adding the GitHub App Configuration to Okteto
  2. Verify your installation

Once this configuration has been completed, your instance of Okteto will use the GitHub Application you authenticate during the clone repository step of any Okteto pipelines.

Creating the GitHub App

  1. In the upper-right corner of any page in GitHub, select your profile icon > Organizations.
  2. Click on the settings of the organization you want to use to create the application.
  3. In the left navigation, select Developer settings > GitHub Apps.
  4. Select New GitHub App.
  5. Complete the following fields as follows:
  6. Uncheck the Expire user authorization tokens option.
  7. Check the Request user authorization (OAuth) during installation option.
  8. On the Post Installation section, check the Redirect on update option.
  9. On the Webhook section, uncheck the Active option.
  10. On the Repository permissions section, set the Contents permission to Read-only.
  11. On the Organization permissions section, set the Members permission to Read-only.
  12. On the User permissions section, set the Email addresses permission to Read-only.
  13. On the Where can this GitHub App be installed? section, select the Any account option. This will allow your users to install the application in their own GitHub account and deploy personal repositories in your Okteto instance.
  14. Press the Create GitHub App button.
  15. On the next screen, copy the values of App Id and Client Id, you'll need to pass those to your Okteto instance in a future step.

See Creating a GitHub App for more information on creating a GitHub App from GitHub’s Developer guide.

Generating a private key for the GitHub App

After you have created the GitHub App, you will need to generate a private key for authenticating to the GitHub App.

To generate a private key authenticating to the GitHub App:

  1. In the upper-right corner of any page in GitHub, select your profile icon > Organizations.
  2. Click on the settings of the organization you want to use to create the application.
  3. In the left navigation, select Developer settings > GitHub Apps.
  4. Select the GitHub App.
  5. On the Client secrets section, press the Generate a new client secret button. Copy the value and save it in a safe place, since it won't be displayed again. You'll need to pass those to your Okteto instance in a future step.
  6. On the Private keys section (it's at the bottom of the page), press the Generate a private key button. A file with the private key will be saved in your computer.

Adding the GitHub App Configuration to Okteto

Add the values we generated in the previous steps to your existing Helm configuration file:

github:
enabled: true
appId: ${YOUR_APP_ID}
clientId: ${YOUR_CLIENT_ID}
clientSecret: ${YOUR_CLIENT_SECRET}
installationUrl: https://github.com/apps/${YOUR_GITHUB_APP_NAME}/installations/new
appPrivateKey: |
-----BEGIN RSA PRIVATE KEY-----
......
.....
-----END RSA PRIVATE KEY-----

You can also use a secret to store the clientSecret and the appPrivateKey.

  • clientID and clientSecret refers to the values of the GitHub App you just created.
  • appPrivateKey is the private key you generated.

You can also use the appId and clientId values of your GitHub application in the auth.github section of your Helm configuration file if you're using GitHub as your authentication provider.

Once you have updated your Helm configuration file, run the following command to reconfigure your Okteto instance:

helm upgrade okteto okteto/okteto -f config.yaml --namespace=okteto

If you're doing this as part of a fresh install, then run the following command:

helm install okteto okteto/okteto -f config.yaml --namespace=okteto

Verifying your installation

If the installation was successful, you should now see a GitHub option in the Deploy from Git dialog.

verify your installation

When you click on it, you should see the list of repositories that you added in the previous step. This document has further information on how to deploy a private repository.