If you're using a tenant different to the tenant associated to the subscription, log in to that tenant. You will need to log in the subscription after creating the application to continue the instructions.
az login --tenant $TENANT_ID --allow-no-subscriptions
# Specify the new app name
export CLIENT_APP_NAME=<app name>
# Create the application registration, requesting permission to access the Graph API and to impersonate a user when calling the drone status API
export API_IMPERSONATION_PERMISSION=$(az ad app show --id $API_APP_ID --query "api.oauth2PermissionScopes[0].id" --output tsv)
export SP_RESPONSE=$(az ad app create --display-name $CLIENT_APP_NAME \
--is-fallback-public-client false --identifier-uris "http://$TENANT_DOMAIN/$CLIENT_APP_NAME" \
--required-resource-accesses " [ { \"resourceAppId\": \"$API_APP_ID\", \"resourceAccess\": [ { \"id\": \"$API_IMPERSONATION_PERMISSION\", \"type\": \"Scope\" } ] }, { \"resourceAppId\": \"00000003-0000-0000-c000-000000000000\", \"resourceAccess\": [ { \"id\": \"e1fe6dd8-ba31-4d61-89e7-88639da4683d\", \"type\": \"Scope\" } ] } ] ")
export CLIENT_APP_ID=$(echo $SP_RESPONSE | jq ".appId" -r)
export CLIENT_APP_OBJECT_ID=$(echo $SP_RESPONSE | jq ".id" -r)
# Create a service principal for the registered application
az ad sp create --id $CLIENT_APP_ID
az ad sp update --id $CLIENT_APP_ID --set tags='["WindowsAzureActiveDirectoryIntegratedApp"]'
Log back into your subscription if you've used a different tenant.
az login
az account set --subscription <your-subscription-id>
- Navigate to the Done Status Function App.
- Go to the Authentication section.
- Edit the Microsoft Identity Provider settings.
- Under Client application requirements, select "Allow requests from specific client applications".
- Add the $CLIENT_APP_ID to the list of allowed client applications.
- Under Tenant requirement, select "Allow requests from specific tenants".
- Add the $TENANT_ID to the list of allowed tenants.
- Save your changes.
export STORAGE_ACCOUNT_NAME=<storage account name>
# Create the storage account
az storage account create --name $STORAGE_ACCOUNT_NAME --resource-group $RESOURCEGROUP --location $LOCATION --kind StorageV2 --allow-shared-key-access false
# Enable static web site support for the storage account
az storage blob service-properties update --account-name $STORAGE_ACCOUNT_NAME --static-website --404-document 404.html --index-document index.html --auth-mode login
# Retrieve the static website endpoint
export WEB_SITE_URL=$(az storage account show --name $STORAGE_ACCOUNT_NAME --resource-group $RESOURCEGROUP --query primaryEndpoints.web --output tsv)
export WEB_SITE_HOST=$(echo $WEB_SITE_URL | sed -rn 's#.+//([^/]+)/?#\1#p')
See Static website hosting in Azure Storage for details.
export CDN_NAME=<cdn name>
# Create the CDN profile and endpoint
az cdn profile create --resource-group $RESOURCEGROUP --name $CDN_NAME --sku Standard_Microsoft
export CDN_ENDPOINT_HOST=$(az cdn endpoint create --location $LOCATION --resource-group $RESOURCEGROUP --profile-name $CDN_NAME --name $CDN_NAME \
--no-http --origin $WEB_SITE_HOST --origin-host-header $WEB_SITE_HOST \
--query hostName --output tsv)
# Configure custom caching rules
az cdn endpoint rule add \
-g $RESOURCEGROUP \
--profile-name $CDN_NAME \
-n $CDN_NAME --order 1 --rule-name "CacheExpiration" \
--match-variable UrlFileExtension --operator EndsWith --match-values ["js","css","map"] \
--action-name "CacheExpiration" --transform Lowercase \
--cache-behavior "Override" --cache-duration "366.00:00:00"
export CLIENT_URL="https://$CDN_ENDPOINT_HOST"
export GITHUB_USER=<github-username>
# the following repository must be created in GitHub beforehand under your repositories
export NEW_REMOTE_URL=https://github.com/${GITHUB_USER}/serverless-reference-implementation.git
git clone https://github.com/mspnp/serverless-reference-implementation.git && \
cd serverless-reference-implementation && \
git remote add newremote $NEW_REMOTE_URL && \
git push newremote master
Note: alternatively you could fork this repo and then clone.
The GitHub Action integration uses OpenID Connect (OIDC) with an Azure service principal using a Federated Identity Credential
-
Install GitHub CLI.
Then you will need to login via the GitHib CLIgh auth login
-
Create a Microsoft Entra application and service principal then assign a role on your subscription to your application so that your workflow has access to your subscription.
GH_ACTION_FEDERATED_IDENTITY=$(az ad app create --display-name ghActionFederatedIdentity) GH_ACTION_FEDERATED_IDENTITY_APP_ID=$(echo $GH_ACTION_FEDERATED_IDENTITY | jq -r '.appId') GH_ACTION_FEDERATED_IDENTITY_OBJECT_ID=$(echo $GH_ACTION_FEDERATED_IDENTITY | jq -r '.id') GH_ACTION_FEDERATED_IDENTITY_SP=$(az ad sp create --id $GH_ACTION_FEDERATED_IDENTITY_APP_ID) GH_ACTION_FEDERATED_IDENTITY_SP_OBJECT_ID=$(echo $GH_ACTION_FEDERATED_IDENTITY_SP | jq -r '.id')
Set environment information
AZURE_SUBSCRIPTION_ID=$(az account show --query 'id' -o tsv) AZURE_RESOURCEGROUP_RESOURCE_ID=$(az group show --name ${RESOURCEGROUP} --query id -o tsv)
Create a new role assignment
# Assign built-in Contributor RBAC role for creating resource groups and performing deployments at the resource group level az role assignment create --role contributor --subscription $AZURE_SUBSCRIPTION_ID --assignee-object-id $GH_ACTION_FEDERATED_IDENTITY_SP_OBJECT_ID --assignee-principal-type ServicePrincipal --scope $AZURE_RESOURCEGROUP_RESOURCE_ID # Assign built-in Contributor RBAC role for adding files to the Blob container az role assignment create --assignee $GH_ACTION_FEDERATED_IDENTITY_SP_OBJECT_ID --role "Storage Blob Data Contributor" --scope $(az storage account show --name $STORAGE_ACCOUNT_NAME --resource-group $RESOURCEGROUP --query id --output tsv)
-
Add federated credentials
First, the ./github-workflow/credential.json file needs to be customized with the repository owner.
sed -i "s/<repo_owner>/${GITHUB_USER}/g" ../.github/workflows/credential.json
Then, the federated credential needs to be created.
az ad app federated-credential create --id $GH_ACTION_FEDERATED_IDENTITY_OBJECT_ID --parameters ../.github/workflows/credential.json
-
Create secrets for AZURE_CLIENT_ID, AZURE_TENANT_ID, and AZURE_SUBSCRIPTION_ID.
Use these values from your Microsoft Entra application for your GitHub secrets:export TENANT_ID_GHACTION=$(az account show --query tenantId --output tsv) gh secret set AZURE_CLIENT_ID -b"${GH_ACTION_FEDERATED_IDENTITY_APP_ID}" --repo $GITHUB_USER/serverless-reference-implementation gh secret set AZURE_TENANT_ID -b"${TENANT_ID_GHACTION}" --repo $GITHUB_USER/serverless-reference-implementation gh secret set AZURE_SUBSCRIPTION_ID -b"${AZURE_SUBSCRIPTION_ID}" --repo $GITHUB_USER/serverless-reference-implementation
export APIM_GATEWAY_URL=$(az deployment group show \
--resource-group ${RESOURCEGROUP} \
--name azuredeploy-apim \
--query properties.outputs.apimGatewayURL.value \
--output tsv)
export ACESS_TOKEN_SCOPE=${IDENTIFIER_URI}/Status.Read
gh workflow run deploy-clientapp.yaml --ref main -f azureTenantId=$TENANT_ID -f clientAppId=$CLIENT_APP_ID -f apiAppId=$API_APP_ID -f accessTokenScope=$ACESS_TOKEN_SCOPE -f apiURL=$APIM_GATEWAY_URL -f azureStorageAccountName=$STORAGE_ACCOUNT_NAME -f azureCdnName=$CDN_NAME -f resourceGroupName=$RESOURCEGROUP -f githubBranch=main
# monitor until stages are completed
gh run list -L 1
# Get Id and execute
gh run view <yourId>
# This command will include at the end a command with an id to see more details, it will look like
# To see the full job log, try: gh run view --log --job=8644697022
# and you could get good information running that: gh run view --log --job=8644697022
Wait until the GitHub Action is complete
az cdn endpoint update \
-g $RESOURCEGROUP \
--profile-name $CDN_NAME \
-n $CDN_NAME \
--probe-path "/semver.txt"
If you're using a tenant different to the tenant associated to the subscription, log in to that tenant. You will need to log in the subscription after creating the application to continue the instructions.
az login --tenant $TENANT_ID --allow-no-subscriptions
az rest --method PATCH --uri 'https://graph.microsoft.com/v1.0/applications/'$CLIENT_APP_OBJECT_ID --headers 'Content-Type=application/json' --body '{"spa":{"redirectUris":["'$CLIENT_URL'"]},web:{implicitGrantSettings:{enableAccessTokenIssuance:true}}}'
Log back into your subscription if you've used a different tenant.
az login
az account set --subscription <your-subscription-id>
The first time you use the client application you need to consent to the delegated permissions specified for the application, unless an administrator granted consent for all users in the directory.
See Types of permissions and consent for details.