Skip to main content

External repositories

Infrahub supports two different types of connections to external Git repositories:

  • Repository fully integrates with Git version control, including branch tracking and two-way branch synchronization.
  • Read-only Repository links a particular branch in Infrahub to a particular ref in the Git repository. It will only read from the Git repository. It will never make any changes to the external repository.

Recommendations

  • We recommend using a dedicated repository for Infrahub resources.
  • We recommend configuring the branch main as default_branch.
  • Use Read-only Repository preferably for slow-moving assets as pulling the changes is a manual operation (it works well with tagging a release and bumping the ref from release to release).
  • Use Read-only Repository for shared assets across multiple instances or repositories external to your organization.

Adding a repository

To create a repository in Infrahub, you'll need to submit the following details:

  • Repository location: The URL of the external repository (for example, https://github.com/opsmill/infrahub.git).
  • Authentication: (Optional) A credential object containing your username/password or personal token.
  • Name: The identifier you wish to assign to the repository in Infrahub.
  • Description: (Optional) A comment or description about the repository.
  • Ref: (Optional) A branch, tag, or commit reference to pull.
  • Tags: (Optional) Any tags to associate with the repository.
Access Token & Private Repository

If your repository is private, you might want to use a personal token to access it. If you use GitHub as your Git Server, see this Guide.

Via the Web Interface

  1. Log in to the Infrahub UI.
  2. Go to Integrations > Git Repositories.
  3. Click on the + Add Git Repository button.
  4. Select the repository type.
  5. Complete the required information.

Add a Git Repository

Validate that everything is correct

In the UI, you should see your new repository. If its Operational Status is Unknown, verify the location and credentials.

Pulling changes for read-only repository

Read-only Repository and Repository track remote changes differently. For further details, refer to the Repository Topic.

warning

Unlike a Repository, Infrahub does not automatically update a Read-only Repository with remote changes. To update, you must change the ref value.

Via the Web Interface

  1. Log in to the Infrahub UI.
  2. Go to Integrations > Git Repositories.
  3. Click on the desired CoreReadOnlyRepository record.
  4. Click on the Edit Read-Only Repository button.
  5. Change the ref with the branch, tag, or commit reference to pull

Troubleshooting repository

For troubleshooting, consult the Repository Status for potential issues. You can also view the low-level repository operations output from the UI:

  1. Log in to the Infrahub UI.
  2. Go to Integrations > Git Repositories.
  3. Select the relevant CoreReadOnlyRepository record.
  4. Click on the Tasks tab.

GitHub access token

If your repository is private on GitHub, you need an access token.

You can use either :

Generate a GitHub fine-grained personal access token
  1. Go to Settings > Developer Settings > Personal access tokens > New GitHub token.

  2. Select Fine-grained tokens.

  3. Limit the scope under Repository Access > Only Select Repositories.

  4. Grant the token permission:

    • For a Repository, grant Read/Write access to the repository content.
    • For a Read-only Repository, grant Read access only.

Fine-Grained Token

Installing custom CA certificates

If your Git server uses a certificate signed by an unknown CA, add the CA certificate as follows.

info

You will need to build a custom Docker image, and rebuild it with each new release.

  1. Save your CA certificate (and any intermediate certificates) in PEM format (such as mycacertificate.crt).
  2. Create a Dockerfile (in the same directory as your certificate):
ARG INFRAHUB_VERSION=latest
FROM registry.opsmill.io/opsmill/infrahub:${INFRAHUB_VERSION}

COPY mycacertificate.crt /usr/local/share/ca-certificates/
RUN update-ca-certificates
  1. Build the Docker image:
INFRAHUB_VERSION=latest && docker build --build-arg INFRAHUB_VERSION=$INFRAHUB_VERSION -f Dockerfile -t custom/infrahub:${INFRAHUB_VERSION} .
  1. Create a docker-compose.override.yml file in the development directory:
---
services:
task-worker:
image: custom/infrahub:latest

Start your development environment with the invoke demo.start command as explained in the Installing Infrahub guide.

Disable certificate verification

warning

Disabling certificate validation is a BAD practice and is STRONGLY discouraged.

info

You will need to build a custom Docker image, and rebuild it with each new release.

  1. Create a Dockerfile on your local system:
ARG INFRAHUB_VERSION=latest
FROM registry.opsmill.io/opsmill/infrahub:${INFRAHUB_VERSION}

RUN git config --global http.sslVerify "false"
  1. Build the Docker image:
INFRAHUB_VERSION=latest && docker build --build-arg INFRAHUB_VERSION=$INFRAHUB_VERSION -f Dockerfile -t custom/infrahub:${INFRAHUB_VERSION} .
  1. Create a docker-compose.override.yml file in the development directory:
---
services:
task-worker:
image: custom/infrahub:latest

Start your environment with invoke demo.start as detailed in the Installing Infrahub guide.

Using a proxy server

In some cases, Infrahub’s git worker containers must connect through a proxy.

info

This method works only for HTTP(S) connections (SSH is not supported).

info

You will need to build a custom Docker image, and rebuild it with each new release.

  1. Create a Dockerfile. Update the proxy URL, replacing user:password with your credentials and modifying the FQDN/port as needed:
ARG INFRAHUB_VERSION=latest
FROM registry.opsmill.io/opsmill/infrahub:${INFRAHUB_VERSION}

RUN git config --global http.proxy http://user:password@internal.proxy:8080
  1. Build the Docker image:
INFRAHUB_VERSION=latest && docker build --build-arg INFRAHUB_VERSION=$INFRAHUB_VERSION -f Dockerfile -t custom/infrahub:${INFRAHUB_VERSION} .
  1. Create a docker-compose.override.yml file in the development directory:
---
services:
task-worker:
image: custom/infrahub:latest

Start your development environment with invoke demo.start as explained in the Installing Infrahub guide.