Validate ownership of a private repository

Cloud Manager now knows about your GitHub repository, but it still needs access to it. To grant access, you need to install the Adobe GitHub app and verify that you own the specified repository.

  1. After adding your own repository, the Private Repository Ownership Validation dialog box is displayed.

    Private Repository Ownership Validation

  2. Cloud Manager uses a GitHub app to interact with your repository securely.

    An owner of your GitHub organization must install the app located at https://github.com/apps/cloud-manager-for-aem and grant access to the repository. See GitHub’s documentation for details.

  3. To enhance security, create a secret file in the default branch of your repository. Click Generate.

  4. Confirm the generation of the secret file by clicking Confirm.

    Confirm secret generation

  5. Back in the Private Repository Ownership Validation dialog box, Cloud Manager has generated the content in the Secret file content field. Copy the content from that field.

    The contents of the secret file is only shown once. If you do not copy the content before closing this window, you must regenerate the secret.

    Copy secret file content

  6. Create a new file in the default branch of your GitHub repo called .well-known/adobe/cloud-manager-challenge and paste the secret file content into that file and save.

  7. After the app is installed and the secret file exists in the repository, you can click Validate in the Private Repository Ownership Validation dialog.

The app can be installed and you can generate a secret file in any order. However, both steps must be completed before you can validate.

Until validation, the repository is listed with a red icon, indicating that it is not yet validated and cannot yet be used.

Unvalidated repo

Note that the Type column easily identifies Adobe-provided repositories (Adobe) and your own GitHub repositories (GitHub).

To return to the repository later and complete the validation, go to the Repositories page. Click More icon, ellipsis next to the GitHub repository that you added, then click Ownership Validation.

Use private repositories with Cloud Manager

After the GitHub repository is validated in Cloud Manager, the integration is completed and you can use the repository with Cloud Manager.

To use private repositories with Cloud Manager:

  1. When you create a pull request, a GitHub check starts automatically.

    GitHub checks

  2. For each pull request, a full stack code quality pipeline is created automatically. This pipeline is started at each pull request update.

  3. The GitHub check remains in a running state until the code quality checks are completed. The code quality results are then propagated to the GitHub check.

    GitHub code quality checks

When the pull request is closed or merged, the full stack code quality pipeline created is automatically deleted.

TIP
See the document GitHub Check Annotations for details on the information provided via GitHub when pull request checks are run.
TIP
You can control the pipelines that are created automatically to validate each pull request to a private repository. See GitHub Check Configuration for Private Repositories for more information.

Associate private repositories with pipelines

Validated private repositories can be associated with full-stack and frontend pipelines.

Limitations

Certain limitations apply when using private repositories with Cloud Manager.

  • Web tier and config pipelines are not supported with private repositories.
  • No Git tag is created and pushed when using private repositories on production full stack pipelines.
  • If the Adobe GitHub app is removed from your GitHb organization, this action removes the pull requests validation feature for all repositories.
  • Pipelines using private repositories and the on-commit build trigger are not started automatically when a new commit is pushed into the selected branch.
  • Artifact reuse functionality does not apply to private repositories.
  • You cannot pause the pull request validation using the GitHub check from Cloud Manager. If the GitHub repository is validated in Cloud Manager, Cloud Manager tries to validate the pull requests created for that repository.

Experience Manager