Skip to content
This repository has been archived by the owner on Sep 18, 2021. It is now read-only.

Configuring Secrets, Keytabs, and Keys

Jeremy Poulin edited this page May 31, 2018 · 4 revisions

As of release v1.0, we've removed the parameters for overriding ssh keys, keytabs, and the credentials that cinch uses to connect the slave. This was done to remove some of the clutter from the params section, so that we could present as simple a Jenkinsfile as possible. If the defaults are not sufficient for you project, you can override these just as you did in versions prior. Here is the snipped for that configuration, which you can add to the Jenkinsfile in the parameters block.

string(
  defaultValue: 'redhat-multiarch-qe-sshprivkey',
  description: 'SSH private key Jenkins credential ID for Beaker/SSH operations.',
  name: 'SSHPRIVKEYCREDENTIALID'
),
string(
  defaultValue: 'redhat-multiarch-qe-sshpubkey',
  description: 'SSH public key Jenkins credential ID for Beaker/SSH operations.',
  name: 'SSHPUBKEYCREDENTIALID'
),
string(
  defaultValue: 'redhat-multiarch-qe-keytab',
  description: 'Kerberos keytab file Jenkins credential ID for Beaker/SSH operations.',
  name: 'KEYTABID'
),
string(
  defaultValue: 'jenkins-slave-credentials',
  description: 'Jenkins slave credential ID for connecting slaves using cinch via JSwarm.',
  name: 'JENKINSSLAVECREDENTIALID'
),

Release v1.0 also introduced a way to override the Kerberos service principal credential ID.

string(
  defaultValue: 'redhat-multiarch-qe-krbprincipal',
  description: 'Jenkins slave credential ID for Kerberos principal for Beaker/SSH operations.',
  name: 'KRBPRINCPALCREDENTIALID'
),