Golang (Go) with JFrog Artifactory - Host Rule Implementation
This article details the instructions to successfully configure our repo integrations with your Go private registries that are hosted in JFrog Artifactory. Go private registries can be accessed by authentication via a password or token. This will allow our repo integrations to scan your private Go packages for vulnerabilities and compliance.
Option 1: Generating a JFrog token
Within the JFrog platform Artifactory, navigate to your Administration > User Management > Access Tokens setting:
Click + Generate Token:
In the Generate Token window, select the Scoped Token option and fill in the settings as seen here:
Description: can be any value
Token scope: Admin
User name: can be any value
Service: All
Expiration time: Never
Click on Generate. Copy the Username you defined and the token that is generated:
Option 2: Using your JFrog password
Within the JFrog platform Artifactory, navigate to the repository where your Go packages are located
Click on Set Me Up in the top-right corner of the page:
Make sure the correct repository is selected within the Set Up a Go client window
Navigate to the Configure tab
Input your JFrog login password and click on Insert. This will generate your credentials into the code snippet.
Remaining in the Configure tab, copy the
--password
value from the code snippet:
Encrypting the JFrog token or password
For Mend-Hosted repo integrations (GitHub.com, Bitbucket Cloud, and Azure Repos)
Navigate to our Mend's Repository Integration Secrets Encryption page
Each secret you encrypt must be scoped to a GitHub org, Bitbucket Cloud Workspace, or Azure project, and its use will be restricted to those within the app. There are the following fields on the encryption page:
Organization\Group - required; your GitHub org, Bitbucket Cloud Workspace, or your Azure project to which secrets are to be scoped
Repository - optional; your GitHub or Azure repository to which secrets are to be scoped
Raw value - required; your JFrog token that was created earlier in Option 1, or your JFrog password from Option 2
Click on Encrypt. This will create an encrypted value, which is the result of the encryption to be used in the integration
Copy this encrypted value
For Self-Hosted repo integrations (GitHub Enterprise, Bitbucket Server and Data Center, and GitLab)
Follow the steps outlined below to generate encryption for each of the Self-Hosted repo integrations:
Mend for GitHub Enterprise | Handling Private Registries and Authenticated Repositories
Installing Mend for GitLab | Handling Private Registries and Authenticated Repositories
When generating a secret, there are the following fields on the encryption page:
Organization\Group - required; your GitHub org, GitLab group, or Bitbucket group to which secrets are to be scoped
Repository - optional; your repository to which secrets are to be scoped
Raw value - required; your JFrog token that was created earlier in Option 1, or your JFrog password from Option 2
Click on Encrypt. This will create an encrypted value, which is the result of the encryption to be used in the integration
Copy this encrypted value
Where can I find the matchHost URL for Go?
The URL that is to be used for the matchHost setting in the hostRules can be found by following these steps:
Within the JFrog platform Artifactory, navigate to the repository where your Go packages are located
Click on Set Me Up in the top-right corner of the page:
Make sure the correct repository is selected within the Set Up a Go client window
Go to the Resolve tab and navigate to the first line under Using Go.
Your matchHost setting will be the path after the “@” symbol within the GOPROXY parameter. It will look like this:
<jfrog_instance>/artifactory/api/go/<jfrog-repo-name>
:
NOTE: To accommodate different packaging format clients, for several repository types, when accessing the repository through Artifactory, the repository URL must be prefixed with api/<type>
in the path. For more information on this Artifactory requirement, please see Artifactory’s documentation here.
Applying the hostRules
Within your repo-config.json (if you have a global setup) or, in your .whitesource file (if you are configuring at the repo level), include the following required hostRules settings:
matchHost - The URL of the JFrog repository where your Go packages are located (remember to include api/go in the path). NOTE: You should have one rule for each JFrog repository where your Go packages are located - meaning there can be multiple hostRules
hostType -
go
userName -
When using a token (Option 1), this will be the Username value that was set when you created the JFrog token
When using a password (Option 2), this will be the email address of your JFrog account
token or password - The encrypted value that was generated
hostRules Examples
token
Example:
{
"hostRules": [
{
"matchHost": "<jfrog_instance>/artifactory/api/go/<jfrog-repo-name>",
"hostType": "go",
"userName": "hostrules",
"encrypted": {
"token": "3f832f2983yf89hsd98ahadsjfasdfjaslf............"
}
}
]
}
password
Example:
{
"hostRules": [
{
"matchHost": "<jfrog_instance>/artifactory/api/go/<jfrog-repo-name>",
"hostType": "go",
"userName": "engineers@mend.io",
"encrypted": {
"password": "p278djfdsi9832jnfdshufwji2r389fdskj........."
}
}
]
}