Skip to content

September 2023 azd supports bicepparam. Update. #9

September 2023 azd supports bicepparam. Update.

September 2023 azd supports bicepparam. Update. #9

on:
workflow_dispatch:
inputs:
# Set this to the name of the environment you want to deploy to
environment:
description: "Environment to deploy to"
required: true
default: "dev"
type: choice
options:
- "dev"
- "test"
- "prod"
push:
# Run when commits are pushed to mainline branch (main or master)
# Set this to the mainline branch you are using
branches:
- main
- master
paths:
- "infra/**"
- "src/**"
# GitHub Actions workflow to deploy to Azure using azd
# To configure required secrets for connecting to Azure, simply run `azd pipeline config`
# Set up permissions for deploying with secretless Azure federated credentials
# https://learn.microsoft.com/en-us/azure/developer/github/connect-from-azure?tabs=azure-portal%2Clinux#set-up-azure-login-with-openid-connect-authentication
permissions:
id-token: write
contents: read
jobs:
provision_and_deploy:
defaults:
run:
shell: pwsh
runs-on: ubuntu-latest
environment: ${{ github.event.inputs.environment || 'dev'}}
env:
AZURE_CLIENT_ID: ${{ vars.AZURE_CLIENT_ID }}
AZURE_TENANT_ID: ${{ vars.AZURE_TENANT_ID }}
AZURE_SUBSCRIPTION_ID: ${{ vars.AZURE_SUBSCRIPTION_ID }}
AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }}
GITHUB_ENV_NAME: ${{ github.event.inputs.environment || 'dev'}}
steps:
- name: Checkout
uses: actions/checkout@v3
- name: Install azd
uses: Azure/[email protected]
- name: Install PAC
run: dotnet tool install --global Microsoft.PowerApps.CLI.Tool
- name: Log in with azd (Federated Credentials)
if: ${{ env.AZURE_CLIENT_ID != '' }}
run: |
azd auth login `
--client-id "$Env:AZURE_CLIENT_ID" `
--federated-credential-provider "github" `
--tenant-id "$Env:AZURE_TENANT_ID"
- name: Setup pac auth
run: |
pac auth clear
pac auth create -u ${{ vars.DATAVERSE_URL }} -id ${{ env.AZURE_CLIENT_ID }} -cs ${{ secrets.DATAVERSE_CLIENT_SECRET }} -t ${{ env.AZURE_TENANT_ID }}
- name: "Az CLI login"
uses: azure/login@v1
if: ${{ env.AZURE_CLIENT_ID != '' }}
with:
client-id: ${{ env.AZURE_CLIENT_ID }}
tenant-id: ${{ env.AZURE_TENANT_ID }}
subscription-id: ${{ env.AZURE_SUBSCRIPTION_ID }}
- name: Log in with azd (Client Credentials)
if: ${{ env.AZURE_CREDENTIALS != '' }}
run: |
$info = $Env:AZURE_CREDENTIALS | ConvertFrom-Json -AsHashtable;
Write-Host "::add-mask::$($info.clientSecret)"
azd auth login `
--client-id "$($info.clientId)" `
--client-secret "$($info.clientSecret)" `
--tenant-id "$($info.tenantId)"
env:
AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }}
- name: Provision Infrastructure
run: azd provision --no-prompt
env:
AZURE_ENV_NAME: ${{ vars.AZURE_ENV_NAME }}
AZURE_LOCATION: ${{ vars.AZURE_LOCATION }}
AZURE_SUBSCRIPTION_ID: ${{ vars.AZURE_SUBSCRIPTION_ID }}
SERVICE_ENDPOINT_STORAGE_LOCATIONS: ${{ vars.SERVICE_ENDPOINT_STORAGE_LOCATIONS }}
DATAVERSE_URL: ${{ vars.DATAVERSE_URL }}
CREATE_PRIVATE_LINK: ${{ vars.CREATE_PRIVATE_LINK || 'true' }}
CREATE_VNET: ${{ vars.CREATE_VNET || 'true' }}
- name: Deploy Application
run: azd deploy --no-prompt
env:
AZURE_ENV_NAME: ${{ vars.AZURE_ENV_NAME }}
AZURE_LOCATION: ${{ vars.AZURE_LOCATION }}
AZURE_SUBSCRIPTION_ID: ${{ vars.AZURE_SUBSCRIPTION_ID }}