September 2023 azd supports bicepparam. Update. #9
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
on: | |
workflow_dispatch: | |
inputs: | |
# Set this to the name of the environment you want to deploy to | |
environment: | |
description: "Environment to deploy to" | |
required: true | |
default: "dev" | |
type: choice | |
options: | |
- "dev" | |
- "test" | |
- "prod" | |
push: | |
# Run when commits are pushed to mainline branch (main or master) | |
# Set this to the mainline branch you are using | |
branches: | |
- main | |
- master | |
paths: | |
- "infra/**" | |
- "src/**" | |
# GitHub Actions workflow to deploy to Azure using azd | |
# To configure required secrets for connecting to Azure, simply run `azd pipeline config` | |
# Set up permissions for deploying with secretless Azure federated credentials | |
# https://learn.microsoft.com/en-us/azure/developer/github/connect-from-azure?tabs=azure-portal%2Clinux#set-up-azure-login-with-openid-connect-authentication | |
permissions: | |
id-token: write | |
contents: read | |
jobs: | |
provision_and_deploy: | |
defaults: | |
run: | |
shell: pwsh | |
runs-on: ubuntu-latest | |
environment: ${{ github.event.inputs.environment || 'dev'}} | |
env: | |
AZURE_CLIENT_ID: ${{ vars.AZURE_CLIENT_ID }} | |
AZURE_TENANT_ID: ${{ vars.AZURE_TENANT_ID }} | |
AZURE_SUBSCRIPTION_ID: ${{ vars.AZURE_SUBSCRIPTION_ID }} | |
AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} | |
GITHUB_ENV_NAME: ${{ github.event.inputs.environment || 'dev'}} | |
steps: | |
- name: Checkout | |
uses: actions/checkout@v3 | |
- name: Install azd | |
uses: Azure/[email protected] | |
- name: Install PAC | |
run: dotnet tool install --global Microsoft.PowerApps.CLI.Tool | |
- name: Log in with azd (Federated Credentials) | |
if: ${{ env.AZURE_CLIENT_ID != '' }} | |
run: | | |
azd auth login ` | |
--client-id "$Env:AZURE_CLIENT_ID" ` | |
--federated-credential-provider "github" ` | |
--tenant-id "$Env:AZURE_TENANT_ID" | |
- name: Setup pac auth | |
run: | | |
pac auth clear | |
pac auth create -u ${{ vars.DATAVERSE_URL }} -id ${{ env.AZURE_CLIENT_ID }} -cs ${{ secrets.DATAVERSE_CLIENT_SECRET }} -t ${{ env.AZURE_TENANT_ID }} | |
- name: "Az CLI login" | |
uses: azure/login@v1 | |
if: ${{ env.AZURE_CLIENT_ID != '' }} | |
with: | |
client-id: ${{ env.AZURE_CLIENT_ID }} | |
tenant-id: ${{ env.AZURE_TENANT_ID }} | |
subscription-id: ${{ env.AZURE_SUBSCRIPTION_ID }} | |
- name: Log in with azd (Client Credentials) | |
if: ${{ env.AZURE_CREDENTIALS != '' }} | |
run: | | |
$info = $Env:AZURE_CREDENTIALS | ConvertFrom-Json -AsHashtable; | |
Write-Host "::add-mask::$($info.clientSecret)" | |
azd auth login ` | |
--client-id "$($info.clientId)" ` | |
--client-secret "$($info.clientSecret)" ` | |
--tenant-id "$($info.tenantId)" | |
env: | |
AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} | |
- name: Provision Infrastructure | |
run: azd provision --no-prompt | |
env: | |
AZURE_ENV_NAME: ${{ vars.AZURE_ENV_NAME }} | |
AZURE_LOCATION: ${{ vars.AZURE_LOCATION }} | |
AZURE_SUBSCRIPTION_ID: ${{ vars.AZURE_SUBSCRIPTION_ID }} | |
SERVICE_ENDPOINT_STORAGE_LOCATIONS: ${{ vars.SERVICE_ENDPOINT_STORAGE_LOCATIONS }} | |
DATAVERSE_URL: ${{ vars.DATAVERSE_URL }} | |
CREATE_PRIVATE_LINK: ${{ vars.CREATE_PRIVATE_LINK || 'true' }} | |
CREATE_VNET: ${{ vars.CREATE_VNET || 'true' }} | |
- name: Deploy Application | |
run: azd deploy --no-prompt | |
env: | |
AZURE_ENV_NAME: ${{ vars.AZURE_ENV_NAME }} | |
AZURE_LOCATION: ${{ vars.AZURE_LOCATION }} | |
AZURE_SUBSCRIPTION_ID: ${{ vars.AZURE_SUBSCRIPTION_ID }} |