ChatGPT解决这个技术问题 Extra ChatGPT

Authenticate with GitHub using a token

I am trying to authenticate with GitHub using a personal access token. In the help files at GitHub, it states to use the cURL method to authenticate (Creating a personal access token). I have tried this, but I still cannot push to GitHub. Please note, I am trying to push from an unauthenticated server (Travis CI).

cd $HOME
git config --global user.email "emailaddress@yahoo.com"
git config --global user.name "username"

curl -u "username:<MYTOKEN>" https://github.com/username/ol3-1.git
git clone --branch=gh-pages https://github.com/username/ol3-1.git gh-pages

cd gh-pages
mkdir buildtest
cd buildtest
touch asdf.asdf

git add -f .
git commit -m "Travis build $TRAVIS_BUILD_NUMBER pushed to gh-pages"
git push -fq origin gh-pages

This code causes the errors:

remote: Anonymous access to scuzzlebuzzle/ol3-1.git denied.

fatal: Authentication failed for 'https://github.com/scuzzlebuzzle/ol3-1.git/'"

As of 2021-Aug-28, github CLI can be used to authenticate (no need to generating PAT, can directly login with password if browser can be opened). Checkout: github.com/cli/cli#installation, cli.github.com/manual/gh_auth_login

B
BMW

Your curl command is entirely wrong. You should be using the following

curl -H 'Authorization: token <MYTOKEN>' ...

That aside, that doesn't authorize your computer to clone the repository if in fact it is private. (Taking a look, however, indicates that it is not.) What you would normally do is the following:

git clone https://scuzzlebuzzle:<MYTOKEN>@github.com/scuzzlebuzzle/ol3-1.git --branch=gh-pages gh-pages

That will add your credentials to the remote created when cloning the repository. Unfortunately, however, you have no control over how Travis clones your repository, so you have to edit the remote like so.

# After cloning
cd gh-pages
git remote set-url origin https://scuzzlebuzzle:<MYTOKEN>@github.com/scuzzlebuzzle/ol3-1.git

That will fix your project to use a remote with credentials built in.

Warning: Tokens have read/write access and should be treated like passwords. If you enter your token into the clone URL when cloning or adding a remote, Git writes it to your .git/config file in plain text, which is a security risk.


Thank you SO much for your help. It worked great. Here is a copy of my changed file: github.com/scuzzlebuzzle/ol3-1/blob/master/util/s.sh. I got it pretty close. For some reason it didn't push to the build1 directory I created, but it still pushed to the build directory so it worked! THANKS!
I don't know what editor button you're speaking of but removing the original remote is absolutely necessary.
Heh. Cool. Glad to help.
You don't have to rm the remote, you can use set-url instead, as in git remote set-url origin https://scuzzlebuzzle:<MYTOKEN>@github.com/scuzzlebuzzle/ol3-1.git
Insecure approach. Key easily cat'd to logs on error. Use a tightly scoped deploy key instead.
P
Peter Mortensen

First, you need to create a personal access token (PAT). This is described here: https://help.github.com/articles/creating-an-access-token-for-command-line-use/

Laughably, the article tells you how to create it, but gives absolutely no clue what to do with it. After about an hour of trawling documentation and Stack Overflow, I finally found the answer:

$ git clone https://github.com/user-or-organisation/myrepo.git
Username: <my-username>
Password: <my-personal-access-token>

I was actually forced to enable two-factor authentication by company policy while I was working remotely and still had local changes, so in fact it was not clone I needed, but push. I read in lots of places that I needed to delete and recreate the remote, but in fact my normal push command worked exactly the same as the clone above, and the remote did not change:

$ git push https://github.com/user-or-organisation/myrepo.git
Username: <my-username>
Password: <my-personal-access-token>

(@YMHuang put me on the right track with the documentation link.)


I tried several times this approach, but I am facing the same issue. I generated the PTA and then tried to authenticate after push command execution, putting my username and my token. It still tells me that credentials are wrong. What am I missing in these steps?
So where are we expected to get the token from in order to enter it wherever it's needed? Are we seriously expected to copy it into a file everywhere and then paste it into authentication prompts whenever we need to use Git. If so that's the shitest workflow I've ever heard of but the Git docs don't seem to have any other suggestions.
"Beginning August 13, 2021, we will no longer accept account passwords when authenticating Git operations on GitHub.com." This should be interesting.
Why don't they explain what to do with the token after creating it?!
Today the apocalypse is upon us :(
B
BMW

This worked for me using ssh:

Settings → Developer settings → Generate new token.

git remote set-url origin https://[APPLICATION]:[NEW TOKEN]@github.com/[ORGANISATION]/[REPO].git

This also works for personal access tokens using this format: git remote add origin https://[USERNAME]:[NEW TOKEN]@github.com/[USERNAME]/[REPO].git
I had to do git remote add origin https://[USERNAME]:[TOKEN]@git.mycompany.com/[ORGANIZATION]/[REPO].git
Also worked for me git remote add origin https://[TOKEN]@git.mycompany.com/[ORGANIZATION]/[REPO].git
@TheRealChx101You can use something like git remote set-url origin https://[TOKEN]@git.mycompany.com/[ORGANIZATION]/[REPO].git> /dev/null 2>&1 to avoid logging of insecure git output. Store the token in a variable to avoid having it in the log. But it needs to be stored somewhere. To secure further you can store it encrypted. This approach is for example supported by Travis CI.
@ThomasChafiol and TheRealChx101 When your token expires or if eg, windows password updates your company-wide enterprise authentication this would be the correct approach or rather a combination of your two answers git remote set-url origin https://[TOKEN]@git.mycompany.com/[ORGANIZATION]/[REPO].git
P
Peter Mortensen

Automation / Git automation with OAuth tokens

$ git clone https://github.com/username/repo.git
  Username: your_token
  Password:

It also works in the git push command.

Reference: https://help.github.com/articles/git-automation-with-oauth-tokens/


The key is to set git so that you do not need to be prompted at all times for your token, as described here - help.github.com/articles/caching-your-github-password-in-git Other answers to this question will end up writing your token in plaintext to .git/config which could be considered a security risk.
S
Scriddie

Generating a token

I generated a token using the instructions from Creating a personal access token.

Actually using the token

The following sequence worked for me:

git remote remove origin
git remote add origin https://[TOKEN]@github.com/[USER]/[REPO]
git push

First I used this one git remote set-url origin https://[TOKEN]@git.mycompany.com/[ORGANIZATION]/[REPO].git , it just worked for git pull, but when I ran command git push, git again prompt for username. Its annoying to put token in password field again and again, so above mentioned commands in same order worked for me.
To grantee that all these steps will work while pushing to Github, you need to select the scopes, or permissions, you'd like to grant this token to access your repositories from the command line.
If you try this for an organization, (and you're stupid like me), be aware that [USER] means your organization's user name and not your personal user name.
Actually, you don't need to remove origin and then add. It will be overwritten so just the add is sufficient
Short & Simple for all users :)
O
Omar Magdy

Step 1: Get the access token

Go to this link: https://github.com/settings/tokens. And generate the token there.

Or from you Github account, Go to:
Settings -> Developer Settings -> Personal Access Tokens

Step 2: Use the token

git push Username: Password:


For anyone wanting things to work like they do for Omar, I could not get it to work unless i first did $ git config credential.helper store. Note: The credentials will be saved unencrypted on a file inside your home directory, therefore use it with discretion. A better explanation can be found here
@Steinarr the link is not valid.
@Timo here is a wayback machine link to the site as it was
More simple than this is impossible. Thanks!
@EmersonPardo. You are welcome. Thank you for letting me know. :) :)
B
Bosh

To avoid handing over "the keys to the castle"...

Note that sigmavirus24's response requires you to give Travis a token with fairly wide permissions -- since GitHub only offers tokens with wide scopes like "write all my public repos" or "write all my private repos".

If you want to tighten down access (with a bit more work!) you can use GitHub deployment keys combined with Travis encrypted yaml fields.

Here's a sketch of how the technique works...

First generate an RSA deploy key (via ssh-keygen) called my_key and add it as a deploy key in your github repo settings.

Then...

$ password=`openssl rand -hex 32`
$ cat my_key | openssl aes-256-cbc -k "$password" -a  > my_key.enc
$ travis encrypt --add password=$password -r my-github-user/my-repo

Then use the $password file to decrypt your deploy key at integration-time, by adding to your yaml file:

before_script: 
  - openssl aes-256-cbc -k "$password" -d -a -in my_key.enc -out my_deploy_key
  - echo -e "Host github.com\n  IdentityFile /path/to/my_deploy_key" > ~/.ssh/config
  - echo "github.com ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAq2A7hRGmdnm9tUDbO9IDSwBK6TbQa+PXYPCPy6rbTrTtw7PHkccKrpp0yVhp5HdEIcKr6pLlVDBfOLX9QUsyCOV0wzfjIJNlGEYsdlLJizHhbn2mUjvSAHQqZETYP81eFzLQNnPHt4EVVUh7VfDESU84KezmD5QlWpXLmvU31/yMf+Se8xhHTvKSCZIFImWwoG6mbUoWf9nzpIoaSjB+weqqUUmpaaasXVal72J+UX2B+2RPW3RcT0eOzQgqlJL3RKrTJvdsjE3JEAvGq3lGHSZXy28G3skua2SmVi/w4yCE6gbODqnTWlg7+wC604ydGXA8VJiS5ap43JXiUFFAaQ==" > ~/.ssh/known_hosts

Note: the last line pre-populates github's RSA key, which avoids the need for manually accepting at the time of a connection.


P
Peter Mortensen

For macOS, if you are not prompted with a username and password request, it means your password is stored in Keychain Access. Every time you try to clone or push it will try to use your old password.

Follow these three steps to solve this:

Generate a PAT (personal access token) - LINK Open KeyChain Access (Via spotlight search) → search GitHub → click GitHub → change and save with your new PAT link Try to push or clone again. Now you have stored the PAT instead of your password.


Lifesaver! Thank you!
Seriously, this. I would've never figured this one out, thank you so much!
This should be in the Github FAQ written exactly as this. If it already is I was not able to find it. Thanks for making this ridiculously clear.
P
Peter Mortensen

Normally I do like this:

 git push https://$(git_token)@github.com/user_name/repo_name.git

The git_token is reading from variable config in Azure DevOps.

You can read my full blog post here.


this can invoke: remote: No anonymous write access.
P
Peter Mortensen

I'm on Ubuntu 20.04 (Focal Fossa) and I kept getting the message that soon I wouldn't be able to log in from console. I was terribly confused.

Finally, I got to the URL below which will work. But you need to know how to create a PAT (personal access token) which you are going to have to keep in a file on your computer.

Here's what the final URL will look like:

git push https://1234567890123456789012345678901234567890@github.com/user-name/repo.git

long PAT (personal access token) value -- The entire long value between the // and the @ sign in the URL is your PAT.

user-name will be your exact username

repo.git will be your exact repository name

Also you will be able to use it this way too:

When you do a

git push

1. You'll be prompted for a username and password

2. Just submit your username as normal

3. Now submit your PAT as your password and it will work.

You need to generate a PAT following the steps at: Creating a personal access token

That will give you the PAT value that you will place in your URL.

When you create the PAT make sure you choose the following options so it has the ability to allow you to manage your repositories.

https://i.stack.imgur.com/VydLH.png

Save Your PAT Or Lose It

Once you have your PAT, you're going to need to save it in a file locally so you can use it again. If you don't save it somewhere there is no way to ever see it again and you'll be forced to create a new PAT.

Now you're going to need at the very least:

a way to display it in your console so you can see it again. or, a way to copy it to your clipboard automatically.

For 1, just use:

cat ~/files/myPatFile.txt

Where the path is a real path to the location and file where you stored your PAT value.

For 2

xclip -selection clipboard < ~/files/myPatFile.txt

That'll copy the contents of the file to the clipboard so you can use your PAT more easily.

FYI - if you don't have xclip do the following:

sudo apt-get install xclip

It downloads and installs xclip. If you don't have apt-get, you might need to use another installer (like YUM).


git config credential.helper cache could be used to save password for a default of 15 mins. Also git config credential.helper store can be used to permanently store the password for that repo (less "secure"). More info here
u
undefined

I previously used passwords to access my private repositories using Git CLI and had saved my credentials with git config --global credential.helper store.

As support for passwords has been dropped today, I couldn't manage to update my credentials with the token using the git config commands suggested.

If anyone else has this problem on Linux, you can manually update the ~/.git-credentials file, e.g.

nano ~/.git-credentials

Enter your token between the : and @ symbols. (To save and close the file, press Ctrl + O, Enter, Ctrl + X).

You might have to also run the following command after updating your token in the credentials file (see @guhur's comment):

git config --global credential.helper store

Note that by using Git's credential helper, anyone who has access to your home directory can see your token.


Thanks, this was literally the only thing that worked for me after spending 3 hours on this. Only I deleted ~/.git-credentials, and then used git config credential.helper store
Thanks. So the steps are: 1) create a personal token from Github, 2) put :<your-personal-token>@ in ~/.git-credentials, 3) run git config --global credential.helper store
@guhur not sure step 3 is even needed. The next time authentication is required, git directly reads from the credentials file (at least as far as I recall)
I actually needed it
Thanks!! This was what I really needed :)
B
Brunno

You can easily change your remote Authentication, first:

Remove your current origin:

git remote remove origin

And then:

git remote add origin https://<TOKEN>@github.com/<USERNAME>/<REPO>.git

You can find how to generate your Authentication Token here.


this is a super answer, the above ones didn't work
Didn't work for me!
P
Ping Woo

The following steps works for me:

git remote remove origin git remote add origin https://[TOKEN]@[REPO LINK]

For example, my repo name is: https://github.com/username/codf.git.

The command will be:

git remote add origin https://[TOKEN]@github.com/username/codf.git

git push origin branchName


R
Rithwik datta

Since I am using macOS, I can answer this for macOS specifically. We can use this for Windows also. It works!! In your GitHub account, click on the top right avatar and go to settings profile.

Click on Settings:

https://i.stack.imgur.com/nINrn.png

Click on Developer settings:

https://i.stack.imgur.com/Ub5aH.png

Click on Personal Access Tokens:

https://i.stack.imgur.com/NpYBK.png

https://i.stack.imgur.com/RvfGr.png

And then click on Generate new token:

https://i.stack.imgur.com/VjOLY.png

Give a name to your access token and check on the first option.

Scroll down and click on generate token

Now, when you push the repo, use the following syntax:

git remote add origin https:<access__token>://@github.com/<username>/<repo__name>.git

git push https://<access__token>@github.com/<username>/<repo__name>.git

In my opinion, you can use the second option, while pushing the repo provide access token and you're good to go.


last following example was helpful. this works for me.
M
MiKr13

The only answer that helped me in a VS Code environment and a private GitHub.

First => generate the token here: https://github.com/settings/tokens.

Second => do a "cd" to the right place in your VS Code terminal.

Third => follow as this example:

git clone https://[MY_USER_NAME]:[GITHUB_PERSONAL_ACCESS_TOKEN]@github.com/davidsonlima/davidson-myrepo.git without square brackets


P
Peter Mortensen

If you're using GitHub Enterprise and cloning the repository or pushing gives you a 403 error instead of prompting for a username/token, you can use this:

Delete the repository Open a command prompt and navigate to the folder you want the repository in Type: git clone https://[USERNAME]:[TOKEN]@[GIT_ENTERPRISE_DOMAIN]/[ORGANIZATION]/[REPO].git


Normal git workflows do not expose passwords or ssh private keys to other users with read access to a repo. The above advice does. It allows anyone with read access to a copy of a local repo, including for example a shared work or school filesystem, to see the user's clear text Personal Access Token. This extends to archived copies as well, such as source tarballs that retain the .git directory.
The only answer that helped me in a VS Code environment and a private GitHub. First generate the token here: github.com/settings/tokens. Second do a "cd" to the right place in your computer. Third follow as example: git clone https://davidsonlima:qwertyuiopasdfghjklzxcvbnm@github.com/davidsonlima/davidson-myrepo.git
D
Dharman

git remote remove origin git remote add origin https://{accesstoken}:{accesstoken}@gitlab.com/{username}/{repo}.git git push https://{youraccesstoken}@github.com/{username}/{repo}.git

This works for me.


I
Ibrahima Ba

I suffered with this problems but found a solution:

git push https://github.com/<username>/<project_name>
and
username: paste your personnal access token
password: paste your personnal access token

Are you sure you use your personal access token for both you username and your password, and not just for your password?
Regardless, this is suspiciously similar to @Echelon's answer from five years ago, but with far less detail.
I used my personnal access token for the username and password.
This doesn't work
it worked for me . thanks that is the best and quickest solution
M
Mhmdrz_A

I had to add oauth or oauth2 as username to successfully authenticate:

https://oauth:<TOKEN>@github.com/user/repo.git

K
Kailas

Lately github is not allowing commits directly from cmd using our username and password. For that we need to generate the accesss token as elaborated here.

And then use the same access token as username and password in the command prompt for git commands git push, git pull etc. For example

git push origin master
Username for 'https://github.com': lhq_4npmklMYXXXXXXXXXXXXXXXXXXXL8SxHxU
Password for 'https://lhq_4npmklMYXXXXXXXXXXXXXXXXXXXL8SxHxU@github.com':<give same access token here as password too>

And you start to see the code logs as:

Enumerating objects: 24, done.
Counting objects: 100% (24/24), done.
Delta compression using up to 8 threads
Compressing objects: 100% (14/14), done.
Writing objects: 100% (18/18), 6.33 KiB | 539.00 KiB/s, done.
Total 18 (delta 5), reused 0 (delta 0), pack-reused 0
remote: Resolving deltas: 100% (5/5), completed with 2 local objects.
To https://github.com/xxxxxxxxxxx/xxx-xxxxx-repo.git
123456..1233456  master -> master

Hope this helps someone. Happy Coding !!! :)


Works like a charm. Was just curious to know whether we could save our token somewhere so that we do not have to copy and paste it every time? Somewhere like in the git config? I want to run it in my Windows WSL, if that is any help.
S
Sumithran

For Windows:

Open Credential Manager - Windows Credentials Find the entry of git:https://github.com, edit it replace your former password with the PAT access token Solved


P
Peter Mortensen

Having struggled with this issue for pretty much a full day, hard coding in the ORG/REPO section into our build script getting the dreaded 'remote not found' error, eventually I found a working solution by using TRAVIS_REPO_SLUG.

Switching this in for the hardcoded attributes worked immediately.

git remote set-url origin https://[ORG]:${TOKEN}@github.com/${TRAVIS_REPO_SLUG}

P
Peter Mortensen

For those coming from GitLab, what's worked for me:

Prerequisite:

Create a token:

Select the necessary permissions

Select the necessary permissions

Select expiration date

Select expiration date

Generate by pressing create personal access token

Generate by pressing create personal access token

Save the token!

Step 1.

Add a remote:

git remote add origin https://<access-token-name>:<access-token>@gitlab.com/path/to/project.git

Step 2.

Pull once:

https://<access-token-name>:<access-token>@gitlab.com/path/to/project.git

Now you are able to read/write to/from the repository


P
Peter Mortensen

For Mac users:

Open Keychain Access and find GitHub Right-click in GitHub Click delete Open the terminal and try to clone a private project Add the required values Username: $your GitHub username Password: $paste token here And hit Enter. Voilà - the token has been added.


C
Craig Hicks

It can be done using github deploy keys which narrow access to a single github repo as well as making write permission optional.

Github deploy keys use a user generated ssh key using ssh-keygen which creates a private key file and a public key files.

Suppose the key name given ssh-keygen is key-test, and the private and public files live in ~/.ssh/key-test and ~/.ssh/key-test.pub respectively.

Suppose the github project name is keytest.

To add a deploy key to project via the github project web page, got settings/deploy keys and click add. Paste the contents of the public key file ~/.ssh/key-test.pub into the target box and confirm.

Modify the contents of your ~/.ssh/config file to include the following:

Host gh-keytest
        Hostname github.com
        IdentityFile=/home/user/.ssh/key-test

Note: gh-keytest is an arbitrary alias.

Now you can push using

git push git@gh-keytest:<githubaccountname>/keytest.git

To do it using only push

git remote remove origin  # in case origin is already set
git remote add origin git@gh-keytest:<githubaccountname>/testscope.git
git push --set-upstream origin main

Note: Replace main with the correct intended branch name.

Thereafter

git push 

is sufficient.


e
eQ19

By having struggling so many hours on applying GitHub token finally it works as below:

$ cf_export GITHUB_TOKEN=$(codefresh get context github --decrypt -o yaml | yq -y .spec.data.auth.password)

code follows Codefresh guidance on cloning a repo using token (freestyle}

test carried: sed %d%H%M on match word '-123456-whatever'

push back to the repo (which is private repo)

triggered by DockerHub webhooks

Following is the complete code:

version: '1.0'
steps:
  get_git_token:
    title: Reading Github token
    image: codefresh/cli
    commands:
      - cf_export GITHUB_TOKEN=$(codefresh get context github --decrypt -o yaml | yq -y .spec.data.auth.password)
  main_clone:
    title: Updating the repo
    image: alpine/git:latest
    commands:
      - git clone https://chetabahana:$GITHUB_TOKEN@github.com/chetabahana/compose.git
      - cd compose && git remote rm origin
      - git config --global user.name "chetabahana"
      - git config --global user.email "chetabahana@gmail.com"
      - git remote add origin https://chetabahana:$GITHUB_TOKEN@github.com/chetabahana/compose.git
      - sed -i "s/-[0-9]\{1,\}-\([a-zA-Z0-9_]*\)'/-`date +%d%H%M`-whatever'/g" cloudbuild.yaml
      - git status && git add . && git commit -m "fresh commit" && git push -u origin master

Output...

On branch master 
Changes not staged for commit: 
  (use "git add ..." to update what will be committed) 
  (use "git checkout -- ..." to discard changes in working directory) 

modified:   cloudbuild.yaml 

no changes added to commit (use "git add" and/or "git commit -a") 
[master dbab20f] fresh commit 
 1 file changed, 1 insertion(+), 1 deletion(-) 
Enumerating objects: 5, done. 
Counting objects:  20% (1/5) ...  Counting objects: 100% (5/5), done. 
Delta compression using up to 4 threads 
Compressing objects:  33% (1/3) ... Writing objects: 100% (3/3), 283 bytes | 283.00 KiB/s, done. 
Total 3 (delta 2), reused 0 (delta 0) 
remote: Resolving deltas:   0% (0/2)  ...   (2/2), completed with 2 local objects. 
To https://github.com/chetabahana/compose.git 
   bbb6d2f..dbab20f  master -> master 
Branch 'master' set up to track remote branch 'master' from 'origin'. 
Reading environment variable exporting file contents. 
Successfully ran freestyle step: Cloning the repo 

j
jawad

To update your remote repo with a new access token

git remote set-url origin https://{{your_username}}:{{your_new_token}}@github.com/{{repo_path}}.git

This is for a repo, how would you grant access across all repos at once?
P
Peter Mortensen

Select vcs → push tab from Android Studio. A popup would be displayed with username and password. Enter your username and instead of a password, enter the token number. It will get pushed to the repository.


P
Peter Mortensen

The password that you use to log in to github.com portal does not work in the Visual Studio Code CLI/shell. You should copy the PAT token from URL https://github.com/settings/tokens by generating a new token and paste that string in CLI as the password.


C
Cedric Flamain

Clone your project -> git clone https://token@github.com//project.git In Project folder -> git config --global credential.helper cache

and work