diff --git a/.azuredevops/modulePipelines/ms.aad.domainservices.yml b/.azuredevops/modulePipelines/ms.aad.domainservices.yml index 6fc8ccdee0..f08e32f1ac 100644 --- a/.azuredevops/modulePipelines/ms.aad.domainservices.yml +++ b/.azuredevops/modulePipelines/ms.aad.domainservices.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.AAD/DomainServices' diff --git a/.azuredevops/modulePipelines/ms.analysisservices.servers.yml b/.azuredevops/modulePipelines/ms.analysisservices.servers.yml index 0ccc219757..6d5e5dc944 100644 --- a/.azuredevops/modulePipelines/ms.analysisservices.servers.yml +++ b/.azuredevops/modulePipelines/ms.analysisservices.servers.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.AnalysisServices/servers' diff --git a/.azuredevops/modulePipelines/ms.apimanagement.service.yml b/.azuredevops/modulePipelines/ms.apimanagement.service.yml index e7fd2cecde..894163fe64 100644 --- a/.azuredevops/modulePipelines/ms.apimanagement.service.yml +++ b/.azuredevops/modulePipelines/ms.apimanagement.service.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.ApiManagement/service' diff --git a/.azuredevops/modulePipelines/ms.appconfiguration.configurationstores.yml b/.azuredevops/modulePipelines/ms.appconfiguration.configurationstores.yml index 635ce4c910..77f822aec3 100644 --- a/.azuredevops/modulePipelines/ms.appconfiguration.configurationstores.yml +++ b/.azuredevops/modulePipelines/ms.appconfiguration.configurationstores.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.AppConfiguration/configurationStores' diff --git a/.azuredevops/modulePipelines/ms.authorization.locks.yml b/.azuredevops/modulePipelines/ms.authorization.locks.yml index 9d3d5b7220..e777ca3d09 100644 --- a/.azuredevops/modulePipelines/ms.authorization.locks.yml +++ b/.azuredevops/modulePipelines/ms.authorization.locks.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Authorization/locks' diff --git a/.azuredevops/modulePipelines/ms.authorization.policyassignments.yml b/.azuredevops/modulePipelines/ms.authorization.policyassignments.yml index 3487c1033d..08193e5b3a 100644 --- a/.azuredevops/modulePipelines/ms.authorization.policyassignments.yml +++ b/.azuredevops/modulePipelines/ms.authorization.policyassignments.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Authorization/policyAssignments' diff --git a/.azuredevops/modulePipelines/ms.authorization.policydefinitions.yml b/.azuredevops/modulePipelines/ms.authorization.policydefinitions.yml index fd137d74c8..cefd988794 100644 --- a/.azuredevops/modulePipelines/ms.authorization.policydefinitions.yml +++ b/.azuredevops/modulePipelines/ms.authorization.policydefinitions.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Authorization/policyDefinitions' diff --git a/.azuredevops/modulePipelines/ms.authorization.policyexemptions.yml b/.azuredevops/modulePipelines/ms.authorization.policyexemptions.yml index 2187ebc311..b6c2daf94a 100644 --- a/.azuredevops/modulePipelines/ms.authorization.policyexemptions.yml +++ b/.azuredevops/modulePipelines/ms.authorization.policyexemptions.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Authorization/policyExemptions' diff --git a/.azuredevops/modulePipelines/ms.authorization.policysetdefinitions.yml b/.azuredevops/modulePipelines/ms.authorization.policysetdefinitions.yml index 4b3d0293ed..ad5d987672 100644 --- a/.azuredevops/modulePipelines/ms.authorization.policysetdefinitions.yml +++ b/.azuredevops/modulePipelines/ms.authorization.policysetdefinitions.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Authorization/policySetDefinitions' diff --git a/.azuredevops/modulePipelines/ms.authorization.roleassignments.yml b/.azuredevops/modulePipelines/ms.authorization.roleassignments.yml index 78b12bb4e9..cd1144f862 100644 --- a/.azuredevops/modulePipelines/ms.authorization.roleassignments.yml +++ b/.azuredevops/modulePipelines/ms.authorization.roleassignments.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Authorization/roleAssignments' diff --git a/.azuredevops/modulePipelines/ms.authorization.roledefinitions.yml b/.azuredevops/modulePipelines/ms.authorization.roledefinitions.yml index b26536801e..30b0f155d9 100644 --- a/.azuredevops/modulePipelines/ms.authorization.roledefinitions.yml +++ b/.azuredevops/modulePipelines/ms.authorization.roledefinitions.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Authorization/roleDefinitions' diff --git a/.azuredevops/modulePipelines/ms.automation.automationaccounts.yml b/.azuredevops/modulePipelines/ms.automation.automationaccounts.yml index 1b4da0ac80..663c2ce39d 100644 --- a/.azuredevops/modulePipelines/ms.automation.automationaccounts.yml +++ b/.azuredevops/modulePipelines/ms.automation.automationaccounts.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Automation/automationAccounts' diff --git a/.azuredevops/modulePipelines/ms.batch.batchaccounts.yml b/.azuredevops/modulePipelines/ms.batch.batchaccounts.yml index 891bfe3a23..7af1587c98 100644 --- a/.azuredevops/modulePipelines/ms.batch.batchaccounts.yml +++ b/.azuredevops/modulePipelines/ms.batch.batchaccounts.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Batch/batchAccounts' diff --git a/.azuredevops/modulePipelines/ms.cache.redis.yml b/.azuredevops/modulePipelines/ms.cache.redis.yml index 6437563cc8..b5cacf039f 100644 --- a/.azuredevops/modulePipelines/ms.cache.redis.yml +++ b/.azuredevops/modulePipelines/ms.cache.redis.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Cache/redis' diff --git a/.azuredevops/modulePipelines/ms.cognitiveservices.accounts.yml b/.azuredevops/modulePipelines/ms.cognitiveservices.accounts.yml index 80761d10bc..9b12c66fed 100644 --- a/.azuredevops/modulePipelines/ms.cognitiveservices.accounts.yml +++ b/.azuredevops/modulePipelines/ms.cognitiveservices.accounts.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.CognitiveServices/accounts' diff --git a/.azuredevops/modulePipelines/ms.compute.availabilitysets.yml b/.azuredevops/modulePipelines/ms.compute.availabilitysets.yml index c48c996745..32e3abefdf 100644 --- a/.azuredevops/modulePipelines/ms.compute.availabilitysets.yml +++ b/.azuredevops/modulePipelines/ms.compute.availabilitysets.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Compute/availabilitySets' diff --git a/.azuredevops/modulePipelines/ms.compute.diskencryptionsets.yml b/.azuredevops/modulePipelines/ms.compute.diskencryptionsets.yml index b96ac899fc..dd6e8a6a71 100644 --- a/.azuredevops/modulePipelines/ms.compute.diskencryptionsets.yml +++ b/.azuredevops/modulePipelines/ms.compute.diskencryptionsets.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Compute/diskEncryptionSets' diff --git a/.azuredevops/modulePipelines/ms.compute.disks.yml b/.azuredevops/modulePipelines/ms.compute.disks.yml index b41778f2ff..c77f0595bf 100644 --- a/.azuredevops/modulePipelines/ms.compute.disks.yml +++ b/.azuredevops/modulePipelines/ms.compute.disks.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Compute/disks' diff --git a/.azuredevops/modulePipelines/ms.compute.galleries.yml b/.azuredevops/modulePipelines/ms.compute.galleries.yml index 308a10a7ef..b7213c4349 100644 --- a/.azuredevops/modulePipelines/ms.compute.galleries.yml +++ b/.azuredevops/modulePipelines/ms.compute.galleries.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Compute/galleries' diff --git a/.azuredevops/modulePipelines/ms.compute.images.yml b/.azuredevops/modulePipelines/ms.compute.images.yml index b66e0d6646..ae8e816a57 100644 --- a/.azuredevops/modulePipelines/ms.compute.images.yml +++ b/.azuredevops/modulePipelines/ms.compute.images.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Compute/images' diff --git a/.azuredevops/modulePipelines/ms.compute.proximityplacementgroups.yml b/.azuredevops/modulePipelines/ms.compute.proximityplacementgroups.yml index f82b342807..bd351f6d74 100644 --- a/.azuredevops/modulePipelines/ms.compute.proximityplacementgroups.yml +++ b/.azuredevops/modulePipelines/ms.compute.proximityplacementgroups.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Compute/proximityPlacementGroups' diff --git a/.azuredevops/modulePipelines/ms.compute.virtualmachines.yml b/.azuredevops/modulePipelines/ms.compute.virtualmachines.yml index f9e7e15524..6defd20ea1 100644 --- a/.azuredevops/modulePipelines/ms.compute.virtualmachines.yml +++ b/.azuredevops/modulePipelines/ms.compute.virtualmachines.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Compute/virtualMachines' diff --git a/.azuredevops/modulePipelines/ms.compute.virtualmachinescalesets.yml b/.azuredevops/modulePipelines/ms.compute.virtualmachinescalesets.yml index 03f0b92596..c9f4a0e44b 100644 --- a/.azuredevops/modulePipelines/ms.compute.virtualmachinescalesets.yml +++ b/.azuredevops/modulePipelines/ms.compute.virtualmachinescalesets.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Compute/virtualMachineScaleSets' diff --git a/.azuredevops/modulePipelines/ms.consumption.budgets.yml b/.azuredevops/modulePipelines/ms.consumption.budgets.yml index 633a44bc13..a776b93fff 100644 --- a/.azuredevops/modulePipelines/ms.consumption.budgets.yml +++ b/.azuredevops/modulePipelines/ms.consumption.budgets.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Consumption/budgets' diff --git a/.azuredevops/modulePipelines/ms.containerinstance.containergroups.yml b/.azuredevops/modulePipelines/ms.containerinstance.containergroups.yml index a08229d1a0..0a2a0d78f2 100644 --- a/.azuredevops/modulePipelines/ms.containerinstance.containergroups.yml +++ b/.azuredevops/modulePipelines/ms.containerinstance.containergroups.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.ContainerInstance/containerGroups' diff --git a/.azuredevops/modulePipelines/ms.containerregistry.registries.yml b/.azuredevops/modulePipelines/ms.containerregistry.registries.yml index 5c5b02b9ed..ff6edfe972 100644 --- a/.azuredevops/modulePipelines/ms.containerregistry.registries.yml +++ b/.azuredevops/modulePipelines/ms.containerregistry.registries.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.ContainerRegistry/registries' diff --git a/.azuredevops/modulePipelines/ms.containerservice.managedclusters.yml b/.azuredevops/modulePipelines/ms.containerservice.managedclusters.yml index 2287e799a0..a5f2f13721 100644 --- a/.azuredevops/modulePipelines/ms.containerservice.managedclusters.yml +++ b/.azuredevops/modulePipelines/ms.containerservice.managedclusters.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.ContainerService/managedClusters' diff --git a/.azuredevops/modulePipelines/ms.databricks.workspaces.yml b/.azuredevops/modulePipelines/ms.databricks.workspaces.yml index b8906e32d3..addf220e37 100644 --- a/.azuredevops/modulePipelines/ms.databricks.workspaces.yml +++ b/.azuredevops/modulePipelines/ms.databricks.workspaces.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Databricks/workspaces' diff --git a/.azuredevops/modulePipelines/ms.datafactory.factories.yml b/.azuredevops/modulePipelines/ms.datafactory.factories.yml index 25c240a739..73ea5faa9f 100644 --- a/.azuredevops/modulePipelines/ms.datafactory.factories.yml +++ b/.azuredevops/modulePipelines/ms.datafactory.factories.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.DataFactory/factories' diff --git a/.azuredevops/modulePipelines/ms.dataprotection.backupvaults.yml b/.azuredevops/modulePipelines/ms.dataprotection.backupvaults.yml index 081badfc69..64c4479310 100644 --- a/.azuredevops/modulePipelines/ms.dataprotection.backupvaults.yml +++ b/.azuredevops/modulePipelines/ms.dataprotection.backupvaults.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.DataProtection/backupVaults' diff --git a/.azuredevops/modulePipelines/ms.desktopvirtualization.applicationgroups.yml b/.azuredevops/modulePipelines/ms.desktopvirtualization.applicationgroups.yml index 882a7252db..3015a89b61 100644 --- a/.azuredevops/modulePipelines/ms.desktopvirtualization.applicationgroups.yml +++ b/.azuredevops/modulePipelines/ms.desktopvirtualization.applicationgroups.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.DesktopVirtualization/applicationgroups' diff --git a/.azuredevops/modulePipelines/ms.desktopvirtualization.hostpools.yml b/.azuredevops/modulePipelines/ms.desktopvirtualization.hostpools.yml index dbbb65913f..554a8aac44 100644 --- a/.azuredevops/modulePipelines/ms.desktopvirtualization.hostpools.yml +++ b/.azuredevops/modulePipelines/ms.desktopvirtualization.hostpools.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.DesktopVirtualization/hostpools' diff --git a/.azuredevops/modulePipelines/ms.desktopvirtualization.scalingplans.yml b/.azuredevops/modulePipelines/ms.desktopvirtualization.scalingplans.yml index 609fbcb3b3..243e4020d9 100644 --- a/.azuredevops/modulePipelines/ms.desktopvirtualization.scalingplans.yml +++ b/.azuredevops/modulePipelines/ms.desktopvirtualization.scalingplans.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.DesktopVirtualization/scalingplans' diff --git a/.azuredevops/modulePipelines/ms.desktopvirtualization.workspaces.yml b/.azuredevops/modulePipelines/ms.desktopvirtualization.workspaces.yml index f71d6f2e9a..52c94c19b5 100644 --- a/.azuredevops/modulePipelines/ms.desktopvirtualization.workspaces.yml +++ b/.azuredevops/modulePipelines/ms.desktopvirtualization.workspaces.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.DesktopVirtualization/workspaces' diff --git a/.azuredevops/modulePipelines/ms.documentdb.databaseaccounts.yml b/.azuredevops/modulePipelines/ms.documentdb.databaseaccounts.yml index 48003c38dd..b273c7a1e3 100644 --- a/.azuredevops/modulePipelines/ms.documentdb.databaseaccounts.yml +++ b/.azuredevops/modulePipelines/ms.documentdb.databaseaccounts.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.DocumentDB/databaseAccounts' diff --git a/.azuredevops/modulePipelines/ms.eventgrid.systemtopics.yml b/.azuredevops/modulePipelines/ms.eventgrid.systemtopics.yml index cda2137308..d4c379b3dc 100644 --- a/.azuredevops/modulePipelines/ms.eventgrid.systemtopics.yml +++ b/.azuredevops/modulePipelines/ms.eventgrid.systemtopics.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.EventGrid/systemTopics' diff --git a/.azuredevops/modulePipelines/ms.eventgrid.topics.yml b/.azuredevops/modulePipelines/ms.eventgrid.topics.yml index 7bea81ca5d..3a40a70fa8 100644 --- a/.azuredevops/modulePipelines/ms.eventgrid.topics.yml +++ b/.azuredevops/modulePipelines/ms.eventgrid.topics.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.EventGrid/topics' diff --git a/.azuredevops/modulePipelines/ms.eventhub.namespaces.yml b/.azuredevops/modulePipelines/ms.eventhub.namespaces.yml index f249d03bd1..887c109ef1 100644 --- a/.azuredevops/modulePipelines/ms.eventhub.namespaces.yml +++ b/.azuredevops/modulePipelines/ms.eventhub.namespaces.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.EventHub/namespaces' diff --git a/.azuredevops/modulePipelines/ms.healthbot.healthbots.yml b/.azuredevops/modulePipelines/ms.healthbot.healthbots.yml index 07043ef06e..acd1e08630 100644 --- a/.azuredevops/modulePipelines/ms.healthbot.healthbots.yml +++ b/.azuredevops/modulePipelines/ms.healthbot.healthbots.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.HealthBot/healthBots' diff --git a/.azuredevops/modulePipelines/ms.insights.actiongroups.yml b/.azuredevops/modulePipelines/ms.insights.actiongroups.yml index 5de4b8ad9e..d04079fdf0 100644 --- a/.azuredevops/modulePipelines/ms.insights.actiongroups.yml +++ b/.azuredevops/modulePipelines/ms.insights.actiongroups.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Insights/actionGroups' diff --git a/.azuredevops/modulePipelines/ms.insights.activitylogalerts.yml b/.azuredevops/modulePipelines/ms.insights.activitylogalerts.yml index 44747c7226..f6aca87387 100644 --- a/.azuredevops/modulePipelines/ms.insights.activitylogalerts.yml +++ b/.azuredevops/modulePipelines/ms.insights.activitylogalerts.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Insights/activityLogAlerts' diff --git a/.azuredevops/modulePipelines/ms.insights.components.yml b/.azuredevops/modulePipelines/ms.insights.components.yml index 35319946c1..03ce67402b 100644 --- a/.azuredevops/modulePipelines/ms.insights.components.yml +++ b/.azuredevops/modulePipelines/ms.insights.components.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Insights/components' diff --git a/.azuredevops/modulePipelines/ms.insights.diagnosticsettings.yml b/.azuredevops/modulePipelines/ms.insights.diagnosticsettings.yml index 0e33edeece..313bcb73d5 100644 --- a/.azuredevops/modulePipelines/ms.insights.diagnosticsettings.yml +++ b/.azuredevops/modulePipelines/ms.insights.diagnosticsettings.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Insights/diagnosticSettings' diff --git a/.azuredevops/modulePipelines/ms.insights.metricalerts.yml b/.azuredevops/modulePipelines/ms.insights.metricalerts.yml index ab7e782f53..708f87d56a 100644 --- a/.azuredevops/modulePipelines/ms.insights.metricalerts.yml +++ b/.azuredevops/modulePipelines/ms.insights.metricalerts.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Insights/metricAlerts' diff --git a/.azuredevops/modulePipelines/ms.insights.privatelinkscopes.yml b/.azuredevops/modulePipelines/ms.insights.privatelinkscopes.yml index feb6e6a8d5..af597a8e69 100644 --- a/.azuredevops/modulePipelines/ms.insights.privatelinkscopes.yml +++ b/.azuredevops/modulePipelines/ms.insights.privatelinkscopes.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Insights/privateLinkScopes' diff --git a/.azuredevops/modulePipelines/ms.insights.scheduledqueryrules.yml b/.azuredevops/modulePipelines/ms.insights.scheduledqueryrules.yml index 23ec070c42..d807f5080e 100644 --- a/.azuredevops/modulePipelines/ms.insights.scheduledqueryrules.yml +++ b/.azuredevops/modulePipelines/ms.insights.scheduledqueryrules.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Insights/scheduledQueryRules' diff --git a/.azuredevops/modulePipelines/ms.keyvault.vaults.yml b/.azuredevops/modulePipelines/ms.keyvault.vaults.yml index 7e0f0aa48e..d0bd85483c 100644 --- a/.azuredevops/modulePipelines/ms.keyvault.vaults.yml +++ b/.azuredevops/modulePipelines/ms.keyvault.vaults.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.KeyVault/vaults' diff --git a/.azuredevops/modulePipelines/ms.kubernetesconfiguration.extensions.yml b/.azuredevops/modulePipelines/ms.kubernetesconfiguration.extensions.yml index 3a7c2f5aeb..4a41865cce 100644 --- a/.azuredevops/modulePipelines/ms.kubernetesconfiguration.extensions.yml +++ b/.azuredevops/modulePipelines/ms.kubernetesconfiguration.extensions.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.KubernetesConfiguration/extensions' diff --git a/.azuredevops/modulePipelines/ms.kubernetesconfiguration.fluxconfigurations.yml b/.azuredevops/modulePipelines/ms.kubernetesconfiguration.fluxconfigurations.yml index bee10b2782..245185b5a5 100644 --- a/.azuredevops/modulePipelines/ms.kubernetesconfiguration.fluxconfigurations.yml +++ b/.azuredevops/modulePipelines/ms.kubernetesconfiguration.fluxconfigurations.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.KubernetesConfiguration/fluxConfigurations' diff --git a/.azuredevops/modulePipelines/ms.logic.workflows.yml b/.azuredevops/modulePipelines/ms.logic.workflows.yml index 376bdadfa4..0186d76afc 100644 --- a/.azuredevops/modulePipelines/ms.logic.workflows.yml +++ b/.azuredevops/modulePipelines/ms.logic.workflows.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Logic/workflows' diff --git a/.azuredevops/modulePipelines/ms.machinelearningservices.workspaces.yml b/.azuredevops/modulePipelines/ms.machinelearningservices.workspaces.yml index f68a3a3ee5..6e99ccc773 100644 --- a/.azuredevops/modulePipelines/ms.machinelearningservices.workspaces.yml +++ b/.azuredevops/modulePipelines/ms.machinelearningservices.workspaces.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.MachineLearningServices/workspaces' diff --git a/.azuredevops/modulePipelines/ms.managedidentity.userassignedidentities.yml b/.azuredevops/modulePipelines/ms.managedidentity.userassignedidentities.yml index 46f88afd42..4786df1779 100644 --- a/.azuredevops/modulePipelines/ms.managedidentity.userassignedidentities.yml +++ b/.azuredevops/modulePipelines/ms.managedidentity.userassignedidentities.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.ManagedIdentity/userAssignedIdentities' diff --git a/.azuredevops/modulePipelines/ms.managedservices.registrationdefinitions.yml b/.azuredevops/modulePipelines/ms.managedservices.registrationdefinitions.yml index 554b737336..ad0742634d 100644 --- a/.azuredevops/modulePipelines/ms.managedservices.registrationdefinitions.yml +++ b/.azuredevops/modulePipelines/ms.managedservices.registrationdefinitions.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.ManagedServices/registrationDefinitions' diff --git a/.azuredevops/modulePipelines/ms.management.managementgroups.yml b/.azuredevops/modulePipelines/ms.management.managementgroups.yml index 4ba1bb4068..ff8a25fdf8 100644 --- a/.azuredevops/modulePipelines/ms.management.managementgroups.yml +++ b/.azuredevops/modulePipelines/ms.management.managementgroups.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Management/managementGroups' diff --git a/.azuredevops/modulePipelines/ms.netapp.netappaccounts.yml b/.azuredevops/modulePipelines/ms.netapp.netappaccounts.yml index 0e5389def4..8fafefa848 100644 --- a/.azuredevops/modulePipelines/ms.netapp.netappaccounts.yml +++ b/.azuredevops/modulePipelines/ms.netapp.netappaccounts.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.NetApp/netAppAccounts' diff --git a/.azuredevops/modulePipelines/ms.network.applicationgateways.yml b/.azuredevops/modulePipelines/ms.network.applicationgateways.yml index 93166ef4e1..ad2fb6115b 100644 --- a/.azuredevops/modulePipelines/ms.network.applicationgateways.yml +++ b/.azuredevops/modulePipelines/ms.network.applicationgateways.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Network/applicationGateways' diff --git a/.azuredevops/modulePipelines/ms.network.applicationsecuritygroups.yml b/.azuredevops/modulePipelines/ms.network.applicationsecuritygroups.yml index d1a7c37c94..c67b2799fb 100644 --- a/.azuredevops/modulePipelines/ms.network.applicationsecuritygroups.yml +++ b/.azuredevops/modulePipelines/ms.network.applicationsecuritygroups.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Network/applicationSecurityGroups' diff --git a/.azuredevops/modulePipelines/ms.network.azurefirewalls.yml b/.azuredevops/modulePipelines/ms.network.azurefirewalls.yml index 69b81d4f55..696ab36d5b 100644 --- a/.azuredevops/modulePipelines/ms.network.azurefirewalls.yml +++ b/.azuredevops/modulePipelines/ms.network.azurefirewalls.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Network/azureFirewalls' diff --git a/.azuredevops/modulePipelines/ms.network.bastionhosts.yml b/.azuredevops/modulePipelines/ms.network.bastionhosts.yml index ad93228cea..adf627ee53 100644 --- a/.azuredevops/modulePipelines/ms.network.bastionhosts.yml +++ b/.azuredevops/modulePipelines/ms.network.bastionhosts.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Network/bastionHosts' diff --git a/.azuredevops/modulePipelines/ms.network.connections.yml b/.azuredevops/modulePipelines/ms.network.connections.yml index 98b285daf4..838352c8de 100644 --- a/.azuredevops/modulePipelines/ms.network.connections.yml +++ b/.azuredevops/modulePipelines/ms.network.connections.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Network/connections' diff --git a/.azuredevops/modulePipelines/ms.network.ddosprotectionplans.yml b/.azuredevops/modulePipelines/ms.network.ddosprotectionplans.yml index 8c0dcfe1ce..f3867a8ce6 100644 --- a/.azuredevops/modulePipelines/ms.network.ddosprotectionplans.yml +++ b/.azuredevops/modulePipelines/ms.network.ddosprotectionplans.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Network/ddosProtectionPlans' diff --git a/.azuredevops/modulePipelines/ms.network.expressroutecircuits.yml b/.azuredevops/modulePipelines/ms.network.expressroutecircuits.yml index 1cd0d42474..f2b7577cd8 100644 --- a/.azuredevops/modulePipelines/ms.network.expressroutecircuits.yml +++ b/.azuredevops/modulePipelines/ms.network.expressroutecircuits.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Network/expressRouteCircuits' diff --git a/.azuredevops/modulePipelines/ms.network.firewallpolicies.yml b/.azuredevops/modulePipelines/ms.network.firewallpolicies.yml index ca506220c0..6c0ac083db 100644 --- a/.azuredevops/modulePipelines/ms.network.firewallpolicies.yml +++ b/.azuredevops/modulePipelines/ms.network.firewallpolicies.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Network/firewallPolicies' diff --git a/.azuredevops/modulePipelines/ms.network.frontdoors.yml b/.azuredevops/modulePipelines/ms.network.frontdoors.yml index c175bfc03b..5c13d99e0c 100644 --- a/.azuredevops/modulePipelines/ms.network.frontdoors.yml +++ b/.azuredevops/modulePipelines/ms.network.frontdoors.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Network/frontDoors' diff --git a/.azuredevops/modulePipelines/ms.network.ipgroups.yml b/.azuredevops/modulePipelines/ms.network.ipgroups.yml index 9838a500c2..08b10ac123 100644 --- a/.azuredevops/modulePipelines/ms.network.ipgroups.yml +++ b/.azuredevops/modulePipelines/ms.network.ipgroups.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Network/ipGroups' diff --git a/.azuredevops/modulePipelines/ms.network.loadbalancers.yml b/.azuredevops/modulePipelines/ms.network.loadbalancers.yml index f1629a9390..48010157c8 100644 --- a/.azuredevops/modulePipelines/ms.network.loadbalancers.yml +++ b/.azuredevops/modulePipelines/ms.network.loadbalancers.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Network/loadBalancers' diff --git a/.azuredevops/modulePipelines/ms.network.localnetworkgateways.yml b/.azuredevops/modulePipelines/ms.network.localnetworkgateways.yml index ce54223cef..10abe167da 100644 --- a/.azuredevops/modulePipelines/ms.network.localnetworkgateways.yml +++ b/.azuredevops/modulePipelines/ms.network.localnetworkgateways.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Network/localNetworkGateways' diff --git a/.azuredevops/modulePipelines/ms.network.natgateways.yml b/.azuredevops/modulePipelines/ms.network.natgateways.yml index dc86474537..ae9c6bf12d 100644 --- a/.azuredevops/modulePipelines/ms.network.natgateways.yml +++ b/.azuredevops/modulePipelines/ms.network.natgateways.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Network/natGateways' diff --git a/.azuredevops/modulePipelines/ms.network.networkinterfaces.yml b/.azuredevops/modulePipelines/ms.network.networkinterfaces.yml index e22ee92ed8..a92492abb0 100644 --- a/.azuredevops/modulePipelines/ms.network.networkinterfaces.yml +++ b/.azuredevops/modulePipelines/ms.network.networkinterfaces.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Network/networkInterfaces' diff --git a/.azuredevops/modulePipelines/ms.network.networksecuritygroups.yml b/.azuredevops/modulePipelines/ms.network.networksecuritygroups.yml index e3bb54830f..2831ca481d 100644 --- a/.azuredevops/modulePipelines/ms.network.networksecuritygroups.yml +++ b/.azuredevops/modulePipelines/ms.network.networksecuritygroups.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Network/networkSecurityGroups' diff --git a/.azuredevops/modulePipelines/ms.network.networkwatchers.yml b/.azuredevops/modulePipelines/ms.network.networkwatchers.yml index 0b8e7d28b3..bcefb379c3 100644 --- a/.azuredevops/modulePipelines/ms.network.networkwatchers.yml +++ b/.azuredevops/modulePipelines/ms.network.networkwatchers.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Network/networkWatchers' diff --git a/.azuredevops/modulePipelines/ms.network.privatednszones.yml b/.azuredevops/modulePipelines/ms.network.privatednszones.yml index c508dcb0d5..bf0eac95ad 100644 --- a/.azuredevops/modulePipelines/ms.network.privatednszones.yml +++ b/.azuredevops/modulePipelines/ms.network.privatednszones.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Network/privateDnsZones' diff --git a/.azuredevops/modulePipelines/ms.network.privateendpoints.yml b/.azuredevops/modulePipelines/ms.network.privateendpoints.yml index be2577b896..789bea5a76 100644 --- a/.azuredevops/modulePipelines/ms.network.privateendpoints.yml +++ b/.azuredevops/modulePipelines/ms.network.privateendpoints.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Network/privateEndpoints' diff --git a/.azuredevops/modulePipelines/ms.network.publicipaddresses.yml b/.azuredevops/modulePipelines/ms.network.publicipaddresses.yml index a7ed81d617..45314893af 100644 --- a/.azuredevops/modulePipelines/ms.network.publicipaddresses.yml +++ b/.azuredevops/modulePipelines/ms.network.publicipaddresses.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Network/publicIPAddresses' diff --git a/.azuredevops/modulePipelines/ms.network.publicipprefixes.yml b/.azuredevops/modulePipelines/ms.network.publicipprefixes.yml index 7459ec1c54..9d23a1e84a 100644 --- a/.azuredevops/modulePipelines/ms.network.publicipprefixes.yml +++ b/.azuredevops/modulePipelines/ms.network.publicipprefixes.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Network/publicIPPrefixes' diff --git a/.azuredevops/modulePipelines/ms.network.routetables.yml b/.azuredevops/modulePipelines/ms.network.routetables.yml index 1dc1cd6379..ac459ec110 100644 --- a/.azuredevops/modulePipelines/ms.network.routetables.yml +++ b/.azuredevops/modulePipelines/ms.network.routetables.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Network/routeTables' diff --git a/.azuredevops/modulePipelines/ms.network.trafficmanagerprofiles.yml b/.azuredevops/modulePipelines/ms.network.trafficmanagerprofiles.yml index 051fc9b60b..854f128957 100644 --- a/.azuredevops/modulePipelines/ms.network.trafficmanagerprofiles.yml +++ b/.azuredevops/modulePipelines/ms.network.trafficmanagerprofiles.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Network/trafficmanagerprofiles' diff --git a/.azuredevops/modulePipelines/ms.network.virtualhubs.yml b/.azuredevops/modulePipelines/ms.network.virtualhubs.yml index 394535e640..8759fc8cd5 100644 --- a/.azuredevops/modulePipelines/ms.network.virtualhubs.yml +++ b/.azuredevops/modulePipelines/ms.network.virtualhubs.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Network/virtualHubs' diff --git a/.azuredevops/modulePipelines/ms.network.virtualnetworkgateways.yml b/.azuredevops/modulePipelines/ms.network.virtualnetworkgateways.yml index 4d06fb0556..d43aa2736c 100644 --- a/.azuredevops/modulePipelines/ms.network.virtualnetworkgateways.yml +++ b/.azuredevops/modulePipelines/ms.network.virtualnetworkgateways.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Network/virtualNetworkGateways' diff --git a/.azuredevops/modulePipelines/ms.network.virtualnetworks.yml b/.azuredevops/modulePipelines/ms.network.virtualnetworks.yml index 8d44ed8fd8..13e49cbeec 100644 --- a/.azuredevops/modulePipelines/ms.network.virtualnetworks.yml +++ b/.azuredevops/modulePipelines/ms.network.virtualnetworks.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Network/virtualNetworks' diff --git a/.azuredevops/modulePipelines/ms.network.virtualwans.yml b/.azuredevops/modulePipelines/ms.network.virtualwans.yml index 21f92b97d9..85f633ddf1 100644 --- a/.azuredevops/modulePipelines/ms.network.virtualwans.yml +++ b/.azuredevops/modulePipelines/ms.network.virtualwans.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Network/virtualWans' diff --git a/.azuredevops/modulePipelines/ms.network.vpngateways.yml b/.azuredevops/modulePipelines/ms.network.vpngateways.yml index 0dc281ca48..3e44f1ac6c 100644 --- a/.azuredevops/modulePipelines/ms.network.vpngateways.yml +++ b/.azuredevops/modulePipelines/ms.network.vpngateways.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Network/vpnGateways' diff --git a/.azuredevops/modulePipelines/ms.network.vpnsites.yml b/.azuredevops/modulePipelines/ms.network.vpnsites.yml index 11854bdca3..edc348cf21 100644 --- a/.azuredevops/modulePipelines/ms.network.vpnsites.yml +++ b/.azuredevops/modulePipelines/ms.network.vpnsites.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Network/vpnSites' diff --git a/.azuredevops/modulePipelines/ms.operationalinsights.workspaces.yml b/.azuredevops/modulePipelines/ms.operationalinsights.workspaces.yml index 6a89ebcddc..4b3f32ea81 100644 --- a/.azuredevops/modulePipelines/ms.operationalinsights.workspaces.yml +++ b/.azuredevops/modulePipelines/ms.operationalinsights.workspaces.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.OperationalInsights/workspaces' diff --git a/.azuredevops/modulePipelines/ms.operationsmanagement.solutions.yml b/.azuredevops/modulePipelines/ms.operationsmanagement.solutions.yml index e5627159bb..ab03457bca 100644 --- a/.azuredevops/modulePipelines/ms.operationsmanagement.solutions.yml +++ b/.azuredevops/modulePipelines/ms.operationsmanagement.solutions.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.OperationsManagement/solutions' diff --git a/.azuredevops/modulePipelines/ms.recoveryservices.vaults.yml b/.azuredevops/modulePipelines/ms.recoveryservices.vaults.yml index 931902c7ac..b8ebd28f86 100644 --- a/.azuredevops/modulePipelines/ms.recoveryservices.vaults.yml +++ b/.azuredevops/modulePipelines/ms.recoveryservices.vaults.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.RecoveryServices/vaults' diff --git a/.azuredevops/modulePipelines/ms.resources.deploymentscripts.yml b/.azuredevops/modulePipelines/ms.resources.deploymentscripts.yml index bc4013082e..abf8533470 100644 --- a/.azuredevops/modulePipelines/ms.resources.deploymentscripts.yml +++ b/.azuredevops/modulePipelines/ms.resources.deploymentscripts.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Resources/deploymentScripts' diff --git a/.azuredevops/modulePipelines/ms.resources.resourcegroups.yml b/.azuredevops/modulePipelines/ms.resources.resourcegroups.yml index b125531c64..fad7974434 100644 --- a/.azuredevops/modulePipelines/ms.resources.resourcegroups.yml +++ b/.azuredevops/modulePipelines/ms.resources.resourcegroups.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Resources/resourceGroups' diff --git a/.azuredevops/modulePipelines/ms.resources.tags.yml b/.azuredevops/modulePipelines/ms.resources.tags.yml index 2e1181b772..41641f7ee3 100644 --- a/.azuredevops/modulePipelines/ms.resources.tags.yml +++ b/.azuredevops/modulePipelines/ms.resources.tags.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Resources/tags' diff --git a/.azuredevops/modulePipelines/ms.security.azuresecuritycenter.yml b/.azuredevops/modulePipelines/ms.security.azuresecuritycenter.yml index 7ef4c5cfe3..47c57db8f0 100644 --- a/.azuredevops/modulePipelines/ms.security.azuresecuritycenter.yml +++ b/.azuredevops/modulePipelines/ms.security.azuresecuritycenter.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Security/azureSecurityCenter' diff --git a/.azuredevops/modulePipelines/ms.servicebus.namespaces.yml b/.azuredevops/modulePipelines/ms.servicebus.namespaces.yml index e9f333f146..564a8133d5 100644 --- a/.azuredevops/modulePipelines/ms.servicebus.namespaces.yml +++ b/.azuredevops/modulePipelines/ms.servicebus.namespaces.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.ServiceBus/namespaces' diff --git a/.azuredevops/modulePipelines/ms.servicefabric.clusters.yml b/.azuredevops/modulePipelines/ms.servicefabric.clusters.yml index 74c199916c..8ba4a654d6 100644 --- a/.azuredevops/modulePipelines/ms.servicefabric.clusters.yml +++ b/.azuredevops/modulePipelines/ms.servicefabric.clusters.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.ServiceFabric/clusters' diff --git a/.azuredevops/modulePipelines/ms.signalrservice.webpubsub.yml b/.azuredevops/modulePipelines/ms.signalrservice.webpubsub.yml index 2ba0b201f1..1d0a1cba6f 100644 --- a/.azuredevops/modulePipelines/ms.signalrservice.webpubsub.yml +++ b/.azuredevops/modulePipelines/ms.signalrservice.webpubsub.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.SignalRService/webPubSub' diff --git a/.azuredevops/modulePipelines/ms.sql.managedinstances.yml b/.azuredevops/modulePipelines/ms.sql.managedinstances.yml index 964066946e..61552ee82f 100644 --- a/.azuredevops/modulePipelines/ms.sql.managedinstances.yml +++ b/.azuredevops/modulePipelines/ms.sql.managedinstances.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Sql/managedInstances' diff --git a/.azuredevops/modulePipelines/ms.sql.servers.yml b/.azuredevops/modulePipelines/ms.sql.servers.yml index 452f013e44..1c3c4447b5 100644 --- a/.azuredevops/modulePipelines/ms.sql.servers.yml +++ b/.azuredevops/modulePipelines/ms.sql.servers.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Sql/servers' diff --git a/.azuredevops/modulePipelines/ms.storage.storageaccounts.yml b/.azuredevops/modulePipelines/ms.storage.storageaccounts.yml index eb36b76e61..4851344f95 100644 --- a/.azuredevops/modulePipelines/ms.storage.storageaccounts.yml +++ b/.azuredevops/modulePipelines/ms.storage.storageaccounts.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Storage/storageAccounts' diff --git a/.azuredevops/modulePipelines/ms.synapse.privatelinkhubs.yml b/.azuredevops/modulePipelines/ms.synapse.privatelinkhubs.yml index 4541b2085d..ad74af481a 100644 --- a/.azuredevops/modulePipelines/ms.synapse.privatelinkhubs.yml +++ b/.azuredevops/modulePipelines/ms.synapse.privatelinkhubs.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Synapse/privateLinkHubs' diff --git a/.azuredevops/modulePipelines/ms.synapse.workspaces.yml b/.azuredevops/modulePipelines/ms.synapse.workspaces.yml index 0f54cd80f7..2868ab338a 100644 --- a/.azuredevops/modulePipelines/ms.synapse.workspaces.yml +++ b/.azuredevops/modulePipelines/ms.synapse.workspaces.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Synapse/workspaces' diff --git a/.azuredevops/modulePipelines/ms.virtualmachineimages.imagetemplates.yml b/.azuredevops/modulePipelines/ms.virtualmachineimages.imagetemplates.yml index c46b80a192..230c0fb553 100644 --- a/.azuredevops/modulePipelines/ms.virtualmachineimages.imagetemplates.yml +++ b/.azuredevops/modulePipelines/ms.virtualmachineimages.imagetemplates.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.VirtualMachineImages/imageTemplates' diff --git a/.azuredevops/modulePipelines/ms.web.connections.yml b/.azuredevops/modulePipelines/ms.web.connections.yml index dabe963b9f..52a1aacbc6 100644 --- a/.azuredevops/modulePipelines/ms.web.connections.yml +++ b/.azuredevops/modulePipelines/ms.web.connections.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Web/connections' diff --git a/.azuredevops/modulePipelines/ms.web.hostingenvironments.yml b/.azuredevops/modulePipelines/ms.web.hostingenvironments.yml index 1cdca627e5..778e24099d 100644 --- a/.azuredevops/modulePipelines/ms.web.hostingenvironments.yml +++ b/.azuredevops/modulePipelines/ms.web.hostingenvironments.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Web/hostingEnvironments' diff --git a/.azuredevops/modulePipelines/ms.web.serverfarms.yml b/.azuredevops/modulePipelines/ms.web.serverfarms.yml index 08af684f19..6104be01e3 100644 --- a/.azuredevops/modulePipelines/ms.web.serverfarms.yml +++ b/.azuredevops/modulePipelines/ms.web.serverfarms.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Web/serverfarms' diff --git a/.azuredevops/modulePipelines/ms.web.sites.yml b/.azuredevops/modulePipelines/ms.web.sites.yml index 3173c9232b..26278d7bbf 100644 --- a/.azuredevops/modulePipelines/ms.web.sites.yml +++ b/.azuredevops/modulePipelines/ms.web.sites.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Web/sites' diff --git a/.azuredevops/modulePipelines/ms.web.staticsites.yml b/.azuredevops/modulePipelines/ms.web.staticsites.yml index cdd1580529..9f9294b298 100644 --- a/.azuredevops/modulePipelines/ms.web.staticsites.yml +++ b/.azuredevops/modulePipelines/ms.web.staticsites.yml @@ -28,7 +28,7 @@ trigger: - '/**/*.md' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: modulePath value: '/modules/Microsoft.Web/staticSites' diff --git a/.azuredevops/pipelineTemplates/jobs.dependenciesModuleDeployment.yml b/.azuredevops/pipelineTemplates/jobs.dependenciesModuleDeployment.yml index 708e3f6eb5..bb7ad964d5 100644 --- a/.azuredevops/pipelineTemplates/jobs.dependenciesModuleDeployment.yml +++ b/.azuredevops/pipelineTemplates/jobs.dependenciesModuleDeployment.yml @@ -112,9 +112,6 @@ jobs: # Load used functions . (Join-Path '$(System.DefaultWorkingDirectory)' 'utilities' 'pipelines' 'tokensReplacement' 'Convert-TokensInFileList.ps1') - # Load Settings File - $Settings = Get-Content -Path (Join-Path '$(System.DefaultWorkingDirectory)' 'settings.json') | ConvertFrom-Json -AsHashTable - # Get target files $targetFileList = @('${{ deploymentBlock.templateFilePath }}') if(-not [String]::IsNullOrEmpty('${{ deploymentBlock.path }}')) { @@ -131,11 +128,11 @@ jobs: $ConvertTokensInputs = @{ FilePathList = $targetFileList Tokens = @{} - TokenPrefix = $Settings.parameterFileTokens.tokenPrefix - TokenSuffix = $Settings.parameterFileTokens.tokenSuffix + TokenPrefix = '$(tokenPrefix)' + TokenSuffix = '$(tokenSuffix)' } - # Add defaults + # Add enforced tokens $ConvertTokensInputs.Tokens += @{ resourceGroupName = '${{ parameters.resourceGroupName }}' subscriptionId = '${{ parameters.subscriptionId }}' @@ -144,14 +141,18 @@ jobs: deploymentSpId = $servicePrincipalObjectId } - # Add local tokens - if ($Settings.parameterFileTokens.localTokens) { - $tokenMap = @{} - foreach ($token in $Settings.parameterFileTokens.localTokens) { - $tokenMap += @{ $token.name = $token.value } - } - Write-Verbose ('Using local tokens [{0}]' -f ($tokenMap.Keys -join ', ')) -Verbose - $ConvertTokensInputs.Tokens += $tokenMap + # Add local (source control) tokens + $tokenMap = @{} + foreach ($token in (Get-ChildItem env: | Where-Object -Property Name -Like "localToken_*")) { + $tokenMap += @{ $token.Name.Replace('localToken_','','OrdinalIgnoreCase') = $token.value } + } + Write-Verbose ('Using local tokens [{0}]' -f ($tokenMap.Keys -join ', ')) -Verbose + $ConvertTokensInputs.Tokens += $tokenMap + + # Swap 'namePrefix' token if empty and provided as a Azure DevOps variable + if([String]::IsNullOrEmpty($ConvertTokensInputs.Tokens['namePrefix'])){ + Write-Verbose 'Using [namePrefix] token from Azure DevOps Variable Groups' -Verbose + $ConvertTokensInputs.Tokens['namePrefix'] = "$(TOKEN_NAMEPREFIX)" } # Add custom tokens (passed in via the pipeline) @@ -161,6 +162,8 @@ jobs: $ConvertTokensInputs.Tokens += $customTokens } + Write-Verbose "Convert Tokens Input:`n $($ConvertTokensInputs | ConvertTo-Json -Depth 10)" -Verbose + # Invoke Token Replacement Functionality $null = Convert-TokensInFileList @ConvertTokensInputs @@ -194,10 +197,9 @@ jobs: $functionInput['parameterFilePath'] = Join-Path '$(System.DefaultWorkingDirectory)' '${{ deploymentBlock.path }}' } - $projectSettings = Get-Content -Path 'settings.json' | ConvertFrom-Json - if (-not [String]::IsNullOrEmpty($projectSettings.enableDefaultTelemetry) -and (Get-Content -Path $functionInput.templateFilePath -Raw) -like '*param enableDefaultTelemetry*') { + if (-not [System.Convert]::ToBoolean('$(enableDefaultTelemetry)') -and (Get-Content -Path $functionInput.templateFilePath -Raw) -like '*param enableDefaultTelemetry*') { $functionInput['additionalParameters'] += @{ - enableDefaultTelemetry = $projectSettings.enableDefaultTelemetry + enableDefaultTelemetry = [System.Convert]::ToBoolean('$(enableDefaultTelemetry)') } } @@ -238,10 +240,9 @@ jobs: $functionInput['parameterFilePath'] = Join-Path '$(System.DefaultWorkingDirectory)' '${{ deploymentBlock.path }}' } - $projectSettings = Get-Content -Path 'settings.json' | ConvertFrom-Json - if (-not [String]::IsNullOrEmpty($projectSettings.enableDefaultTelemetry) -and (Get-Content -Path $functionInput.templateFilePath -Raw) -like '*param enableDefaultTelemetry*') { + if (-not [System.Convert]::ToBoolean('$(enableDefaultTelemetry)') -and (Get-Content -Path $functionInput.templateFilePath -Raw) -like '*param enableDefaultTelemetry*') { $functionInput['additionalParameters'] += @{ - enableDefaultTelemetry = $projectSettings.enableDefaultTelemetry + enableDefaultTelemetry = [System.Convert]::ToBoolean('$(enableDefaultTelemetry)') } } diff --git a/.azuredevops/pipelineTemplates/jobs.validateModuleDeployment.yml b/.azuredevops/pipelineTemplates/jobs.validateModuleDeployment.yml index 0ce457a224..76a918a220 100644 --- a/.azuredevops/pipelineTemplates/jobs.validateModuleDeployment.yml +++ b/.azuredevops/pipelineTemplates/jobs.validateModuleDeployment.yml @@ -97,7 +97,8 @@ jobs: # Define PS modules to install on the runner $Modules = @( @{ Name = 'Az.Accounts' }, - @{ Name = 'Az.Resources' } + @{ Name = 'Az.Resources' }, + @{ Name = 'powershell-yaml'; Version = '0.4.2'} ) # Additional PS modules need to be installed for the removal step in case it is enabled @@ -129,9 +130,6 @@ jobs: # Load used functions . (Join-Path '$(System.DefaultWorkingDirectory)' 'utilities' 'pipelines' 'tokensReplacement' 'Convert-TokensInFileList.ps1') - # Load Settings File - $Settings = Get-Content -Path (Join-Path '$(System.DefaultWorkingDirectory)' 'settings.json') | ConvertFrom-Json -AsHashTable - # Get Service Principal Object ID $context = Get-AzContext $servicePrincipalAppId = $context.Account.Id @@ -144,13 +142,13 @@ jobs: # Construct Token Function Input $ConvertTokensInputs = @{ - FilePathList = $targetFileList - Tokens = @{} - TokenPrefix = $Settings.parameterFileTokens.tokenPrefix - TokenSuffix = $Settings.parameterFileTokens.tokenSuffix + FilePathList = $targetFileList + Tokens = @{} + TokenPrefix = '$(tokenPrefix)' + TokenSuffix = '$(tokenSuffix)' } - # Add defaults + # Add enforced tokens $ConvertTokensInputs.Tokens += @{ resourceGroupName = '${{ parameters.resourceGroupName }}' subscriptionId = '${{ parameters.subscriptionId }}' @@ -159,14 +157,18 @@ jobs: deploymentSpId = $servicePrincipalObjectId } - # Add local tokens - if ($Settings.parameterFileTokens.localTokens) { - $tokenMap = @{} - foreach ($token in $Settings.parameterFileTokens.localTokens) { - $tokenMap += @{ $token.name = $token.value } - } - Write-Verbose ('Using local tokens [{0}]' -f ($tokenMap.Keys -join ', ')) -Verbose - $ConvertTokensInputs.Tokens += $tokenMap + # Add local (source control) tokens + $tokenMap = @{} + foreach ($token in (Get-ChildItem env: | Where-Object -Property Name -Like "localToken_*")) { + $tokenMap += @{ $token.Name.Replace('localToken_','','OrdinalIgnoreCase') = $token.value } + } + Write-Verbose ('Using local tokens [{0}]' -f ($tokenMap.Keys -join ', ')) -Verbose + $ConvertTokensInputs.Tokens += $tokenMap + + # Swap 'namePrefix' token if empty and provided as a Azure DevOps variable + if([String]::IsNullOrEmpty($ConvertTokensInputs.Tokens['namePrefix'])){ + Write-Verbose 'Using [namePrefix] token from Azure DevOps Variable Groups' -Verbose + $ConvertTokensInputs.Tokens['namePrefix'] = "$(TOKEN_NAMEPREFIX)" } # Add custom tokens (passed in via the pipeline) @@ -176,6 +178,8 @@ jobs: $ConvertTokensInputs.Tokens += $customTokens } + Write-Verbose "Convert Tokens Input:`n $($ConvertTokensInputs | ConvertTo-Json -Depth 10)" -Verbose + # Invoke Token Replacement Functionality $null = Convert-TokensInFileList @ConvertTokensInputs @@ -193,10 +197,6 @@ jobs: # Load used functions . (Join-Path '$(System.DefaultWorkingDirectory)' '$(pipelineFunctionsPath)' 'resourceDeployment' 'Test-TemplateDeployment.ps1') - # Prepare general parameters - # -------------------------- - $projectSettings = Get-Content -Path 'settings.json' | ConvertFrom-Json - # Fetching parameters $location = '${{ parameters.location }}' $resourceGroupName = '${{ parameters.resourceGroupName }}' @@ -230,9 +230,9 @@ jobs: # Handle additional parameters # ---------------------------- - if (-not [String]::IsNullOrEmpty($projectSettings.enableDefaultTelemetry) -and ($moduleTemplatePossibleParameters.Keys -contains 'enableDefaultTelemetry')) { + if (-not [System.Convert]::ToBoolean('$(enableDefaultTelemetry)') -and ($moduleTemplatePossibleParameters.Keys -contains 'enableDefaultTelemetry')) { $functionInput['additionalParameters'] += @{ - enableDefaultTelemetry = $projectSettings.enableDefaultTelemetry + enableDefaultTelemetry = [System.Convert]::ToBoolean('$(enableDefaultTelemetry)') } } @@ -256,10 +256,6 @@ jobs: # Load used functions . (Join-Path '$(System.DefaultWorkingDirectory)' '$(pipelineFunctionsPath)' 'resourceDeployment' 'New-TemplateDeployment.ps1') - # Prepare general parameters - # -------------------------- - $projectSettings = Get-Content -Path 'settings.json' | ConvertFrom-Json - $location = '${{ parameters.location }}' $resourceGroupName = '${{ parameters.resourceGroupName }}' $subscriptionId = '${{ parameters.subscriptionId }}' @@ -293,9 +289,9 @@ jobs: # Handle additional parameters # ---------------------------- - if (-not [String]::IsNullOrEmpty($projectSettings.enableDefaultTelemetry) -and ($moduleTemplatePossibleParameters.Keys -contains 'enableDefaultTelemetry')) { + if (-not [System.Convert]::ToBoolean('$(enableDefaultTelemetry)') -and ($moduleTemplatePossibleParameters.Keys -contains 'enableDefaultTelemetry')) { $functionInput['additionalParameters'] += @{ - enableDefaultTelemetry = $projectSettings.enableDefaultTelemetry + enableDefaultTelemetry = [System.Convert]::ToBoolean('$(enableDefaultTelemetry)') } } diff --git a/.azuredevops/pipelineTemplates/jobs.validateModulePester.yml b/.azuredevops/pipelineTemplates/jobs.validateModulePester.yml index 4ff61b5e91..74a485a7b5 100644 --- a/.azuredevops/pipelineTemplates/jobs.validateModulePester.yml +++ b/.azuredevops/pipelineTemplates/jobs.validateModulePester.yml @@ -122,6 +122,7 @@ jobs: # This is the latest tested Pester version. Uncomment the next line in case of a future breaking change in the default version installed on the runner. # @{ Name = 'Pester'; Version = '5.3.1' } @{ Name = 'Az.Resources' } + @{ Name = 'powershell-yaml'; Version = '0.4.2'} ) # Set agent up @@ -158,18 +159,26 @@ jobs: Write-Verbose "- [($moduleFolderPath]" -Verbose } - # Set enforced token list - $enforcedTokenList = @{ - deploymentSpId = $servicePrincipalObjectId + # Construct Token Configuration Input + $GlobalVariablesObject = Get-Content -Path (Join-Path '$(System.DefaultWorkingDirectory)' 'settings.yml') | ConvertFrom-Yaml | Select-Object -ExpandProperty variables + $tokenConfiguration = @{ + Tokens = @{} + TokenPrefix = $GlobalVariablesObject | Select-Object -ExpandProperty tokenPrefix + TokenSuffix = $GlobalVariablesObject | Select-Object -ExpandProperty tokenSuffix } + + # Set token configuration and enforced tokens list if (-not [String]::IsNullOrEmpty('${{ parameters.subscriptionId }}')) { - $enforcedTokenList['subscriptionId'] = '${{ parameters.subscriptionId }}' + $tokenConfiguration.Tokens['subscriptionId'] = '${{ parameters.subscriptionId }}' } if (-not [String]::IsNullOrEmpty('${{ parameters.managementGroupId }}')) { - $enforcedTokenList['managementGroupId'] = '${{ parameters.managementGroupId }}' + $tokenConfiguration.Tokens['managementGroupId'] = '${{ parameters.managementGroupId }}' + } + if (-not [String]::IsNullOrEmpty('$(DEPLOYMENT_SP_ID)')) { + $tokenConfiguration.Tokens['deploymentSpId'] = $servicePrincipalObjectId } if (-not [String]::IsNullOrEmpty('$(ARM_TENANT_ID)')) { - $enforcedTokenList['tenantId'] = '$(ARM_TENANT_ID)' + $tokenConfiguration.Tokens['tenantId'] = '$(ARM_TENANT_ID)' } # Set and print test output path @@ -186,10 +195,9 @@ jobs: # --------------------- # Invoke-Pester -Configuration @{ Run = @{ - Container = New-PesterContainer -Path (Join-Path $repoRootPath $moduleTestFilePath) -Data @{ - repoRootPath = $repoRootPath - moduleFolderPaths = $moduleFolderPaths - enforcedTokenList = $enforcedTokenList + Container = New-PesterContainer -Path (Join-Path $repoRootPath $moduleTestFilePath) -Data @{ + moduleFolderPaths = $moduleFolderPaths + tokenConfiguration = $tokenConfiguration } } TestResult = @{ diff --git a/.azuredevops/platformPipelines/platform.dependencies.yml b/.azuredevops/platformPipelines/platform.dependencies.yml index a2f31892db..73d24d6e9a 100644 --- a/.azuredevops/platformPipelines/platform.dependencies.yml +++ b/.azuredevops/platformPipelines/platform.dependencies.yml @@ -25,7 +25,7 @@ trigger: none # - 'utilities/pipelines/dependencies/**' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - group: 'PLATFORM_VARIABLES' - name: dependencyPath value: 'utilities/pipelines/dependencies' @@ -275,22 +275,26 @@ stages: $parameterFilePath = Join-Path '$(Build.SourcesDirectory)' '$(dependencyPath)' '$(resourceType)' 'parameters' 'parameters.json' $parameterFilePaths = @($parameterFilePath) - # Replace tokens in parameter file - $Settings = Get-Content -Path (Join-Path '$(Build.SourcesDirectory)' 'settings.json') | ConvertFrom-Json -AsHashTable + # Construct Token Function Input $ConvertTokensInputs = @{ FilePathList = $parameterFilePaths - TokenPrefix = $Settings.parameterFileTokens.tokenPrefix - TokenSuffix = $Settings.parameterFileTokens.tokenSuffix + Tokens = @{} + TokenPrefix = '$(tokenPrefix)' + TokenSuffix = '$(tokenSuffix)' } - # Add local tokens - if ($Settings.parameterFileTokens.localTokens) { - $tokenMap = @{} - foreach ($token in $Settings.parameterFileTokens.localTokens) { - $tokenMap += @{ $token.name = $token.value } - } - Write-Verbose ('Using local tokens [{0}]' -f ($tokenMap.Keys -join ', ')) -Verbose - $ConvertTokensInputs.Tokens = $tokenMap + # Add local (source control) tokens + $tokenMap = @{} + foreach ($token in (Get-ChildItem env: | Where-Object -Property Name -Like "localToken_*")) { + $tokenMap += @{ $token.Name.Replace('localToken_','','OrdinalIgnoreCase') = $token.value } + } + Write-Verbose ('Using local tokens [{0}]' -f ($tokenMap.Keys -join ', ')) -Verbose + $ConvertTokensInputs.Tokens += $tokenMap + + # Swap 'namePrefix' token if empty and provided as a Azure DevOps variable + if([String]::IsNullOrEmpty($ConvertTokensInputs.Tokens['namePrefix'])){ + Write-Verbose 'Using [namePrefix] token from Azure DevOps Variable Groups' -Verbose + $ConvertTokensInputs.Tokens['namePrefix'] = "$(TOKEN_NAMEPREFIX)" } $null = Convert-TokensInFileList @ConvertTokensInputs @@ -590,20 +594,26 @@ stages: $noprParameterFilePath = Join-Path '$(Build.SourcesDirectory)' '$(dependencyPath)' '$(resourceType)' 'parameters' 'nopr.parameters.json' $parameterFilePaths = @($parameterFilePath, $noprParameterFilePath) - # Replace tokens in parameter file - $Settings = Get-Content -Path (Join-Path '$(Build.SourcesDirectory)' 'settings.json') | ConvertFrom-Json -AsHashTable + # Construct Token Function Input $ConvertTokensInputs = @{ FilePathList = $parameterFilePaths - TokenPrefix = $Settings.parameterFileTokens.tokenPrefix - TokenSuffix = $Settings.parameterFileTokens.tokenSuffix + Tokens = @{} + TokenPrefix = '$(tokenPrefix)' + TokenSuffix = '$(tokenSuffix)' } - if ($Settings.parameterFileTokens.localTokens) { - $tokenMap = @{} - foreach ($token in $Settings.parameterFileTokens.localTokens) { - $tokenMap += @{ $token.name = $token.value } - } - Write-Verbose ('Using local tokens [{0}]' -f ($tokenMap.Keys -join ', ')) -Verbose - $ConvertTokensInputs.Tokens = $tokenMap + + # Add local (source control) tokens + $tokenMap = @{} + foreach ($token in (Get-ChildItem env: | Where-Object -Property Name -Like "localToken_*")) { + $tokenMap += @{ $token.Name.Replace('localToken_','','OrdinalIgnoreCase') = $token.value } + } + Write-Verbose ('Using local tokens [{0}]' -f ($tokenMap.Keys -join ', ')) -Verbose + $ConvertTokensInputs.Tokens += $tokenMap + + # Swap 'namePrefix' token if empty and provided as a Azure DevOps variable + if([String]::IsNullOrEmpty($ConvertTokensInputs.Tokens['namePrefix'])){ + Write-Verbose 'Using [namePrefix] token from Azure DevOps Variable Groups' -Verbose + $ConvertTokensInputs.Tokens['namePrefix'] = "$(TOKEN_NAMEPREFIX)" } $null = Convert-TokensInFileList @ConvertTokensInputs @@ -622,10 +632,11 @@ stages: $vpnSharedKeyString = (New-Guid).Guid.SubString(0, 32) $vpnSharedKey = ConvertTo-SecureString -String $vpnSharedKeyString -AsPlainText -Force - $namePrefixToken = $Settings.parameterFileTokens.localTokens | Where-Object { $_.name -eq 'namePrefix' } + $namePrefixToken = $ConvertTokensInputs.Tokens['namePrefix'] + $certInputObject = @{ - Subject = 'CN=*.{0}.onmicrosoft.com' -f $namePrefixToken.value - DnsName = '*.{0}.onmicrosoft.com' -f $namePrefixToken.value + Subject = 'CN=*.{0}.onmicrosoft.com' -f $namePrefixToken + DnsName = '*.{0}.onmicrosoft.com' -f $namePrefixToken CertStoreLocation = 'cert:\LocalMachine\My' KeyExportPolicy = 'Exportable' Provider = 'Microsoft Enhanced RSA and AES Cryptographic Provider' @@ -722,21 +733,28 @@ stages: $parameterFilePath = Join-Path '$(Build.SourcesDirectory)' '$(dependencyPath)' '$(resourceType)' 'parameters' 'sqlmi.parameters.json' $parameterFilePaths = @($parameterFilePath) - # Replace tokens in parameter file - $Settings = Get-Content -Path (Join-Path '$(Build.SourcesDirectory)' 'settings.json') | ConvertFrom-Json -AsHashTable + # Construct Token Function Input $ConvertTokensInputs = @{ FilePathList = $parameterFilePath - TokenPrefix = $Settings.parameterFileTokens.tokenPrefix - TokenSuffix = $Settings.parameterFileTokens.tokenSuffix + Tokens = @{} + TokenPrefix = '$(tokenPrefix)' + TokenSuffix = '$(tokenSuffix)' } - if ($Settings.parameterFileTokens.localTokens) { - $tokenMap = @{} - foreach ($token in $Settings.parameterFileTokens.localTokens) { - $tokenMap += @{ $token.name = $token.value } - } - Write-Verbose ('Using local tokens [{0}]' -f ($tokenMap.Keys -join ', ')) -Verbose - $ConvertTokensInputs.Tokens = $tokenMap + + # Add local (source control) tokens + $tokenMap = @{} + foreach ($token in (Get-ChildItem env: | Where-Object -Property Name -Like "localToken_*")) { + $tokenMap += @{ $token.Name.Replace('localToken_','','OrdinalIgnoreCase') = $token.value } } + Write-Verbose ('Using local tokens [{0}]' -f ($tokenMap.Keys -join ', ')) -Verbose + $ConvertTokensInputs.Tokens += $tokenMap + + # Swap 'namePrefix' token if empty and provided as a Azure DevOps variable + if([String]::IsNullOrEmpty($ConvertTokensInputs.Tokens['namePrefix'])){ + Write-Verbose 'Using [namePrefix] token from Azure DevOps Variable Groups' -Verbose + $ConvertTokensInputs.Tokens['namePrefix'] = "$(TOKEN_NAMEPREFIX)" + } + $null = Convert-TokensInFileList @ConvertTokensInputs # Get key vault name diff --git a/.azuredevops/platformPipelines/platform.updateReadMe.yml b/.azuredevops/platformPipelines/platform.updateReadMe.yml index a858f0d353..50da9cdbad 100644 --- a/.azuredevops/platformPipelines/platform.updateReadMe.yml +++ b/.azuredevops/platformPipelines/platform.updateReadMe.yml @@ -14,7 +14,7 @@ trigger: - 'utilities/tools/platform/**' variables: - - template: '../../global.variables.yml' + - template: '../../settings.yml' - name: pipelinePrincipalGitUserName value: 'CARMLPipelinePrincipal' - name: pipelinePrincipalGitUserEmail diff --git a/.azuredevops/platformPipelines/platform.wiki-sync.yml b/.azuredevops/platformPipelines/platform.wiki-sync.yml index 0d9809af6f..abf22c1d2f 100644 --- a/.azuredevops/platformPipelines/platform.wiki-sync.yml +++ b/.azuredevops/platformPipelines/platform.wiki-sync.yml @@ -16,7 +16,7 @@ trigger: variables: - group: 'PLATFORM_VARIABLES' - - template: '../../global.variables.yml' + - template: '../../settings.yml' - name: pipelinePrincipalGitUserName value: 'CARMLPipelinePrincipal' - name: pipelinePrincipalGitUserEmail diff --git a/.github/actions/templates/setEnvironmentVariables/action.yml b/.github/actions/templates/setEnvironmentVariables/action.yml index ee49e32e82..208b58e390 100644 --- a/.github/actions/templates/setEnvironmentVariables/action.yml +++ b/.github/actions/templates/setEnvironmentVariables/action.yml @@ -16,7 +16,7 @@ ## |==================================================================================================================================================================| ## | Parameter | Required | Default | Description | Example | ## |--------------------|----------|---------|------------------------------------------------------------------------------------------|-----------------------------| -## | variablesPath | true | '' | The path to the YAML file that contains the key value pairs for environment variables | './global.variables.yml' | +## | variablesPath | true | '' | The path to the YAML file that contains the key value pairs for environment variables | './settings.yml' | ## |==================================================================================================================================================================| ## ##---------------------------------------------## diff --git a/.github/actions/templates/validateModuleDeployment/action.yml b/.github/actions/templates/validateModuleDeployment/action.yml index 226244febb..715c98cfcc 100644 --- a/.github/actions/templates/validateModuleDeployment/action.yml +++ b/.github/actions/templates/validateModuleDeployment/action.yml @@ -102,6 +102,7 @@ runs: @{ Name = 'Az.Monitor' }, @{ Name = 'Az.OperationalInsights' }, @{ Name = 'Az.RecoveryServices' } + @{ Name = 'powershell-yaml'; Version = '0.4.2'} ) } @@ -129,9 +130,6 @@ runs: # Load used functions . (Join-Path $env:GITHUB_WORKSPACE 'utilities' 'pipelines' 'tokensReplacement' 'Convert-TokensInFileList.ps1') - # Load Settings File - $Settings = Get-Content -Path "settings.json" | ConvertFrom-Json -AsHashTable - # Get target files $targetFileList = @('${{ inputs.templateFilePath }}') if(-not [String]::IsNullOrEmpty('${{ inputs.parameterFilePath }}')) { @@ -148,11 +146,11 @@ runs: $ConvertTokensInputs = @{ FilePathList = $targetFileList Tokens = @{} - TokenPrefix = $Settings.parameterFileTokens.tokenPrefix - TokenSuffix = $Settings.parameterFileTokens.tokenSuffix + TokenPrefix = '${{ env.tokenPrefix }}' + TokenSuffix = '${{ env.tokenSuffix }}' } - # Add defaults + # Add enforced tokens $ConvertTokensInputs.Tokens += @{ resourceGroupName = '${{ inputs.resourceGroupName }}' subscriptionId = '${{ inputs.subscriptionId }}' @@ -161,14 +159,18 @@ runs: deploymentSpId = $servicePrincipalObjectId } - # Add local tokens - if ($Settings.parameterFileTokens.localTokens) { - $tokenMap = @{} - foreach ($token in $Settings.parameterFileTokens.localTokens) { - $tokenMap += @{ $token.name = $token.value } - } - Write-Verbose ('Using local tokens [{0}]' -f ($tokenMap.Keys -join ', ')) -Verbose - $ConvertTokensInputs.Tokens += $tokenMap + # Add local (source control) tokens + $tokenMap = @{} + foreach ($token in (Get-ChildItem env: | Where-Object -Property Name -Like "localToken_*")) { + $tokenMap += @{ $token.Name.Replace('localToken_','','OrdinalIgnoreCase') = $token.value } + } + Write-Verbose ('Using local tokens [{0}]' -f ($tokenMap.Keys -join ', ')) -Verbose + $ConvertTokensInputs.Tokens += $tokenMap + + # Swap 'namePrefix' token if empty and provided as a GitHub secret + if([String]::IsNullOrEmpty($ConvertTokensInputs.Tokens['namePrefix'])){ + Write-Verbose 'Using [namePrefix] token from GitHub' -Verbose + $ConvertTokensInputs.Tokens['namePrefix'] = '${{ env.TOKEN_NAMEPREFIX }}' } # Add custom tokens (passed in via the pipeline) @@ -178,6 +180,8 @@ runs: $ConvertTokensInputs.Tokens += $customTokens } + Write-Verbose "Convert Tokens Input:`n $($ConvertTokensInputs | ConvertTo-Json -Depth 10)" -Verbose + # Invoke Token Replacement Functionality $null = Convert-TokensInFileList @ConvertTokensInputs @@ -212,10 +216,9 @@ runs: $functionInput['parameterFilePath'] = Join-Path $env:GITHUB_WORKSPACE '${{ inputs.parameterFilePath }}' } - $projectSettings = Get-Content -Path 'settings.json' | ConvertFrom-Json - if (-not [String]::IsNullOrEmpty($projectSettings.enableDefaultTelemetry) -and (Get-Content -Path $functionInput.templateFilePath -Raw) -like '*param enableDefaultTelemetry*') { + if (-not [System.Convert]::ToBoolean('${{ env.enableDefaultTelemetry }}') -and (Get-Content -Path $functionInput.templateFilePath -Raw) -like '*param enableDefaultTelemetry*') { $functionInput['additionalParameters'] += @{ - enableDefaultTelemetry = $projectSettings.enableDefaultTelemetry + enableDefaultTelemetry = [System.Convert]::ToBoolean('${{ env.enableDefaultTelemetry }}') } } @@ -257,10 +260,9 @@ runs: $functionInput['parameterFilePath'] = Join-Path $env:GITHUB_WORKSPACE '${{ inputs.parameterFilePath }}' } - $projectSettings = Get-Content -Path 'settings.json' | ConvertFrom-Json - if (-not [String]::IsNullOrEmpty($projectSettings.enableDefaultTelemetry) -and (Get-Content -Path $functionInput.templateFilePath -Raw) -like '*param enableDefaultTelemetry*') { + if (-not [System.Convert]::ToBoolean('${{ env.enableDefaultTelemetry }}') -and (Get-Content -Path $functionInput.templateFilePath -Raw) -like '*param enableDefaultTelemetry*') { $functionInput['additionalParameters'] += @{ - enableDefaultTelemetry = $projectSettings.enableDefaultTelemetry + enableDefaultTelemetry = [System.Convert]::ToBoolean('${{ env.enableDefaultTelemetry }}') } } diff --git a/.github/actions/templates/validateModulePester/action.yml b/.github/actions/templates/validateModulePester/action.yml index d5ac9ddfe4..d0c908bb26 100644 --- a/.github/actions/templates/validateModulePester/action.yml +++ b/.github/actions/templates/validateModulePester/action.yml @@ -49,6 +49,7 @@ runs: # This is the latest tested Pester version. Uncomment the next line in case of a future breaking change in the default version installed on the runner. # @{ Name = 'Pester'; Version = '5.3.1' } @{ Name = 'Az.Resources' } + @{ Name = 'powershell-yaml'; Version = '0.4.2'} ) # Set agent up @@ -90,18 +91,25 @@ runs: Write-Verbose "- [($moduleFolderPath]" -Verbose } - # Set enforced token list - $enforcedTokenList = @{ - deploymentSpId = $servicePrincipalObjectId + # Construct Token Configuration Input and enforced tokens list + $GlobalVariablesObject = Get-Content -Path 'settings.yml' | ConvertFrom-Yaml | Select-Object -ExpandProperty variables + $tokenConfiguration = @{ + Tokens = @{} + TokenPrefix = $GlobalVariablesObject | Select-Object -ExpandProperty tokenPrefix + TokenSuffix = $GlobalVariablesObject | Select-Object -ExpandProperty tokenSuffix } + if (-not [String]::IsNullOrEmpty('${{ env.ARM_SUBSCRIPTION_ID }}')) { - $enforcedTokenList['subscriptionId'] = '${{ env.ARM_SUBSCRIPTION_ID }}' + $tokenConfiguration.Tokens['subscriptionId'] = '${{ env.ARM_SUBSCRIPTION_ID }}' } if (-not [String]::IsNullOrEmpty('${{ env.ARM_MGMTGROUP_ID }}')) { - $enforcedTokenList['managementGroupId'] = '${{ env.ARM_MGMTGROUP_ID }}' + $tokenConfiguration.Tokens['managementGroupId'] = '${{ env.ARM_MGMTGROUP_ID }}' + } + if (-not [String]::IsNullOrEmpty('${{ env.DEPLOYMENT_SP_ID }}')) { + $tokenConfiguration.Tokens['deploymentSpId'] = $servicePrincipalObjectId } if (-not [String]::IsNullOrEmpty('${{ env.ARM_TENANT_ID }}')) { - $enforcedTokenList['tenantId'] = '${{ env.ARM_TENANT_ID }}' + $tokenConfiguration.Tokens['tenantId'] = '${{ env.ARM_TENANT_ID }}' } # Set and print test output path @@ -117,10 +125,9 @@ runs: # --------------------- # Invoke-Pester -Configuration @{ Run = @{ - Container = New-PesterContainer -Path (Join-Path $repoRootPath $moduleTestFilePath) -Data @{ - repoRootPath = $repoRootPath - moduleFolderPaths = $moduleFolderPaths - enforcedTokenList = $enforcedTokenList + Container = New-PesterContainer -Path (Join-Path $repoRootPath $moduleTestFilePath) -Data @{ + moduleFolderPaths = $moduleFolderPaths + tokenConfiguration = $tokenConfiguration } } TestResult = @{ diff --git a/.github/workflows/ms.aad.domainservices.yml b/.github/workflows/ms.aad.domainservices.yml index c495083fab..c2014d6e0d 100644 --- a/.github/workflows/ms.aad.domainservices.yml +++ b/.github/workflows/ms.aad.domainservices.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.AAD/DomainServices' workflowPath: '.github/workflows/ms.aad.domainservices.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.analysisservices.servers.yml b/.github/workflows/ms.analysisservices.servers.yml index 2f704c5251..cfbc1eab95 100644 --- a/.github/workflows/ms.analysisservices.servers.yml +++ b/.github/workflows/ms.analysisservices.servers.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.AnalysisServices/servers' workflowPath: '.github/workflows/ms.analysisservices.servers.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.apimanagement.service.yml b/.github/workflows/ms.apimanagement.service.yml index 5dd91e53c0..1ee59d3f2e 100644 --- a/.github/workflows/ms.apimanagement.service.yml +++ b/.github/workflows/ms.apimanagement.service.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.ApiManagement/service' workflowPath: '.github/workflows/ms.apimanagement.service.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.appconfiguration.configurationstores.yml b/.github/workflows/ms.appconfiguration.configurationstores.yml index bcc6588022..8df94e9822 100644 --- a/.github/workflows/ms.appconfiguration.configurationstores.yml +++ b/.github/workflows/ms.appconfiguration.configurationstores.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.AppConfiguration/configurationStores' workflowPath: '.github/workflows/ms.appconfiguration.configurationstores.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.authorization.locks.yml b/.github/workflows/ms.authorization.locks.yml index 7e4c4e6029..0372a1090d 100644 --- a/.github/workflows/ms.authorization.locks.yml +++ b/.github/workflows/ms.authorization.locks.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Authorization/locks' workflowPath: '.github/workflows/ms.authorization.locks.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.authorization.policyassignments.yml b/.github/workflows/ms.authorization.policyassignments.yml index 47457a15b8..bd20d50c1d 100644 --- a/.github/workflows/ms.authorization.policyassignments.yml +++ b/.github/workflows/ms.authorization.policyassignments.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Authorization/policyAssignments' workflowPath: '.github/workflows/ms.authorization.policyassignments.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.authorization.policydefinitions.yml b/.github/workflows/ms.authorization.policydefinitions.yml index 2267386c6a..0800137506 100644 --- a/.github/workflows/ms.authorization.policydefinitions.yml +++ b/.github/workflows/ms.authorization.policydefinitions.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Authorization/policyDefinitions' workflowPath: '.github/workflows/ms.authorization.policydefinitions.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.authorization.policyexemptions.yml b/.github/workflows/ms.authorization.policyexemptions.yml index 7733421fbf..878f3665c1 100644 --- a/.github/workflows/ms.authorization.policyexemptions.yml +++ b/.github/workflows/ms.authorization.policyexemptions.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Authorization/policyExemptions' workflowPath: '.github/workflows/ms.authorization.policyexemptions.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.authorization.policysetdefinitions.yml b/.github/workflows/ms.authorization.policysetdefinitions.yml index 05bf5f23c8..d1bd00c8d4 100644 --- a/.github/workflows/ms.authorization.policysetdefinitions.yml +++ b/.github/workflows/ms.authorization.policysetdefinitions.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Authorization/policySetDefinitions' workflowPath: '.github/workflows/ms.authorization.policysetdefinitions.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.authorization.roleassignments.yml b/.github/workflows/ms.authorization.roleassignments.yml index 1b232a892b..7679d04a07 100644 --- a/.github/workflows/ms.authorization.roleassignments.yml +++ b/.github/workflows/ms.authorization.roleassignments.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Authorization/roleAssignments' workflowPath: '.github/workflows/ms.authorization.roleassignments.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.authorization.roledefinitions.yml b/.github/workflows/ms.authorization.roledefinitions.yml index a21128a061..d4f169b1fb 100644 --- a/.github/workflows/ms.authorization.roledefinitions.yml +++ b/.github/workflows/ms.authorization.roledefinitions.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Authorization/roleDefinitions' workflowPath: '.github/workflows/ms.authorization.roledefinitions.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.automation.automationaccounts.yml b/.github/workflows/ms.automation.automationaccounts.yml index 1681f276ce..9b014db655 100644 --- a/.github/workflows/ms.automation.automationaccounts.yml +++ b/.github/workflows/ms.automation.automationaccounts.yml @@ -26,13 +26,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Automation/automationAccounts' workflowPath: '.github/workflows/ms.automation.automationaccounts.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: ${{ secrets.ARM_SUBSCRIPTION_ID }} ARM_MGMTGROUP_ID: ${{ secrets.ARM_MGMTGROUP_ID }} ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.batch.batchaccounts.yml b/.github/workflows/ms.batch.batchaccounts.yml index 5992ef5fa0..65c3811250 100644 --- a/.github/workflows/ms.batch.batchaccounts.yml +++ b/.github/workflows/ms.batch.batchaccounts.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Batch/batchAccounts' workflowPath: '.github/workflows/ms.batch.batchaccounts.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.cache.redis.yml b/.github/workflows/ms.cache.redis.yml index 62323d945c..9666ec63c0 100644 --- a/.github/workflows/ms.cache.redis.yml +++ b/.github/workflows/ms.cache.redis.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Cache/redis' workflowPath: '.github/workflows/ms.cache.redis.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.cognitiveservices.accounts.yml b/.github/workflows/ms.cognitiveservices.accounts.yml index fbcdf5b8ca..f311541b79 100644 --- a/.github/workflows/ms.cognitiveservices.accounts.yml +++ b/.github/workflows/ms.cognitiveservices.accounts.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.CognitiveServices/accounts' workflowPath: '.github/workflows/ms.cognitiveservices.accounts.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.compute.availabilitysets.yml b/.github/workflows/ms.compute.availabilitysets.yml index 3ab576f922..95c38275e8 100644 --- a/.github/workflows/ms.compute.availabilitysets.yml +++ b/.github/workflows/ms.compute.availabilitysets.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Compute/availabilitySets' workflowPath: '.github/workflows/ms.compute.availabilitysets.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.compute.diskencryptionsets.yml b/.github/workflows/ms.compute.diskencryptionsets.yml index dd366796f0..41f443ce2a 100644 --- a/.github/workflows/ms.compute.diskencryptionsets.yml +++ b/.github/workflows/ms.compute.diskencryptionsets.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Compute/diskEncryptionSets' workflowPath: '.github/workflows/ms.compute.diskencryptionsets.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.compute.disks.yml b/.github/workflows/ms.compute.disks.yml index 83667c2cd8..389bd0f063 100644 --- a/.github/workflows/ms.compute.disks.yml +++ b/.github/workflows/ms.compute.disks.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Compute/disks' workflowPath: '.github/workflows/ms.compute.disks.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.compute.galleries.yml b/.github/workflows/ms.compute.galleries.yml index ea408ce4a8..e45bf278bd 100644 --- a/.github/workflows/ms.compute.galleries.yml +++ b/.github/workflows/ms.compute.galleries.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Compute/galleries' workflowPath: '.github/workflows/ms.compute.galleries.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.compute.images.yml b/.github/workflows/ms.compute.images.yml index 09edbd1b3f..93b6897198 100644 --- a/.github/workflows/ms.compute.images.yml +++ b/.github/workflows/ms.compute.images.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Compute/images' workflowPath: '.github/workflows/ms.compute.images.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.compute.proximityplacementgroups.yml b/.github/workflows/ms.compute.proximityplacementgroups.yml index f043aa699e..969a9b9180 100644 --- a/.github/workflows/ms.compute.proximityplacementgroups.yml +++ b/.github/workflows/ms.compute.proximityplacementgroups.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Compute/proximityPlacementGroups' workflowPath: '.github/workflows/ms.compute.proximityplacementgroups.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.compute.virtualmachines.yml b/.github/workflows/ms.compute.virtualmachines.yml index 4cdfb5cfdc..bec15527fa 100644 --- a/.github/workflows/ms.compute.virtualmachines.yml +++ b/.github/workflows/ms.compute.virtualmachines.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Compute/virtualMachines' workflowPath: '.github/workflows/ms.compute.virtualmachines.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.compute.virtualmachinescalesets.yml b/.github/workflows/ms.compute.virtualmachinescalesets.yml index 18a0a59f46..eb511814bc 100644 --- a/.github/workflows/ms.compute.virtualmachinescalesets.yml +++ b/.github/workflows/ms.compute.virtualmachinescalesets.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Compute/virtualMachineScaleSets' workflowPath: '.github/workflows/ms.compute.virtualmachinescalesets.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.consumption.budgets.yml b/.github/workflows/ms.consumption.budgets.yml index 1ddde3c4d2..c892c5b374 100644 --- a/.github/workflows/ms.consumption.budgets.yml +++ b/.github/workflows/ms.consumption.budgets.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Consumption/budgets' workflowPath: '.github/workflows/ms.consumption.budgets.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.containerinstance.containergroups.yml b/.github/workflows/ms.containerinstance.containergroups.yml index 312db0ee03..5d96b96c02 100644 --- a/.github/workflows/ms.containerinstance.containergroups.yml +++ b/.github/workflows/ms.containerinstance.containergroups.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.ContainerInstance/containerGroups' workflowPath: '.github/workflows/ms.containerinstance.containergroups.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.containerregistry.registries.yml b/.github/workflows/ms.containerregistry.registries.yml index 2ab23bdc80..8d0ea9e6c5 100644 --- a/.github/workflows/ms.containerregistry.registries.yml +++ b/.github/workflows/ms.containerregistry.registries.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.ContainerRegistry/registries' workflowPath: '.github/workflows/ms.containerregistry.registries.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.containerservice.managedclusters.yml b/.github/workflows/ms.containerservice.managedclusters.yml index 8264d0d3e7..3773128665 100644 --- a/.github/workflows/ms.containerservice.managedclusters.yml +++ b/.github/workflows/ms.containerservice.managedclusters.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.ContainerService/managedClusters' workflowPath: '.github/workflows/ms.containerservice.managedclusters.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.databricks.workspaces.yml b/.github/workflows/ms.databricks.workspaces.yml index cbea4f52a6..58d06e2dac 100644 --- a/.github/workflows/ms.databricks.workspaces.yml +++ b/.github/workflows/ms.databricks.workspaces.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Databricks/workspaces' workflowPath: '.github/workflows/ms.databricks.workspaces.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.datafactory.factories.yml b/.github/workflows/ms.datafactory.factories.yml index d1f38b12cc..162c0ed643 100644 --- a/.github/workflows/ms.datafactory.factories.yml +++ b/.github/workflows/ms.datafactory.factories.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.DataFactory/factories' workflowPath: '.github/workflows/ms.datafactory.factories.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.dataprotection.backupvaults.yml b/.github/workflows/ms.dataprotection.backupvaults.yml index 0626adfefa..759adf323e 100644 --- a/.github/workflows/ms.dataprotection.backupvaults.yml +++ b/.github/workflows/ms.dataprotection.backupvaults.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.DataProtection/backupVaults' workflowPath: '.github/workflows/ms.dataprotection.backupvaults.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.desktopvirtualization.applicationgroups.yml b/.github/workflows/ms.desktopvirtualization.applicationgroups.yml index a9e5ec2326..db44002f93 100644 --- a/.github/workflows/ms.desktopvirtualization.applicationgroups.yml +++ b/.github/workflows/ms.desktopvirtualization.applicationgroups.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.DesktopVirtualization/applicationgroups' workflowPath: '.github/workflows/ms.desktopvirtualization.applicationgroups.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.desktopvirtualization.hostpools.yml b/.github/workflows/ms.desktopvirtualization.hostpools.yml index 1ad846d7f6..99d3a057a6 100644 --- a/.github/workflows/ms.desktopvirtualization.hostpools.yml +++ b/.github/workflows/ms.desktopvirtualization.hostpools.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.DesktopVirtualization/hostpools' workflowPath: '.github/workflows/ms.desktopvirtualization.hostpools.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.desktopvirtualization.scalingplans.yml b/.github/workflows/ms.desktopvirtualization.scalingplans.yml index bf706a4394..e9f9fc7df5 100644 --- a/.github/workflows/ms.desktopvirtualization.scalingplans.yml +++ b/.github/workflows/ms.desktopvirtualization.scalingplans.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.DesktopVirtualization/scalingplans' workflowPath: '.github/workflows/ms.desktopvirtualization.scalingplans.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.desktopvirtualization.workspaces.yml b/.github/workflows/ms.desktopvirtualization.workspaces.yml index 66266ff863..5b55277835 100644 --- a/.github/workflows/ms.desktopvirtualization.workspaces.yml +++ b/.github/workflows/ms.desktopvirtualization.workspaces.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.DesktopVirtualization/workspaces' workflowPath: '.github/workflows/ms.desktopvirtualization.workspaces.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.documentdb.databaseaccounts.yml b/.github/workflows/ms.documentdb.databaseaccounts.yml index e6efd6a685..1aa0a5d9d6 100644 --- a/.github/workflows/ms.documentdb.databaseaccounts.yml +++ b/.github/workflows/ms.documentdb.databaseaccounts.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.DocumentDB/databaseAccounts' workflowPath: '.github/workflows/ms.documentdb.databaseaccounts.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.eventgrid.systemtopics.yml b/.github/workflows/ms.eventgrid.systemtopics.yml index 6cf269ed57..84a69e853b 100644 --- a/.github/workflows/ms.eventgrid.systemtopics.yml +++ b/.github/workflows/ms.eventgrid.systemtopics.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.EventGrid/systemTopics' workflowPath: '.github/workflows/ms.eventgrid.systemtopics.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.eventgrid.topics.yml b/.github/workflows/ms.eventgrid.topics.yml index de568229f6..7e5cb39f33 100644 --- a/.github/workflows/ms.eventgrid.topics.yml +++ b/.github/workflows/ms.eventgrid.topics.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.EventGrid/topics' workflowPath: '.github/workflows/ms.eventgrid.topics.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.eventhub.namespaces.yml b/.github/workflows/ms.eventhub.namespaces.yml index d56429e7fb..b3fcba58b8 100644 --- a/.github/workflows/ms.eventhub.namespaces.yml +++ b/.github/workflows/ms.eventhub.namespaces.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.EventHub/namespaces' workflowPath: '.github/workflows/ms.eventhub.namespaces.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.healthbot.healthbots.yml b/.github/workflows/ms.healthbot.healthbots.yml index 270fde28ec..85fe41f8a0 100644 --- a/.github/workflows/ms.healthbot.healthbots.yml +++ b/.github/workflows/ms.healthbot.healthbots.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.HealthBot/healthBots' workflowPath: '.github/workflows/ms.healthbot.healthbots.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.insights.actiongroups.yml b/.github/workflows/ms.insights.actiongroups.yml index c034af4e37..34b2279df5 100644 --- a/.github/workflows/ms.insights.actiongroups.yml +++ b/.github/workflows/ms.insights.actiongroups.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Insights/actionGroups' workflowPath: '.github/workflows/ms.insights.actiongroups.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.insights.activitylogalerts.yml b/.github/workflows/ms.insights.activitylogalerts.yml index b194115559..aa75aa0506 100644 --- a/.github/workflows/ms.insights.activitylogalerts.yml +++ b/.github/workflows/ms.insights.activitylogalerts.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Insights/activityLogAlerts' workflowPath: '.github/workflows/ms.insights.activitylogalerts.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.insights.components.yml b/.github/workflows/ms.insights.components.yml index 8c920099ad..032cae919c 100644 --- a/.github/workflows/ms.insights.components.yml +++ b/.github/workflows/ms.insights.components.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Insights/components' workflowPath: '.github/workflows/ms.insights.components.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.insights.diagnosticsettings.yml b/.github/workflows/ms.insights.diagnosticsettings.yml index 37541bfad9..edd2a96273 100644 --- a/.github/workflows/ms.insights.diagnosticsettings.yml +++ b/.github/workflows/ms.insights.diagnosticsettings.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Insights/diagnosticSettings' workflowPath: '.github/workflows/ms.insights.diagnosticsettings.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.insights.metricalerts.yml b/.github/workflows/ms.insights.metricalerts.yml index d2a4d86c1a..878e26857a 100644 --- a/.github/workflows/ms.insights.metricalerts.yml +++ b/.github/workflows/ms.insights.metricalerts.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Insights/metricAlerts' workflowPath: '.github/workflows/ms.insights.metricalerts.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.insights.privatelinkscopes.yml b/.github/workflows/ms.insights.privatelinkscopes.yml index f04657c378..5af19e9443 100644 --- a/.github/workflows/ms.insights.privatelinkscopes.yml +++ b/.github/workflows/ms.insights.privatelinkscopes.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Insights/privateLinkScopes' workflowPath: '.github/workflows/ms.insights.privatelinkscopes.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.insights.scheduledqueryrules.yml b/.github/workflows/ms.insights.scheduledqueryrules.yml index 6eba8cb8fe..f08f10e600 100644 --- a/.github/workflows/ms.insights.scheduledqueryrules.yml +++ b/.github/workflows/ms.insights.scheduledqueryrules.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Insights/scheduledQueryRules' workflowPath: '.github/workflows/ms.insights.scheduledqueryrules.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.keyvault.vaults.yml b/.github/workflows/ms.keyvault.vaults.yml index 44845ff096..e040d8aafd 100644 --- a/.github/workflows/ms.keyvault.vaults.yml +++ b/.github/workflows/ms.keyvault.vaults.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.KeyVault/vaults' workflowPath: '.github/workflows/ms.keyvault.vaults.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.kubernetesconfiguration.extensions.yml b/.github/workflows/ms.kubernetesconfiguration.extensions.yml index 320d7ad466..aa0f094765 100644 --- a/.github/workflows/ms.kubernetesconfiguration.extensions.yml +++ b/.github/workflows/ms.kubernetesconfiguration.extensions.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.KubernetesConfiguration/extensions' workflowPath: '.github/workflows/ms.kubernetesconfiguration.extensions.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.kubernetesconfiguration.fluxconfigurations.yml b/.github/workflows/ms.kubernetesconfiguration.fluxconfigurations.yml index fbdaca2c10..a4f242ea2b 100644 --- a/.github/workflows/ms.kubernetesconfiguration.fluxconfigurations.yml +++ b/.github/workflows/ms.kubernetesconfiguration.fluxconfigurations.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.KubernetesConfiguration/fluxConfigurations' workflowPath: '.github/workflows/ms.kubernetesconfiguration.fluxconfigurations.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.logic.workflows.yml b/.github/workflows/ms.logic.workflows.yml index 191121ce95..97c7eac1cd 100644 --- a/.github/workflows/ms.logic.workflows.yml +++ b/.github/workflows/ms.logic.workflows.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Logic/workflows' workflowPath: '.github/workflows/ms.logic.workflows.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.machinelearningservices.workspaces.yml b/.github/workflows/ms.machinelearningservices.workspaces.yml index 58443951c5..b4760cc79c 100644 --- a/.github/workflows/ms.machinelearningservices.workspaces.yml +++ b/.github/workflows/ms.machinelearningservices.workspaces.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.MachineLearningServices/workspaces' workflowPath: '.github/workflows/ms.machinelearningservices.workspaces.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.managedidentity.userassignedidentities.yml b/.github/workflows/ms.managedidentity.userassignedidentities.yml index 55457e80fa..42e2d6a764 100644 --- a/.github/workflows/ms.managedidentity.userassignedidentities.yml +++ b/.github/workflows/ms.managedidentity.userassignedidentities.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.ManagedIdentity/userAssignedIdentities' workflowPath: '.github/workflows/ms.managedidentity.userassignedidentities.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.managedservices.registrationdefinitions.yml b/.github/workflows/ms.managedservices.registrationdefinitions.yml index 41dafa77ee..db7aea3412 100644 --- a/.github/workflows/ms.managedservices.registrationdefinitions.yml +++ b/.github/workflows/ms.managedservices.registrationdefinitions.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.ManagedServices/registrationDefinitions' workflowPath: '.github/workflows/ms.managedservices.registrationdefinitions.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.management.managementgroups.yml b/.github/workflows/ms.management.managementgroups.yml index 6744110606..3f0258f95e 100644 --- a/.github/workflows/ms.management.managementgroups.yml +++ b/.github/workflows/ms.management.managementgroups.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Management/managementGroups' workflowPath: '.github/workflows/ms.management.managementgroups.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.netapp.netappaccounts.yml b/.github/workflows/ms.netapp.netappaccounts.yml index 43c1419bd0..78d240e171 100644 --- a/.github/workflows/ms.netapp.netappaccounts.yml +++ b/.github/workflows/ms.netapp.netappaccounts.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.NetApp/netAppAccounts' workflowPath: '.github/workflows/ms.netapp.netappaccounts.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.network.applicationgateways.yml b/.github/workflows/ms.network.applicationgateways.yml index f27ca6c028..f725041d2e 100644 --- a/.github/workflows/ms.network.applicationgateways.yml +++ b/.github/workflows/ms.network.applicationgateways.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Network/applicationGateways' workflowPath: '.github/workflows/ms.network.applicationgateways.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.network.applicationsecuritygroups.yml b/.github/workflows/ms.network.applicationsecuritygroups.yml index 3a005db4b7..f91fd36990 100644 --- a/.github/workflows/ms.network.applicationsecuritygroups.yml +++ b/.github/workflows/ms.network.applicationsecuritygroups.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Network/applicationSecurityGroups' workflowPath: '.github/workflows/ms.network.applicationsecuritygroups.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.network.azurefirewalls.yml b/.github/workflows/ms.network.azurefirewalls.yml index f1f32b3446..22f7cceea8 100644 --- a/.github/workflows/ms.network.azurefirewalls.yml +++ b/.github/workflows/ms.network.azurefirewalls.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Network/azureFirewalls' workflowPath: '.github/workflows/ms.network.azurefirewalls.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.network.bastionhosts.yml b/.github/workflows/ms.network.bastionhosts.yml index 6c1fcaf228..afcedb67f4 100644 --- a/.github/workflows/ms.network.bastionhosts.yml +++ b/.github/workflows/ms.network.bastionhosts.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Network/bastionHosts' workflowPath: '.github/workflows/ms.network.bastionhosts.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.network.connections.yml b/.github/workflows/ms.network.connections.yml index dbf26b3452..6c79aa5700 100644 --- a/.github/workflows/ms.network.connections.yml +++ b/.github/workflows/ms.network.connections.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Network/connections' workflowPath: '.github/workflows/ms.network.connections.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.network.ddosprotectionplans.yml b/.github/workflows/ms.network.ddosprotectionplans.yml index 3f1371cf04..fae4890183 100644 --- a/.github/workflows/ms.network.ddosprotectionplans.yml +++ b/.github/workflows/ms.network.ddosprotectionplans.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Network/ddosProtectionPlans' workflowPath: '.github/workflows/ms.network.ddosprotectionplans.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.network.expressroutecircuits.yml b/.github/workflows/ms.network.expressroutecircuits.yml index ac9491a2f4..ad03422d22 100644 --- a/.github/workflows/ms.network.expressroutecircuits.yml +++ b/.github/workflows/ms.network.expressroutecircuits.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Network/expressRouteCircuits' workflowPath: '.github/workflows/ms.network.expressroutecircuits.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.network.firewallpolicies.yml b/.github/workflows/ms.network.firewallpolicies.yml index 4dbe71ffa0..2450174926 100644 --- a/.github/workflows/ms.network.firewallpolicies.yml +++ b/.github/workflows/ms.network.firewallpolicies.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Network/firewallPolicies' workflowPath: '.github/workflows/ms.network.firewallpolicies.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.network.frontdoors.yml b/.github/workflows/ms.network.frontdoors.yml index 2368a9e2e4..3f61f66412 100644 --- a/.github/workflows/ms.network.frontdoors.yml +++ b/.github/workflows/ms.network.frontdoors.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Network/frontDoors' workflowPath: '.github/workflows/ms.network.frontdoors.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.network.ipgroups.yml b/.github/workflows/ms.network.ipgroups.yml index 8232aff7c4..7eb62ad396 100644 --- a/.github/workflows/ms.network.ipgroups.yml +++ b/.github/workflows/ms.network.ipgroups.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Network/ipGroups' workflowPath: '.github/workflows/ms.network.ipgroups.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.network.loadbalancers.yml b/.github/workflows/ms.network.loadbalancers.yml index 53822d6d16..e490a3b069 100644 --- a/.github/workflows/ms.network.loadbalancers.yml +++ b/.github/workflows/ms.network.loadbalancers.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Network/loadBalancers' workflowPath: '.github/workflows/ms.network.loadbalancers.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.network.localnetworkgateways.yml b/.github/workflows/ms.network.localnetworkgateways.yml index 31083eaea0..a1c63c107e 100644 --- a/.github/workflows/ms.network.localnetworkgateways.yml +++ b/.github/workflows/ms.network.localnetworkgateways.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Network/localNetworkGateways' workflowPath: '.github/workflows/ms.network.localnetworkgateways.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.network.natgateways.yml b/.github/workflows/ms.network.natgateways.yml index 9198ac04cd..32143fca94 100644 --- a/.github/workflows/ms.network.natgateways.yml +++ b/.github/workflows/ms.network.natgateways.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Network/natGateways' workflowPath: '.github/workflows/ms.network.natgateways.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.network.networkinterfaces.yml b/.github/workflows/ms.network.networkinterfaces.yml index 624db3b695..2a6533ecaf 100644 --- a/.github/workflows/ms.network.networkinterfaces.yml +++ b/.github/workflows/ms.network.networkinterfaces.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Network/networkInterfaces' workflowPath: '.github/workflows/ms.network.networkinterfaces.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.network.networksecuritygroups.yml b/.github/workflows/ms.network.networksecuritygroups.yml index 844fd1687d..9535e97e90 100644 --- a/.github/workflows/ms.network.networksecuritygroups.yml +++ b/.github/workflows/ms.network.networksecuritygroups.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Network/networkSecurityGroups' workflowPath: '.github/workflows/ms.network.networksecuritygroups.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.network.networkwatchers.yml b/.github/workflows/ms.network.networkwatchers.yml index a47b968752..bb11787987 100644 --- a/.github/workflows/ms.network.networkwatchers.yml +++ b/.github/workflows/ms.network.networkwatchers.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Network/networkWatchers' workflowPath: '.github/workflows/ms.network.networkwatchers.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.network.privatednszones.yml b/.github/workflows/ms.network.privatednszones.yml index 7c0c5360a3..b7dc28d582 100644 --- a/.github/workflows/ms.network.privatednszones.yml +++ b/.github/workflows/ms.network.privatednszones.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Network/privateDnsZones' workflowPath: '.github/workflows/ms.network.privatednszones.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.network.privateendpoints.yml b/.github/workflows/ms.network.privateendpoints.yml index 827458f8a4..b1840b91c2 100644 --- a/.github/workflows/ms.network.privateendpoints.yml +++ b/.github/workflows/ms.network.privateendpoints.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Network/privateEndpoints' workflowPath: '.github/workflows/ms.network.privateendpoints.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.network.publicipaddresses.yml b/.github/workflows/ms.network.publicipaddresses.yml index a3a5723eae..6c396214d1 100644 --- a/.github/workflows/ms.network.publicipaddresses.yml +++ b/.github/workflows/ms.network.publicipaddresses.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Network/publicIPAddresses' workflowPath: '.github/workflows/ms.network.publicipaddresses.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.network.publicipprefixes.yml b/.github/workflows/ms.network.publicipprefixes.yml index 5b76c2c1e2..7dfc0f9c4c 100644 --- a/.github/workflows/ms.network.publicipprefixes.yml +++ b/.github/workflows/ms.network.publicipprefixes.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Network/publicIPPrefixes' workflowPath: '.github/workflows/ms.network.publicipprefixes.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.network.routetables.yml b/.github/workflows/ms.network.routetables.yml index 431184f035..b34acc99e1 100644 --- a/.github/workflows/ms.network.routetables.yml +++ b/.github/workflows/ms.network.routetables.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Network/routeTables' workflowPath: '.github/workflows/ms.network.routetables.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.network.trafficmanagerprofiles.yml b/.github/workflows/ms.network.trafficmanagerprofiles.yml index 991a1cf849..8df0887502 100644 --- a/.github/workflows/ms.network.trafficmanagerprofiles.yml +++ b/.github/workflows/ms.network.trafficmanagerprofiles.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Network/trafficmanagerprofiles' workflowPath: '.github/workflows/ms.network.trafficmanagerprofiles.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.network.virtualhubs.yml b/.github/workflows/ms.network.virtualhubs.yml index 5e71b86c6c..6f8804f622 100644 --- a/.github/workflows/ms.network.virtualhubs.yml +++ b/.github/workflows/ms.network.virtualhubs.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Network/virtualHubs' workflowPath: '.github/workflows/ms.network.virtualhubs.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.network.virtualnetworkgateways.yml b/.github/workflows/ms.network.virtualnetworkgateways.yml index ea6886be2a..a426add415 100644 --- a/.github/workflows/ms.network.virtualnetworkgateways.yml +++ b/.github/workflows/ms.network.virtualnetworkgateways.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Network/virtualNetworkGateways' workflowPath: '.github/workflows/ms.network.virtualnetworkgateways.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.network.virtualnetworks.yml b/.github/workflows/ms.network.virtualnetworks.yml index 2600fcbc70..a5dd9d634a 100644 --- a/.github/workflows/ms.network.virtualnetworks.yml +++ b/.github/workflows/ms.network.virtualnetworks.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Network/virtualNetworks' workflowPath: '.github/workflows/ms.network.virtualnetworks.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.network.virtualwans.yml b/.github/workflows/ms.network.virtualwans.yml index e470f242eb..4183d5afcb 100644 --- a/.github/workflows/ms.network.virtualwans.yml +++ b/.github/workflows/ms.network.virtualwans.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Network/virtualWans' workflowPath: '.github/workflows/ms.network.virtualwans.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.network.vpngateways.yml b/.github/workflows/ms.network.vpngateways.yml index 110f8a2fed..e2f13f404c 100644 --- a/.github/workflows/ms.network.vpngateways.yml +++ b/.github/workflows/ms.network.vpngateways.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Network/vpnGateways' workflowPath: '.github/workflows/ms.network.vpngateways.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.network.vpnsites.yml b/.github/workflows/ms.network.vpnsites.yml index 8ce86b9dc6..8488bb8a44 100644 --- a/.github/workflows/ms.network.vpnsites.yml +++ b/.github/workflows/ms.network.vpnsites.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Network/vpnSites' workflowPath: '.github/workflows/ms.network.vpnsites.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.operationalinsights.workspaces.yml b/.github/workflows/ms.operationalinsights.workspaces.yml index f439b8f425..385343f542 100644 --- a/.github/workflows/ms.operationalinsights.workspaces.yml +++ b/.github/workflows/ms.operationalinsights.workspaces.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.OperationalInsights/workspaces' workflowPath: '.github/workflows/ms.operationalinsights.workspaces.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.operationsmanagement.solutions.yml b/.github/workflows/ms.operationsmanagement.solutions.yml index 0f09696b81..d55292826d 100644 --- a/.github/workflows/ms.operationsmanagement.solutions.yml +++ b/.github/workflows/ms.operationsmanagement.solutions.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.OperationsManagement/solutions' workflowPath: '.github/workflows/ms.operationsmanagement.solutions.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.recoveryservices.vaults.yml b/.github/workflows/ms.recoveryservices.vaults.yml index ab81234b39..3334f45b6b 100644 --- a/.github/workflows/ms.recoveryservices.vaults.yml +++ b/.github/workflows/ms.recoveryservices.vaults.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.RecoveryServices/vaults' workflowPath: '.github/workflows/ms.recoveryservices.vaults.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.resources.deploymentscripts.yml b/.github/workflows/ms.resources.deploymentscripts.yml index fdc33e564f..c317b860ef 100644 --- a/.github/workflows/ms.resources.deploymentscripts.yml +++ b/.github/workflows/ms.resources.deploymentscripts.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Resources/deploymentScripts' workflowPath: '.github/workflows/ms.resources.deploymentscripts.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.resources.resourcegroups.yml b/.github/workflows/ms.resources.resourcegroups.yml index 1a57c8345b..971887f25e 100644 --- a/.github/workflows/ms.resources.resourcegroups.yml +++ b/.github/workflows/ms.resources.resourcegroups.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Resources/resourceGroups' workflowPath: '.github/workflows/ms.resources.resourcegroups.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.resources.tags.yml b/.github/workflows/ms.resources.tags.yml index 06b04cf728..5b4751ee48 100644 --- a/.github/workflows/ms.resources.tags.yml +++ b/.github/workflows/ms.resources.tags.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Resources/tags' workflowPath: '.github/workflows/ms.resources.tags.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.security.azuresecuritycenter.yml b/.github/workflows/ms.security.azuresecuritycenter.yml index de105319f3..91d5c201ce 100644 --- a/.github/workflows/ms.security.azuresecuritycenter.yml +++ b/.github/workflows/ms.security.azuresecuritycenter.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Security/azureSecurityCenter' workflowPath: '.github/workflows/ms.security.azuresecuritycenter.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.servicebus.namespaces.yml b/.github/workflows/ms.servicebus.namespaces.yml index 0972f3a205..db2358ad0a 100644 --- a/.github/workflows/ms.servicebus.namespaces.yml +++ b/.github/workflows/ms.servicebus.namespaces.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.ServiceBus/namespaces' workflowPath: '.github/workflows/ms.servicebus.namespaces.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.servicefabric.clusters.yml b/.github/workflows/ms.servicefabric.clusters.yml index 6b57c2042b..5c4866bb99 100644 --- a/.github/workflows/ms.servicefabric.clusters.yml +++ b/.github/workflows/ms.servicefabric.clusters.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.ServiceFabric/clusters' workflowPath: '.github/workflows/ms.servicefabric.clusters.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.signalrservice.webpubsub.yml b/.github/workflows/ms.signalrservice.webpubsub.yml index 3a7775b5e5..6fd784c1c6 100644 --- a/.github/workflows/ms.signalrservice.webpubsub.yml +++ b/.github/workflows/ms.signalrservice.webpubsub.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.SignalRService/webPubSub' workflowPath: '.github/workflows/ms.signalrservice.webpubsub.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.sql.managedinstances.yml b/.github/workflows/ms.sql.managedinstances.yml index 1314419949..63c8bd5db0 100644 --- a/.github/workflows/ms.sql.managedinstances.yml +++ b/.github/workflows/ms.sql.managedinstances.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Sql/managedInstances' workflowPath: '.github/workflows/ms.sql.managedinstances.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.sql.servers.yml b/.github/workflows/ms.sql.servers.yml index 5320ef8e92..972e422285 100644 --- a/.github/workflows/ms.sql.servers.yml +++ b/.github/workflows/ms.sql.servers.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Sql/servers' workflowPath: '.github/workflows/ms.sql.servers.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.storage.storageaccounts.yml b/.github/workflows/ms.storage.storageaccounts.yml index 786edc3b84..5d2fa31d8d 100644 --- a/.github/workflows/ms.storage.storageaccounts.yml +++ b/.github/workflows/ms.storage.storageaccounts.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Storage/storageAccounts' workflowPath: '.github/workflows/ms.storage.storageaccounts.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.synapse.privatelinkhubs.yml b/.github/workflows/ms.synapse.privatelinkhubs.yml index ea52b76c43..8d2413e7f3 100644 --- a/.github/workflows/ms.synapse.privatelinkhubs.yml +++ b/.github/workflows/ms.synapse.privatelinkhubs.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Synapse/privateLinkHubs' workflowPath: '.github/workflows/ms.synapse.privatelinkhubs.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.synapse.workspaces.yml b/.github/workflows/ms.synapse.workspaces.yml index 7dcfd1fb9f..4a41f79748 100644 --- a/.github/workflows/ms.synapse.workspaces.yml +++ b/.github/workflows/ms.synapse.workspaces.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Synapse/workspaces' workflowPath: '.github/workflows/ms.synapse.workspaces.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.virtualmachineimages.imagetemplates.yml b/.github/workflows/ms.virtualmachineimages.imagetemplates.yml index e1ee7fedca..3339da4bb2 100644 --- a/.github/workflows/ms.virtualmachineimages.imagetemplates.yml +++ b/.github/workflows/ms.virtualmachineimages.imagetemplates.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.VirtualMachineImages/imageTemplates' workflowPath: '.github/workflows/ms.virtualmachineimages.imagetemplates.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.web.connections.yml b/.github/workflows/ms.web.connections.yml index b4413ba771..01f583a09d 100644 --- a/.github/workflows/ms.web.connections.yml +++ b/.github/workflows/ms.web.connections.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Web/connections' workflowPath: '.github/workflows/ms.web.connections.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.web.hostingenvironments.yml b/.github/workflows/ms.web.hostingenvironments.yml index ea81d67ed3..5b4e9cdb84 100644 --- a/.github/workflows/ms.web.hostingenvironments.yml +++ b/.github/workflows/ms.web.hostingenvironments.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Web/hostingEnvironments' workflowPath: '.github/workflows/ms.web.hostingenvironments.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.web.serverfarms.yml b/.github/workflows/ms.web.serverfarms.yml index e2f38c30c2..ea4d98faf9 100644 --- a/.github/workflows/ms.web.serverfarms.yml +++ b/.github/workflows/ms.web.serverfarms.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Web/serverfarms' workflowPath: '.github/workflows/ms.web.serverfarms.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.web.sites.yml b/.github/workflows/ms.web.sites.yml index 8aa9703d14..172f6a7571 100644 --- a/.github/workflows/ms.web.sites.yml +++ b/.github/workflows/ms.web.sites.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Web/sites' workflowPath: '.github/workflows/ms.web.sites.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/ms.web.staticsites.yml b/.github/workflows/ms.web.staticsites.yml index 8636d212ad..6c02711084 100644 --- a/.github/workflows/ms.web.staticsites.yml +++ b/.github/workflows/ms.web.staticsites.yml @@ -25,13 +25,14 @@ on: - '!*/**/readme.md' env: - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' modulePath: 'modules/Microsoft.Web/staticSites' workflowPath: '.github/workflows/ms.web.staticsites.yml' AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: ########################### diff --git a/.github/workflows/platform.dependencies.yml b/.github/workflows/platform.dependencies.yml index 4c96617d38..fc6bb13c49 100644 --- a/.github/workflows/platform.dependencies.yml +++ b/.github/workflows/platform.dependencies.yml @@ -23,6 +23,7 @@ on: # - 'utilities/pipelines/dependencies/**' env: + variablesPath: 'settings.yml' location: 'WestEurope' defaultResourceGroupName: 'validation-rg' resourceGroupNameArtifacts: 'artifacts-rg' @@ -32,6 +33,7 @@ env: ARM_SUBSCRIPTION_ID: '${{ secrets.ARM_SUBSCRIPTION_ID }}' ARM_MGMTGROUP_ID: '${{ secrets.ARM_MGMTGROUP_ID }}' ARM_TENANT_ID: '${{ secrets.ARM_TENANT_ID }}' + TOKEN_NAMEPREFIX: '${{ secrets.TOKEN_NAMEPREFIX }}' jobs: job_deploy_rg: @@ -49,6 +51,10 @@ jobs: uses: actions/checkout@v2 with: fetch-depth: 0 + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} - name: 'Deploy module' uses: ./.github/actions/templates/validateModuleDeployment with: @@ -71,6 +77,10 @@ jobs: uses: actions/checkout@v2 with: fetch-depth: 0 + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} - name: 'Deploy module' uses: ./.github/actions/templates/validateModuleDeployment with: @@ -91,12 +101,17 @@ jobs: strategy: fail-fast: false matrix: - parameterFilePaths: ['parameters.json', 'vm.parameters.json', 'vmss.parameters.json'] + parameterFilePaths: + ['parameters.json', 'vm.parameters.json', 'vmss.parameters.json'] steps: - name: 'Checkout' uses: actions/checkout@v2 with: fetch-depth: 0 + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} - name: 'Deploy module' uses: ./.github/actions/templates/validateModuleDeployment with: @@ -126,6 +141,10 @@ jobs: uses: actions/checkout@v2 with: fetch-depth: 0 + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} - name: 'Deploy module' id: deploy_msi uses: ./.github/actions/templates/validateModuleDeployment @@ -164,6 +183,10 @@ jobs: uses: actions/checkout@v2 with: fetch-depth: 0 + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} - name: 'Deploy module' uses: ./.github/actions/templates/validateModuleDeployment with: @@ -191,6 +214,10 @@ jobs: uses: actions/checkout@v2 with: fetch-depth: 0 + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} - name: 'Deploy module' uses: ./.github/actions/templates/validateModuleDeployment with: @@ -218,6 +245,10 @@ jobs: uses: actions/checkout@v2 with: fetch-depth: 0 + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} - name: 'Deploy module' uses: ./.github/actions/templates/validateModuleDeployment with: @@ -245,6 +276,10 @@ jobs: uses: actions/checkout@v2 with: fetch-depth: 0 + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} - name: 'Deploy module' uses: ./.github/actions/templates/validateModuleDeployment with: @@ -278,6 +313,10 @@ jobs: uses: actions/checkout@v2 with: fetch-depth: 0 + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} - name: 'Deploy module' uses: ./.github/actions/templates/validateModuleDeployment with: @@ -312,6 +351,10 @@ jobs: uses: actions/checkout@v2 with: fetch-depth: 0 + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} - name: 'Deploy module' uses: ./.github/actions/templates/validateModuleDeployment with: @@ -343,12 +386,18 @@ jobs: # Define PS modules to install on the runner $Modules = @( - @{ Name = 'Az.Storage' } + @{ Name = 'Az.Storage' }, + @{ Name = 'powershell-yaml'; Version = '0.4.2'} ) # Set agent up Set-EnvironmentOnAgent -PSModules $Modules + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} + - name: Azure Login uses: azure/login@v1 with: @@ -367,23 +416,26 @@ jobs: $parameterFilePath = Join-Path $env:GITHUB_WORKSPACE '${{ env.dependencyPath }}' '${{ env.namespace }}' 'parameters' 'parameters.json' $parameterFilePaths = @($parameterFilePath) - # Replace tokens in parameter file - $Settings = Get-Content -Path "settings.json" | ConvertFrom-Json -AsHashTable + # Construct Token Function Input $ConvertTokensInputs = @{ - FilePathList = $parameterFilePaths + FilePath = $parameterFilePaths Tokens = @{} - TokenPrefix = $Settings.parameterFileTokens.tokenPrefix - TokenSuffix = $Settings.parameterFileTokens.tokenSuffix + TokenPrefix = '${{ env.tokenPrefix }}' + TokenSuffix = '${{ env.tokenSuffix }}' + } + + # Add local (source control) tokens + $tokenMap = @{} + foreach ($token in (Get-ChildItem env: | Where-Object -Property Name -Like "localToken_*")) { + $tokenMap += @{ $token.Name.Replace('localToken_','','OrdinalIgnoreCase') = $token.value } } + Write-Verbose ('Using local tokens [{0}]' -f ($tokenMap.Keys -join ', ')) -Verbose + $ConvertTokensInputs.Tokens += $tokenMap - # Add local tokens - if ($Settings.parameterFileTokens.localTokens) { - $tokenMap = @{} - foreach ($token in $Settings.parameterFileTokens.localTokens) { - $tokenMap += @{ $token.name = $token.value } - } - Write-Verbose ('Using local tokens [{0}]' -f ($tokenMap.Keys -join ', ')) -Verbose - $ConvertTokensInputs.Tokens += $tokenMap + # Swap 'namePrefix' token if empty and provided as a GitHub secret + if([String]::IsNullOrEmpty($ConvertTokensInputs.Tokens['namePrefix'])){ + Write-Verbose 'Using [namePrefix] token from GitHub' -Verbose + $ConvertTokensInputs.Tokens['namePrefix'] = '${{ env.TOKEN_NAMEPREFIX }}' } $null = Convert-TokensInFileList @ConvertTokensInputs @@ -421,6 +473,10 @@ jobs: uses: actions/checkout@v2 with: fetch-depth: 0 + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} - name: 'Deploy module' uses: ./.github/actions/templates/validateModuleDeployment with: @@ -448,6 +504,10 @@ jobs: uses: actions/checkout@v2 with: fetch-depth: 0 + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} - name: 'Deploy module' uses: ./.github/actions/templates/validateModuleDeployment with: @@ -475,6 +535,10 @@ jobs: uses: actions/checkout@v2 with: fetch-depth: 0 + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} - name: 'Deploy module' uses: ./.github/actions/templates/validateModuleDeployment with: @@ -502,6 +566,10 @@ jobs: uses: actions/checkout@v2 with: fetch-depth: 0 + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} - name: 'Deploy module' uses: ./.github/actions/templates/validateModuleDeployment with: @@ -530,6 +598,10 @@ jobs: uses: actions/checkout@v2 with: fetch-depth: 0 + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} - name: 'Deploy module' uses: ./.github/actions/templates/validateModuleDeployment with: @@ -566,6 +638,10 @@ jobs: uses: actions/checkout@v2 with: fetch-depth: 0 + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} - name: 'Deploy module' uses: ./.github/actions/templates/validateModuleDeployment with: @@ -596,6 +672,10 @@ jobs: uses: actions/checkout@v2 with: fetch-depth: 0 + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} - name: 'Deploy module' uses: ./.github/actions/templates/validateModuleDeployment with: @@ -634,6 +714,10 @@ jobs: uses: actions/checkout@v2 with: fetch-depth: 0 + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} - name: 'Deploy module' uses: ./.github/actions/templates/validateModuleDeployment with: @@ -663,6 +747,10 @@ jobs: uses: actions/checkout@v2 with: fetch-depth: 0 + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} - name: 'Deploy module' uses: ./.github/actions/templates/validateModuleDeployment with: @@ -692,6 +780,10 @@ jobs: uses: actions/checkout@v2 with: fetch-depth: 0 + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} - name: 'Deploy module' uses: ./.github/actions/templates/validateModuleDeployment with: @@ -721,6 +813,10 @@ jobs: uses: actions/checkout@v2 with: fetch-depth: 0 + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} - name: 'Deploy module' uses: ./.github/actions/templates/validateModuleDeployment with: @@ -751,6 +847,10 @@ jobs: uses: actions/checkout@v2 with: fetch-depth: 0 + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} - name: 'Deploy module' uses: ./.github/actions/templates/validateModuleDeployment with: @@ -783,6 +883,10 @@ jobs: uses: actions/checkout@v2 with: fetch-depth: 0 + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} - name: 'Deploy module' uses: ./.github/actions/templates/validateModuleDeployment with: @@ -816,12 +920,18 @@ jobs: # Define PS modules to install on the runner $Modules = @( - @{ Name = 'Az.KeyVault' } + @{ Name = 'Az.KeyVault' }, + @{ Name = 'powershell-yaml'; Version = '0.4.2'} ) # Set agent up Set-EnvironmentOnAgent -PSModules $Modules + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} + - name: Azure Login uses: azure/login@v1 with: @@ -840,21 +950,26 @@ jobs: $noprParameterFilePath = Join-Path $env:GITHUB_WORKSPACE 'utilities' 'pipelines' 'dependencies' '${{ env.namespace }}' 'parameters' 'nopr.parameters.json' $parameterFilePaths = @($parameterFilePath, $noprParameterFilePath) - # Replace tokens in parameter file - $Settings = Get-Content -Path "settings.json" | ConvertFrom-Json -AsHashTable + # Construct Token Function Input $ConvertTokensInputs = @{ FilePathList = $parameterFilePaths - Tokens = @{} - TokenPrefix = $Settings.parameterFileTokens.tokenPrefix - TokenSuffix = $Settings.parameterFileTokens.tokenSuffix + Tokens = @{} + TokenPrefix = '${{ env.tokenPrefix }}' + TokenSuffix = '${{ env.tokenSuffix }}' } - if ($Settings.parameterFileTokens.localTokens) { - $tokenMap = @{} - foreach ($token in $Settings.parameterFileTokens.localTokens) { - $tokenMap += @{ $token.name = $token.value } - } - Write-Verbose ('Using local tokens [{0}]' -f ($tokenMap.Keys -join ', ')) -Verbose - $ConvertTokensInputs.Tokens += $tokenMap + + # Add local (source control) tokens + $tokenMap = @{} + foreach ($token in (Get-ChildItem env: | Where-Object -Property Name -Like "localToken_*")) { + $tokenMap += @{ $token.Name.Replace('localToken_','','OrdinalIgnoreCase') = $token.value } + } + Write-Verbose ('Using local tokens [{0}]' -f ($tokenMap.Keys -join ', ')) -Verbose + $ConvertTokensInputs.Tokens += $tokenMap + + # Swap 'namePrefix' token if empty and provided as a GitHub secret + if([String]::IsNullOrEmpty($ConvertTokensInputs.Tokens['namePrefix'])){ + Write-Verbose 'Using [namePrefix] token from GitHub' -Verbose + $ConvertTokensInputs.Tokens['namePrefix'] = '${{ env.TOKEN_NAMEPREFIX }}' } $null = Convert-TokensInFileList @ConvertTokensInputs @@ -873,10 +988,11 @@ jobs: $vpnSharedKeyString = (New-Guid).Guid.SubString(0, 32) $vpnSharedKey = ConvertTo-SecureString -String $vpnSharedKeyString -AsPlainText -Force - $namePrefixToken = $Settings.parameterFileTokens.localTokens | Where-Object { $_.name -eq 'namePrefix' } + $namePrefixToken = $ConvertTokensInputs.Tokens['namePrefix'] + $certInputObject = @{ - Subject = 'CN=*.{0}.onmicrosoft.com' -f $namePrefixToken.value - DnsName = '*.{0}.onmicrosoft.com' -f $namePrefixToken.value + Subject = 'CN=*.{0}.onmicrosoft.com' -f $namePrefixToken + DnsName = '*.{0}.onmicrosoft.com' -f $namePrefixToken CertStoreLocation = 'cert:\LocalMachine\My' KeyExportPolicy = 'Exportable' Provider = 'Microsoft Enhanced RSA and AES Cryptographic Provider' @@ -954,6 +1070,10 @@ jobs: uses: actions/checkout@v2 with: fetch-depth: 0 + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} - name: 'Deploy module' uses: ./.github/actions/templates/validateModuleDeployment with: @@ -987,12 +1107,18 @@ jobs: # Define PS modules to install on the runner $Modules = @( - @{ Name = 'Az.KeyVault' } + @{ Name = 'Az.KeyVault' }, + @{ Name = 'powershell-yaml'; Version = '0.4.2'} ) # Set agent up Set-EnvironmentOnAgent -PSModules $Modules + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} + - name: Azure Login uses: azure/login@v1 with: @@ -1010,23 +1136,26 @@ jobs: $parameterFilePath = Join-Path $env:GITHUB_WORKSPACE 'utilities' 'pipelines' 'dependencies' '${{ env.namespace }}' 'parameters' 'sqlmi.parameters.json' $parameterFilePaths = @($parameterFilePath) - # Replace tokens in parameter file - $Settings = Get-Content -Path "settings.json" | ConvertFrom-Json -AsHashTable + # Construct Token Function Input $ConvertTokensInputs = @{ - FilePathList = $parameterFilePaths Tokens = @{} - TokenPrefix = $Settings.parameterFileTokens.tokenPrefix - TokenSuffix = $Settings.parameterFileTokens.tokenSuffix + FilePath = $parameterFilePaths + TokenPrefix = '${{ env.tokenPrefix }}' + TokenSuffix = '${{ env.tokenSuffix }}' + } + + # Add local (source control) tokens + $tokenMap = @{} + foreach ($token in (Get-ChildItem env: | Where-Object -Property Name -Like "localToken_*")) { + $tokenMap += @{ $token.Name.Replace('localToken_','','OrdinalIgnoreCase') = $token.value } } + Write-Verbose ('Using local tokens [{0}]' -f ($tokenMap.Keys -join ', ')) -Verbose + $ConvertTokensInputs.Tokens += $tokenMap - # Add local tokens - if ($Settings.parameterFileTokens.localTokens) { - $tokenMap = @{} - foreach ($token in $Settings.parameterFileTokens.localTokens) { - $tokenMap += @{ $token.name = $token.value } - } - Write-Verbose ('Using local tokens [{0}]' -f ($tokenMap.Keys -join ', ')) -Verbose - $ConvertTokensInputs.Tokens += $tokenMap + # Swap 'namePrefix' token if empty and provided as a GitHub secret + if([String]::IsNullOrEmpty($ConvertTokensInputs.Tokens['namePrefix'])){ + Write-Verbose 'Using [namePrefix] token from GitHub' -Verbose + $ConvertTokensInputs.Tokens['namePrefix'] = '${{ env.TOKEN_NAMEPREFIX }}' } $null = Convert-TokensInFileList @ConvertTokensInputs @@ -1077,6 +1206,10 @@ jobs: uses: actions/checkout@v2 with: fetch-depth: 0 + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} - name: 'Deploy module' uses: ./.github/actions/templates/validateModuleDeployment with: @@ -1104,6 +1237,10 @@ jobs: uses: actions/checkout@v2 with: fetch-depth: 0 + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} - name: 'Deploy module' uses: ./.github/actions/templates/validateModuleDeployment with: @@ -1131,6 +1268,10 @@ jobs: uses: actions/checkout@v2 with: fetch-depth: 0 + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} - name: 'Deploy module' uses: ./.github/actions/templates/validateModuleDeployment with: @@ -1167,13 +1308,17 @@ jobs: '11.azfw.parameters.json', '12.bastion.parameters.json', '13.bastion.parameters.json', - 'parameters.json' + 'parameters.json', ] steps: - name: 'Checkout' uses: actions/checkout@v2 with: fetch-depth: 0 + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} - name: 'Deploy module' uses: ./.github/actions/templates/validateModuleDeployment with: @@ -1203,6 +1348,10 @@ jobs: uses: actions/checkout@v2 with: fetch-depth: 0 + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} - name: 'Deploy module' uses: ./.github/actions/templates/validateModuleDeployment with: @@ -1248,13 +1397,17 @@ jobs: 'siterecovery.parameters.json', 'table.parameters.json', 'vaultcore.parameters.json', - 'webpubsub.parameters.json' + 'webpubsub.parameters.json', ] steps: - name: 'Checkout' uses: actions/checkout@v2 with: fetch-depth: 0 + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} - name: 'Deploy module' uses: ./.github/actions/templates/validateModuleDeployment with: @@ -1284,6 +1437,10 @@ jobs: uses: actions/checkout@v2 with: fetch-depth: 0 + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} - name: 'Deploy module' uses: ./.github/actions/templates/validateModuleDeployment with: @@ -1311,6 +1468,10 @@ jobs: uses: actions/checkout@v2 with: fetch-depth: 0 + - name: Set environment variables + uses: ./.github/actions/templates/setEnvironmentVariables + with: + variablesPath: ${{ env.variablesPath }} - name: 'Deploy module' uses: ./.github/actions/templates/validateModuleDeployment with: diff --git a/docs/wiki/Contribution guide - Validate module locally.md b/docs/wiki/Contribution guide - Validate module locally.md index 73b70a9ed9..2d53990eff 100644 --- a/docs/wiki/Contribution guide - Validate module locally.md +++ b/docs/wiki/Contribution guide - Validate module locally.md @@ -23,7 +23,7 @@ If the switch for either the validation test (`-ValidationTest`) or deployment t 1. Create a dictionary to replace all tokens in these parameter files with actual values. This dictionary will consist - of the subscriptionID & managementGroupID of the provided `ValidateOrDeployParameters` object, - add all key-value pairs of the `-AdditionalTokens` object to it, - - and optionally also add all key-value pairs specified in the `settings.json`'s `parameterFileTokens` object + - and optionally also add all key-value pairs specified in the `settings.yml`, under the 'local tokens settings'. 1. If the `-ValidationTest` parameter was set, it runs a deployment validation using the `Test-TemplateDeployment` script. 1. If the `-DeploymentTest` parameter was set, it runs a deployment using the `New-TemplateDeployment` script (with no retries). 1. As a final step, it rolls the parameter files back to their original state if either the `-ValidationTest` or `-DeploymentTest` parameters were provided. diff --git a/docs/wiki/Fetching latest changes - Scenario 2 Module library and CI environment.md b/docs/wiki/Fetching latest changes - Scenario 2 Module library and CI environment.md index 2a0eee2942..17e2969c21 100644 --- a/docs/wiki/Fetching latest changes - Scenario 2 Module library and CI environment.md +++ b/docs/wiki/Fetching latest changes - Scenario 2 Module library and CI environment.md @@ -52,7 +52,7 @@ Clone/download CARML repository to create a local copy of it, as explained in Az Personalize files with your specific settings: 1. [Update default name prefix](./Getting%20started%20-%20Scenario%202%20Onboard%20module%20library%20and%20CI%20environment#31-update-default-nameprefix) -1. Update variables file ([`global.variables.yml`](https://github.com/Azure/ResourceModules/blob/main/global.variables.yml)) as explained in [Set up variables file](./Getting%20started%20-%20Scenario%202%20Onboard%20module%20library%20and%20CI%20environment#322-set-up-variables-file) +1. Update settings file ([`settings.yml`](https://github.com/Azure/ResourceModules/blob/main/settings.yml)) as explained in [Set up variables file](./Getting%20started%20-%20Scenario%202%20Onboard%20module%20library%20and%20CI%20environment#322-set-up-variables-file) # 3. (Optional) Re-apply your customizations diff --git a/docs/wiki/Getting started - Check NamePrefix availability.md b/docs/wiki/Getting started - Check NamePrefix availability.md index 03512cb6b9..98aca48592 100644 --- a/docs/wiki/Getting started - Check NamePrefix availability.md +++ b/docs/wiki/Getting started - Check NamePrefix availability.md @@ -1,4 +1,4 @@ -The `'Test-NamePrefixAvailability'` function provides you with the capability to test if the [`namePrefix`](./The%20CI%20environment%20-%20Token%20replacement#optional-local-custom-tokens), specified in the [`settings.json`](https://github.com/Azure/ResourceModules/blob/main/settings.json) file, conflicts with any existing resource. +The `'Test-NamePrefixAvailability'` function provides you with the capability to test if the [`namePrefix`](./The%20CI%20environment%20-%20Token%20replacement#optional-local-custom-tokens), specified in the [`settings.yml`](https://github.com/Azure/ResourceModules/blob/main/settings.yml) file, conflicts with any existing resource. --- diff --git a/docs/wiki/Getting started - Scenario 2 Onboard module library and CI environment.md b/docs/wiki/Getting started - Scenario 2 Onboard module library and CI environment.md index f8f15bd291..96e98f3bed 100644 --- a/docs/wiki/Getting started - Scenario 2 Onboard module library and CI environment.md +++ b/docs/wiki/Getting started - Scenario 2 Onboard module library and CI environment.md @@ -80,6 +80,12 @@ Alternatively, you can also do the same with a specific release by navigating to # 3. Configure the CI environment +CARML uses a single ([`settings.yml`](https://github.com/Azure/ResourceModules/blob/main/settings.yml)) file for configuring the CI environment. To replicate the CI environment locally on your machine, and perform local modules tests and validations, you must install the ([powershell-yaml](https://www.powershellgallery.com/packages/powershell-yaml/0.4.2)) module from the PowerShell gallery by executing the following on your PowerShell CLI: + +```powershell +Install-Module -Name powershell-yaml +``` + To configure the CI environment you have to perform several steps: - [3.1 Update default `namePrefix`](#31-update-default-nameprefix) - [3.2 Set up CI-environment-specific configuration](#32-set-up-ci-environment-specific-configuration) @@ -92,26 +98,28 @@ To lower the barrier to entry and allow users to easily define their own naming > **Note:** This prefix is only used by the CI environment you validate your modules in, and doesn't affect the naming of any resources you deploy as part of any multi-module solutions (applications/workloads) based on the modules. -Each pipeline in CARML deploying resources uses a logic that automatically replaces "tokens" (i.e., placeholders) in any parameter file. Tokens are stored in only a few central locations to facilitate maintenance (e.g., local `settings.json`, repository secrets or variable groups). +Each pipeline in CARML deploying resources uses a logic that automatically replaces "tokens" (i.e., placeholders) in any parameter file. Tokens are stored in only a few central locations to facilitate maintenance (e.g., local `settings.yml`, repository secrets or variable groups). To update the `namePrefix`, perform the following steps: -1. Open the `settings.json` file in the repository's root directory. +1. Open the `settings.yml` file in the repository's root directory. -1. Replace the `"value": "<...>"` of token `namePrefix` with a different value: +1. Replace the value of the `localToken_namePrefix` with a different value: - ```json - { - "name": "namePrefix", - "value": "<...>" - } + ```yml + localToken_namePrefix: 'cntso' ``` + > **Note:** The value should be a 3-5 character long string like `cntso`. Longer strings are not recommended as they may conflict with Azure resource name length restrictions. + > **Note:** The CI pipelines automatically removes the `localToken_` prefix from the name when processing the tokens replacement. + > **Note:** We highly encourage you to use the 'Check namePrefix availability' script ([see the documentation here](./Getting%20started%20-%20Check%20NamePrefix%20availability)) to check if the intended resource name will be available, based on the provided prefix. For further information on the token replacement logic, please refer to the corresponding [Token replacement](./The%20CI%20environment%20-%20Token%20replacement) section. + If you do not prefer to set the `namePrefix` locally for your CI environment. You can optionally set it as a GitHub Secret or add it to the ADO variable group as the key `TOKEN_NAMEPREFIX` and its value `your name prefix value`, and this is only applied if the `localToken_namePrefix` in the [settings.yml](https://github.com/Azure/ResourceModules/blob/main/settings.yml) is left empty. + ## 3.2 Set up CI-environment-specific configuration While the concepts are the same, the configuration of the CI environment can differ drastically depending on the DevOps environment in which you want to register and run your pipelines. Following, you can find instructions on how to perform the remaining configuration in the corresponding DevOps environment: @@ -136,6 +144,7 @@ To use the environment's pipelines you should use the information you gathered d | `ARM_TENANT_ID` | `9734cec9-4384-445b-bbb6-767e7be6e5ec` | The tenant ID of the Azure Active Directory tenant to test-deploy modules in. | | `AZURE_CREDENTIALS` | `{"clientId": "4ce8ce4c-cac0-48eb-b815-65e5763e2929", "clientSecret": "", "subscriptionId": "d0312b25-9160-4550-914f-8738d9b5caf5", "tenantId": "9734cec9-4384-445b-bbb6-767e7be6e5ec" }` | The login credentials of the deployment principal used to log into the target Azure environment to test in. The format is described [here](https://github.com/Azure/login#configure-deployment-credentials). | | `PLATFORM_REPO_UPDATE_PAT` | `` | A private access token (PAT) with enough permissions assigned to it to push into the main branch. This PAT is leveraged by pipelines that automatically generate ReadMe files to keep them up to date. | +| `TOKEN_NAMEPREFIX` | `cntso` | Optional. If you specify the name prefix token here, it is only applied if the `localToken_namePrefix` specified in the [settings.yml](https://github.com/Azure/ResourceModules/blob/main/settings.yml) is left empty. |

@@ -167,9 +176,9 @@ To use the environment's pipelines you should use the information you gathered d > > **Make sure you create this object as one continuous string as shown above** - using the information you collected during [Step 1](#1-configure-your-azure-environment). Failing to format the secret as above, causes GitHub to consider each line of the json object as a separate secret string. If you're interested, you can find more information about this object [here](https://github.com/Azure/login#configure-deployment-credentials). -### 3.2.2 Set up variables file +### 3.2.2 Set up settings file -The primary pipeline variable file ([`global.variables.yml`](https://github.com/Azure/ResourceModules/blob/main/global.variables.yml)) hosts the fundamental pipeline configuration. In the file you will find and can configure settings such as: +The primary pipeline settings file ([`settings.yml`](https://github.com/Azure/ResourceModules/blob/main/settings.yml)) hosts the fundamental pipeline configuration. In the file you will find and can configure settings such as:

General @@ -266,6 +275,7 @@ Based on the information you gathered in the [Azure setup](#1-configure-your-azu | `ARM_MGMTGROUP_ID` | `de33a0e7-64d9-4a94-8fe9-b018cedf1e05` | The group ID of the management group to test-deploy modules in. | | `ARM_SUBSCRIPTION_ID` | `d0312b25-9160-4550-914f-8738d9b5caf5` | The ID of the subscription to test-deploy modules in. | | `ARM_TENANT_ID` | `9734cec9-4384-445b-bbb6-767e7be6e5ec` | The tenant ID of the Azure Active Directory tenant to test-deploy modules in. | +| `TOKEN_NAMEPREFIX` | `` | Optional. If you specify the name prefix token here, it is only applied if the `localToken_namePrefix` specified in the [settings.yml](https://github.com/Azure/ResourceModules/blob/main/settings.yml) is left empty. | Make sure its name matches the `group` reference used in the module pipelines. For example @@ -276,9 +286,9 @@ variables: > **Note:** If you need to use different name than `PLATFORM_VARIABLES`, make sure to search & replace all references with the new name. -### 3.2.3 Set up variables file +### 3.2.3 Set up settings file -The primary pipeline variable file ([`global.variables.yml`](https://github.com/Azure/ResourceModules/blob/main/global.variables.yml)) hosts the fundamental pipeline configuration. In the file, you will find and can configure information such as: +The primary pipeline settings file ([`settings.yml`](https://github.com/Azure/ResourceModules/blob/main/settings.yml)) hosts the fundamental pipeline configuration. In the file, you will find and can configure information such as:
General @@ -343,7 +353,7 @@ This section will explain what is required to publish the modules to [Azure Arti #### The dependent components are 1. An Azure DevOps organization and project 1. An Azure DevOps artifacts feed - > Note: The default feed name is `ResourceModules` as configured in the [`global.variables.yml`](https://github.com/Azure/ResourceModules/blob/main/global.variables.yml) file's variable `vstsFeedName`. Update the value here if you want to use a different name, but make sure it matches the name of the artifact feed created in Azure DevOps. + > Note: The default feed name is `ResourceModules` as configured in the [`settings.yml`](https://github.com/Azure/ResourceModules/blob/main/settings.yml) file's variable `vstsFeedName`. Update the value here if you want to use a different name, but make sure it matches the name of the artifact feed created in Azure DevOps. 1. An Azure DevOps project to host the artifact feed > Note: There are a couple options to consider when setting up an Azure Artifact feed. For example, organization-scoped feeds vs project-scoped feeds. Please see what option suits your needs by reviewing the [feeds](https://docs.microsoft.com/en-us/azure/devops/artifacts/concepts/feeds?view=azure-devops) document first. 1. If you chose the feed to be project-scoped, you will need the Project Build Service account to have `Contributor` access to publish to the Azure Artifacts feed. To set this, follow the [Pipeline permission](https://docs.microsoft.com/en-us/azure/devops/artifacts/feeds/feed-permissions?view=azure-devops#pipelines-permissions) steps. diff --git a/docs/wiki/Solution creation.md b/docs/wiki/Solution creation.md index b34c2b1558..341626d393 100644 --- a/docs/wiki/Solution creation.md +++ b/docs/wiki/Solution creation.md @@ -404,7 +404,7 @@ on: env: AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }} removeDeployment: false - variablesPath: 'global.variables.yml' + variablesPath: 'settings.yml' jobs: job_deploy_multi_repo_solution: diff --git a/docs/wiki/The CI environment - Pipeline design.md b/docs/wiki/The CI environment - Pipeline design.md index a74b301a04..426d097c92 100644 --- a/docs/wiki/The CI environment - Pipeline design.md +++ b/docs/wiki/The CI environment - Pipeline design.md @@ -72,7 +72,7 @@ In addition, workflows leverage the following composite actions: | Composite Action | Description | | - | - | | **getWorkflowInput** | This action allows fetching workflow input values from the module's workflow file, even if the pipeline was not triggered via a `workflow_dispatch` action. Without it, we would not be able to process the contained information and would need to duplicate the configuration as workflow variables. Such input values are for example, the removal switch `removeDeployment`. | -| **setEnvironmentVariables** | This action parses the variables file ([`global.variables.yml`](https://github.com/Azure/ResourceModules/blob/main/global.variables.yml)) and sets the key-value pairs in the `variables` list as environment variables. | +| **setEnvironmentVariables** | This action parses the settings file ([`settings.yml`](https://github.com/Azure/ResourceModules/blob/main/settings.yml)) and sets the key-value pairs in the `variables` list as environment variables. | Technical documentation for each composite action, such as required input and output variables, is included in each `action.yml` file located in path `.github/actions/templates`. diff --git a/docs/wiki/The CI environment - Token replacement.md b/docs/wiki/The CI environment - Token replacement.md index 1874be559e..115e46ee96 100644 --- a/docs/wiki/The CI environment - Token replacement.md +++ b/docs/wiki/The CI environment - Token replacement.md @@ -39,37 +39,38 @@ These are tokens constructed from environment variables, which are defined in th ## (Optional) Local Custom Tokens -These are tokens defined in the Git Repository inside a [Settings.json](https://github.com/Azure/ResourceModules/blob/main/settings.json) file. This allows creating tokens that are local and updatable via Source Control mechanisms. Here is an example on where these tokens are stored. You can add key-value pairs as required: +These are tokens defined in the Git Repository inside a [settings.yml](https://github.com/Azure/ResourceModules/blob/main/settings.yml) file. This allows creating tokens that are local and updatable via Source Control mechanisms. Here is an example on where these tokens are stored. You can add key-value pairs as required: + +```yml +localToken_tokenA: 'foo' +localToken_tokenB: 'bar' -```json -"localTokens": { - "tokens": [ - { - "name": "tokenName", - "value": "tokenValue", - "metadata":{ - "description":"token description" - } - } - ] -} ``` +> **Note:** The CI pipelines automatically removes the `localToken_` prefix from the name when processing the tokens replacement. This means that your actual token name is `tokenA` and NOT `localToken_tokenA`. + Let's say you'd want to use this token inside a Key Vault parameter file, to deploy the Key Vault with a name that contains this token: ```json "parameters": { "name": { - "value": "<>-keyVault" + "value": "<>-keyVault-<>" } } ``` -Once the Key Vault is deployed, you'll notice that the Key Vault name in Azure will be `tokenValue-keyVault` +Once the Key Vault is deployed, you'll notice that the Key Vault name in Azure will be `foo-keyVault-bar` + +The token prefix `'<<'` and suffix `'>>'` in the above example are also configurable in the [settings.yml](https://github.com/Azure/ResourceModules/blob/main/settings.yml) file and are used to identify the tokens in the files. + +The solution comes with one predefined local token `namePrefix`. This token is leveraged in most of the parameter & test files for deployments. It allows using a consistent naming prefix that is applied to all resources being tested. There are two ways this token can be set and one will take precedence over the other: + +1. By updating the value of `localToken_namePrefix` in the [settings.yml](https://github.com/Azure/ResourceModules/blob/main/settings.yml), which then becomes `namePrefix` when the pipelines run. + +1. Creating a GitHub Secret / ADO variable called `TOKEN_NAMEPREFIX`, which then becomes `namePrefix` when the pipelines run. If created as a secret or ADO variable, it is only applied if the `localToken_namePrefix` in the [settings.yml](https://github.com/Azure/ResourceModules/blob/main/settings.yml) is left empty. -The token prefix `'<<'` and suffix `'>>'` in the above example are also configurable in the [Settings.json](https://github.com/Azure/ResourceModules/blob/main/settings.json) file. -The solution comes with one predefined local token `namePrefix`. When validating modules through the CI environment, you must update it to a custom value as described in the [Update default nameprefix](./Getting%20started%20-%20Scenario%202%20Onboard%20module%20library%20and%20CI%20environment#31-update-default-nameprefix) paragraph. This is done to avoid conflicts with resources requiring a globally unique name, such as storage accounts or Key Vaults. +When validating modules through the CI environment, you must update it to a custom value as described in the [Update default nameprefix](./Getting%20started%20-%20Scenario%202%20Onboard%20module%20library%20and%20CI%20environment#31-update-default-nameprefix) paragraph. This is done to avoid conflicts with resources requiring a globally unique name, such as storage accounts or Key Vaults. > **Note**: Do not store sensitive information in this location as they will be present in your Git History. Follow best [practices and guidelines](https://docs.microsoft.com/en-us/azure/azure-resource-manager/templates/best-practices#security-recommendations-for-parameters) on how to handle secrets in template deployments. @@ -86,23 +87,23 @@ The below diagram illustrates the Token Replacement Functionality via the [valid tokenReplacement - **1A.** The user creates default tokens as [GitHub Secrets](https://docs.github.com/en/actions/security-guides/encrypted-secrets#creating-encrypted-secrets-for-a-repository) or [Azure DevOps Pipeline Variables](https://docs.microsoft.com/en-us/azure/devops/pipelines/library/?view=azure-devops), that are injected as environment variables. -- **1B.** The user can also create local custom Parameter File Tokens in the [Settings.json](https://github.com/Azure/ResourceModules/blob/main/settings.json) under the `localTokens` - `tokens` property. -- **2.** The parameter files can now be tokenized as per required value. And the token format can look like `<>`. Example: +- **1B.** The user can also create local custom Parameter File Tokens in the [settings.yml](https://github.com/Azure/ResourceModules/blob/main/settings.yml). Tokens start with `localTokens_` and then followed by the actual token name (e.g. `tokenA`). This prefix gets removed by the CI leaving the original token name +- **2.** The parameter files can now be tokenized as per required value. And the token format can look like `<>`. Example: ```json "adminPassword": { "reference": { "keyVault": { - "id": "/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.KeyVault/vaults/<>-keyVault" + "id": "/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.KeyVault/vaults/<>-keyVault" }, - "secretName": "<>" + "secretName": "<>" } } ``` - **3A.** The Replace Tokens function gets the default tokens from the environment variables. > Default Tokens are harder to scale as they are explicitly defined in deploy/validate task, workflows and pipelines, and these components must be updated as you create more tokens. -- **3B.** The Replace Tokens function gets local custom tokens from the [Settings.json](https://github.com/Azure/ResourceModules/blob/main/settings.json). +- **3B.** The Replace Tokens function gets local custom tokens from the [settings.yml](https://github.com/Azure/ResourceModules/blob/main/settings.yml). > Local Tokens are easier to scale as you just need to define them in this file without adding new environment variables or modifying workflows or tasks. - **3C.** The Replace Tokens function gets the Module Parameter file (tokenized and not deployable) and then all tokens are processed for replacement. diff --git a/docs/wiki/The library - Module design.md b/docs/wiki/The library - Module design.md index 28fc71a331..673299cde8 100644 --- a/docs/wiki/The library - Module design.md +++ b/docs/wiki/The library - Module design.md @@ -542,7 +542,7 @@ Each module in CARML contains a `defaultTelemetry` deployment `'pid--${un This resource enables the CARML product team to query the number of deployments of a given template from Azure - and as such, get insights into its adoption. -When using CARML's CI environment you can enable/disable this deployment by switching the `enableDefaultTelemetry` setting in the `settings.json` file in the repository's root. This value is automatically injected into each individual deployment that is performed as part of the environment's pipeline. +When using CARML's CI environment you can enable/disable this deployment by switching the `enableDefaultTelemetry` setting in the `settings.yml` file in the repository's root. This value is automatically injected into each individual deployment that is performed as part of the environment's pipeline. When consuming the modules outside of CARML's pipelines you can either - Set the parameter to a default value of `'false'` diff --git a/docs/wiki/media/CIEnvironment/tokenReplacement.png b/docs/wiki/media/CIEnvironment/tokenReplacement.png index 87e36be95c..caefce25d3 100644 Binary files a/docs/wiki/media/CIEnvironment/tokenReplacement.png and b/docs/wiki/media/CIEnvironment/tokenReplacement.png differ diff --git a/settings.json b/settings.json deleted file mode 100644 index 9198a0f7d0..0000000000 --- a/settings.json +++ /dev/null @@ -1,19 +0,0 @@ -{ - "parameterFileTokens": { - "tokenPrefix": "<<", - "tokenSuffix": ">>", - "localTokens": [ - { - "name": "namePrefix", - "value": "carml", - "metadata": { - "description": "A 3-5 character length string, included in the resources names" - } - } - ] - }, - // Enable or disable CARMLs CI telemetry tracking. - // Note: This tracks the number of deployments only - // For more information see: https://github.com/Azure/ResourceModules/wiki/The%20library%20-%20Module%20design#telemetry - "enableDefaultTelemetry": true -} diff --git a/global.variables.yml b/settings.yml similarity index 82% rename from global.variables.yml rename to settings.yml index 30bdb1e088..ab84c78065 100644 --- a/global.variables.yml +++ b/settings.yml @@ -3,6 +3,26 @@ variables: ################################################## Common Variables ####################################################### ########################################################################################################################### + # Enable or disable CARMLs CI telemetry tracking. Note: This tracks the number of deployments only. + # See: https://github.com/Azure/ResourceModules/wiki/The%20library%20-%20Module%20design#telemetry + enableDefaultTelemetry: true + + ###################################### + # Local tokens settings + ###################################### + + # the 'localToken_' prefix will be removed from the key name when the pipelines run. + # e.g. if you have a token in your parameter file as <>, then the token defined in this file looks like "localToken_customKey": 'value' + localToken_namePrefix: '' # A 3-5 character length unique string, included in the resources names (e.g. 'cntso'). Used for local module testing and pipelines. + + ###################################### + # global tokens settings + ###################################### + + # this determines the starting prefix and ending suffix of the token in your file. + tokenPrefix: '<<' + tokenSuffix: '>>' + ###################################### # Common folders and file paths ###################################### diff --git a/utilities/pipelines/resourceRemoval/helper/Get-DependencyResourceNameList.ps1 b/utilities/pipelines/resourceRemoval/helper/Get-DependencyResourceNameList.ps1 index 92f7b20921..b1d10bd762 100644 --- a/utilities/pipelines/resourceRemoval/helper/Get-DependencyResourceNameList.ps1 +++ b/utilities/pipelines/resourceRemoval/helper/Get-DependencyResourceNameList.ps1 @@ -34,26 +34,19 @@ function Get-DependencyResourceNameList { } # Replace tokens in dependency parameter files - $Settings = Get-Content -Path (Join-Path $repoRootPath 'settings.json') | ConvertFrom-Json -AsHashtable + $GlobalVariablesObject = Get-Content -Path (Join-Path $repoRootPath 'settings.yml') | ConvertFrom-Yaml -ErrorAction Stop | Select-Object -ExpandProperty variables - # Add local tokens - if ($Settings.parameterFileTokens.localTokens) { - $tokenMap = @{} - foreach ($token in $Settings.parameterFileTokens.localTokens) { - $tokenMap += @{ $token.name = $token.value } - } - Write-Verbose ('Using local tokens [{0}]' -f ($tokenMap.Keys -join ', ')) - - $ConvertTokensInputs = @{ - FilePathList = $parameterFilePaths - Tokens = $tokenMap - TokenPrefix = $Settings.parameterFileTokens.tokenPrefix - TokenSuffix = $Settings.parameterFileTokens.tokenSuffix - Verbose = $false - } - $null = Convert-TokensInFileList @ConvertTokensInputs + # Construct Token Configuration Input + $tokenConfiguration = @{ + FilePathList = $parameterFilePaths + Tokens = @{} + TokenPrefix = $GlobalVariablesObject | Select-Object -ExpandProperty tokenPrefix + TokenSuffix = $GlobalVariablesObject | Select-Object -ExpandProperty tokenSuffix + Verbose = $false } + $null = Convert-TokensInFileList @tokenConfiguration + $dependencyResourceNames = [System.Collections.ArrayList]@() foreach ($parameterFilePath in $parameterFilePaths) { $paramFileContent = ConvertFrom-Json (Get-Content -Path $parameterFilePath -Raw) @@ -64,10 +57,7 @@ function Get-DependencyResourceNameList { if ($Settings.parameterFileTokens.localTokens) { Write-Verbose 'Restoring Tokens' - $ConvertTokensInputs += @{ - SwapValueWithName = $true - } - $null = Convert-TokensInFileList @ConvertTokensInputs + $null = Convert-TokensInFileList @tokenConfiguration -SwapValueWithName $true } return $dependencyResourceNames diff --git a/utilities/pipelines/staticValidation/module.tests.ps1 b/utilities/pipelines/staticValidation/module.tests.ps1 index e636782d53..9ba3a2b5dc 100644 --- a/utilities/pipelines/staticValidation/module.tests.ps1 +++ b/utilities/pipelines/staticValidation/module.tests.ps1 @@ -9,22 +9,19 @@ param ( [Parameter(Mandatory = $false)] [string] $repoRootPath = (Get-Item $PSScriptRoot).Parent.Parent.Parent.FullName, - # Tokens to test for (i.e. their value should not be used in the parameter files, but their placeholder) + # Dedicated Tokens configuration hashtable containing the tokens and token prefix and suffix. [Parameter(Mandatory = $false)] - [hashtable] $enforcedTokenList = @{} + [hashtable] $tokenConfiguration = @{} ) Write-Verbose ("repoRootPath: $repoRootPath") -Verbose Write-Verbose ("moduleFolderPaths: $($moduleFolderPaths.count)") -Verbose - -$script:Settings = Get-Content -Path (Join-Path $repoRootPath 'settings.json') | ConvertFrom-Json -AsHashtable $script:RGdeployment = 'https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#' $script:Subscriptiondeployment = 'https://schema.management.azure.com/schemas/2018-05-01/subscriptionDeploymentTemplate.json#' $script:MGdeployment = 'https://schema.management.azure.com/schemas/2019-08-01/managementGroupDeploymentTemplate.json#' $script:Tenantdeployment = 'https://schema.management.azure.com/schemas/2019-08-01/tenantDeploymentTemplate.json#' $script:moduleFolderPaths = $moduleFolderPaths -$script:enforcedTokenList = $enforcedTokenList # For runtime purposes, we cache the compiled template in a hashtable that uses a formatted relative module path as a key $script:convertedTemplates = @{} @@ -158,7 +155,6 @@ Describe 'File/folder tests' -Tag Modules { } } } - Describe 'Readme tests' -Tag Readme { Context 'Readme content tests' { @@ -596,7 +592,7 @@ Describe 'Deployment template tests' -Tag Template { testFile_AllParameterNames = $deploymentTestFile_AllParameterNames templateFile_AllParameterNames = $TemplateFile_AllParameterNames templateFile_RequiredParametersNames = $TemplateFile_RequiredParametersNames - tokenSettings = $Settings.parameterFileTokens + tokenConfiguration = $tokenConfiguration } } } @@ -1015,15 +1011,16 @@ Describe 'Deployment template tests' -Tag Template { foreach ($moduleFolderPath in $moduleFolderPaths) { if (Test-Path (Join-Path $moduleFolderPath '.test')) { - $testFilePaths = (Get-ChildItem (Join-Path -Path $moduleFolderPath -ChildPath '.parameters.json') -Recurse -Force).FullName - foreach ($testFilePath in $testFilePaths) { - foreach ($token in $enforcedTokenList.Keys) { + $TestFilePaths = (Get-ChildItem (Join-Path -Path $moduleFolderPath -ChildPath '.test') -Recurse -Force).FullName + foreach ($TestFilePath in $TestFilePaths) { + foreach ($token in $tokenConfiguration.Tokens.Keys) { $parameterFileTokenTestCases += @{ - parameterFilePath = $testFilePath - parameterFileName = Split-Path $testFilePath -Leaf - tokenSettings = $Settings.parameterFileTokens + parameterFilePath = $TestFilePath + parameterFileName = Split-Path $TestFilePath -Leaf + tokenPrefix = $tokenConfiguration.TokenPrefix + tokenSuffix = $tokenConfiguration.TokenSuffix tokenName = $token - tokenValue = $enforcedTokenList[$token] + tokenValue = $tokenConfiguration.Tokens[$token] moduleFolderName = $moduleFolderPath.Replace('\', '/').Split('/modules/')[1] } } @@ -1031,17 +1028,18 @@ Describe 'Deployment template tests' -Tag Template { } } - It '[] [Tokens] Parameter file [] should not contain the plain value for token [] guid' -TestCases $parameterFileTokenTestCases { + It '[] [Tokens] Parameter file [] should not contain the plain value for token []' -TestCases $parameterFileTokenTestCases { param ( - [string] $testFilePath, + [string] $parameterFilePath, [string] $parameterFileName, - [hashtable] $tokenSettings, + [string] $tokenPrefix, + [string] $tokenSuffix, [string] $tokenName, [string] $tokenValue, [string] $moduleFolderName ) - $ParameterFileTokenName = -join ($tokenSettings.tokenPrefix, $tokenName, $tokenSettings.tokenSuffix) - $ParameterFileContent = Get-Content -Path $testFilePath + $ParameterFileTokenName = -join ($tokenPrefix, $tokenName, $tokenSuffix) + $ParameterFileContent = Get-Content -Path $parameterFilePath $incorrectReferencesFound = $ParameterFileContent | Select-String -Pattern $tokenValue -AllMatches if ($incorrectReferencesFound.Matches) { diff --git a/utilities/pipelines/tokensReplacement/Convert-TokensInFileList.ps1 b/utilities/pipelines/tokensReplacement/Convert-TokensInFileList.ps1 index 84fc839615..6d6edf2a75 100644 --- a/utilities/pipelines/tokensReplacement/Convert-TokensInFileList.ps1 +++ b/utilities/pipelines/tokensReplacement/Convert-TokensInFileList.ps1 @@ -37,7 +37,7 @@ function Convert-TokensInFileList { [CmdletBinding()] param ( [parameter( - Mandatory = $true, + Mandatory = $true, ValueFromPipeline = $true )] [String[]] $FilePathList, @@ -86,7 +86,7 @@ function Convert-TokensInFileList { # Prepare Input to Token Converter Function $ConvertTokenListFunctionInput = @{ FilePath = $FilePath - TokenNameValueObject = $FilteredTokens + TokenNameValueObject = $FilteredTokens.Clone() SwapValueWithName = $SwapValueWithName } if ($OutputDirectory) { diff --git a/utilities/tools/Test-ModuleLocally.ps1 b/utilities/tools/Test-ModuleLocally.ps1 index 7ded5e9c13..c6d459410e 100644 --- a/utilities/tools/Test-ModuleLocally.ps1 +++ b/utilities/tools/Test-ModuleLocally.ps1 @@ -1,5 +1,4 @@ - -<# +<# .SYNOPSIS This function helps with testing a module locally @@ -115,7 +114,7 @@ function Test-ModuleLocally { [string] $TemplateFilePath, [Parameter(Mandatory = $false)] - [string] $testFilePath = (Join-Path (Split-Path $TemplateFilePath -Parent) '.test'), + [string] $ParameterFilePath = (Join-Path (Split-Path $TemplateFilePath -Parent) '.test'), [Parameter(Mandatory = $false)] [string] $moduleTestFilePath = 'utilities/pipelines/staticValidation/module.tests.ps1', @@ -148,32 +147,72 @@ function Test-ModuleLocally { } process { + # Find Test Parameter Files + # ------------------------- + if ((Get-Item -Path $ParameterFilePath) -is [System.IO.DirectoryInfo]) { + $moduleTestFiles = (Get-ChildItem -Path $ParameterFilePath).FullName + } else { + $moduleTestFiles = @($ParameterFilePath) + } + + # Construct Token Configuration Input + $GlobalVariablesObject = Get-Content -Path (Join-Path $PSScriptRoot '..\..\settings.yml') | ConvertFrom-Yaml -ErrorAction Stop | Select-Object -ExpandProperty variables + $tokenConfiguration = @{ + FilePathList = $moduleTestFiles + Tokens = @{} + TokenPrefix = $GlobalVariablesObject | Select-Object -ExpandProperty tokenPrefix + TokenSuffix = $GlobalVariablesObject | Select-Object -ExpandProperty tokenSuffix + } + + # Add Enforced Tokens + $enforcedTokenList = @{} + if ($ValidateOrDeployParameters.ContainsKey('subscriptionId')) { + $enforcedTokenList['subscriptionId'] = $ValidateOrDeployParameters.SubscriptionId + } + if ($ValidateOrDeployParameters.ContainsKey('managementGroupId')) { + $enforcedTokenList['managementGroupId'] = $ValidateOrDeployParameters.ManagementGroupId + } + if ($AdditionalTokens.ContainsKey('deploymentSpId')) { + $enforcedTokenList['deploymentSpId'] = $AdditionalTokens['deploymentSpId'] + } + if ($AdditionalTokens.ContainsKey('tenantId')) { + $enforcedTokenList['tenantId'] = $AdditionalTokens['tenantId'] + } + $tokenConfiguration.Tokens += $enforcedTokenList + + # Add local (source control) tokens + foreach ($localToken in ($GlobalVariablesObject.Keys | ForEach-Object { if ($PSItem.contains('localToken_')) { $PSItem } })) { + $tokenConfiguration.Tokens[$localToken.Replace('localToken_', '', 'OrdinalIgnoreCase')] = $GlobalVariablesObject.$localToken + } + + # Add Other Parameter File Tokens (For Testing) + $AdditionalTokens.Keys | ForEach-Object { + if (-not $tokenConfiguration.Tokens.ContainsKey($PSItem)) { + $tokenConfiguration.Tokens[$PSItem] = $AdditionalTokens.$PSItem + } + } + ################ # PESTER Tests # ################ if ($PesterTest) { - Write-Verbose "Pester-test module: $ModuleName" - try { - $enforcedTokenList = @{} - if ($ValidateOrDeployParameters.ContainsKey('subscriptionId')) { - $enforcedTokenList['subscriptionId'] = $ValidateOrDeployParameters.SubscriptionId - } - if ($ValidateOrDeployParameters.ContainsKey('managementGroupId')) { - $enforcedTokenList['managementGroupId'] = $ValidateOrDeployParameters.ManagementGroupId - } - if ($AdditionalTokens.ContainsKey('deploymentSpId')) { - $enforcedTokenList['deploymentSpId'] = $AdditionalTokens['deploymentSpId'] - } - if ($AdditionalTokens.ContainsKey('tenantId')) { - $enforcedTokenList['tenantId'] = $AdditionalTokens['tenantId'] - } + Write-Verbose "Pester Testing Module: $ModuleName" + # Construct Pester Token Configuration Input + $PesterTokenConfiguration = @{ + FilePathList = $moduleTestFiles + Tokens = $enforcedTokenList + TokenPrefix = $GlobalVariablesObject | Select-Object -ExpandProperty tokenPrefix + TokenSuffix = $GlobalVariablesObject | Select-Object -ExpandProperty tokenSuffix + } + + try { Invoke-Pester -Configuration @{ Run = @{ Container = New-PesterContainer -Path (Join-Path $repoRootPath $moduleTestFilePath) -Data @{ - repoRootPath = $repoRootPath - moduleFolderPaths = Split-Path $TemplateFilePath -Parent - enforcedTokenList = $enforcedTokenList + repoRootPath = $repoRootPath + moduleFolderPaths = Split-Path $TemplateFilePath -Parent + tokenConfiguration = $PesterTokenConfiguration } } Output = @{ @@ -188,55 +227,20 @@ function Test-ModuleLocally { ################################# # Validation & Deployment tests # ################################# + if (($ValidationTest -or $DeploymentTest) -and $ValidateOrDeployParameters) { + # Invoke Token Replacement Functionality and Convert Tokens in Parameter Files + $null = Convert-TokensInFileList @tokenConfiguration + # Find Test Parameter Files # ------------------------- - if ((Get-Item -Path $testFilePath) -is [System.IO.DirectoryInfo]) { - $moduleTestFiles = (Get-ChildItem -Path $testFilePath).FullName + if ((Get-Item -Path $ParameterFilePath) -is [System.IO.DirectoryInfo]) { + $moduleTestFiles = (Get-ChildItem -Path $ParameterFilePath).FullName } else { - $moduleTestFiles = @($testFilePath) - } - - # Replace parameter file tokens - # ----------------------------- - - # Default Tokens - $ConvertTokensInputs = @{ - FilePathList = $moduleTestFiles - Tokens = @{ - subscriptionId = $ValidateOrDeployParameters.SubscriptionId - managementGroupId = $ValidateOrDeployParameters.ManagementGroupId - } - } - - # Add Other Parameter File Tokens (For Testing) - if ($AdditionalTokens) { - $ConvertTokensInputs.Tokens += $AdditionalTokens - } - - # Tokens in settings.json - $settingsFilePath = Join-Path (Get-Item $PSScriptRoot).Parent.Parent 'settings.json' - if (Test-Path $settingsFilePath) { - $Settings = Get-Content -Path $settingsFilePath -Raw | ConvertFrom-Json -AsHashtable - $ConvertTokensInputs += @{ - TokenPrefix = $Settings.parameterFileTokens.tokenPrefix - TokenSuffix = $Settings.parameterFileTokens.tokenSuffix - } - - if ($Settings.parameterFileTokens.localTokens) { - $tokenMap = @{} - foreach ($token in $Settings.parameterFileTokens.localTokens) { - $tokenMap += @{ $token.name = $token.value } - } - Write-Verbose ('Using local tokens [{0}]' -f ($tokenMap.Keys -join ', ')) -Verbose - $ConvertTokensInputs.Tokens += $tokenMap - } + $moduleTestFiles = @($ParameterFilePath) } - # Invoke Token Replacement Functionality and Convert Tokens in Parameter Files - $null = Convert-TokensInFileList @ConvertTokensInputs - # Deployment & Validation Testing # ------------------------------- $functionInput = @{ @@ -247,6 +251,7 @@ function Test-ModuleLocally { managementGroupId = $ValidateOrDeployParameters.ManagementGroupId Verbose = $true } + try { # Validate template # ----------------- @@ -258,19 +263,19 @@ function Test-ModuleLocally { } } - # Deploy template # --------------- if ($DeploymentTest) { $functionInput['retryLimit'] = 1 # Overwrite default of 3 # Loop through test parameter files foreach ($moduleTestFile in $moduleTestFiles) { - Write-Verbose ('Deploy module [{0}] with test file [{1}]' -f $ModuleName, (Split-Path $moduleTestFile -Leaf)) -Verbose + Write-Verbose ('Deploy Module [{0}] with test file [{1}]' -f $ModuleName, (Split-Path $moduleTestFile -Leaf)) -Verbose if ($PSCmdlet.ShouldProcess(('Module [{0}] with test file [{1}]' -f $ModuleName, (Split-Path $moduleTestFile -Leaf)), 'Deploy')) { New-TemplateDeployment @functionInput -ParameterFilePath $moduleTestFile } } } + } catch { Write-Error $_ } finally { @@ -279,10 +284,7 @@ function Test-ModuleLocally { if (($ValidationTest -or $DeploymentTest) -and $ValidateOrDeployParameters) { # Replace Values with Tokens For Repo Updates Write-Verbose 'Restoring Tokens' - $ConvertTokensInputs += @{ - SwapValueWithName = $true - } - $null = Convert-TokensInFileList @ConvertTokensInputs + $null = Convert-TokensInFileList @tokenConfiguration -SwapValueWithName $true } } } diff --git a/utilities/tools/Test-NamePrefixAvailability.ps1 b/utilities/tools/Test-NamePrefixAvailability.ps1 index 7a6c5668ae..0b5b36e5da 100644 --- a/utilities/tools/Test-NamePrefixAvailability.ps1 +++ b/utilities/tools/Test-NamePrefixAvailability.ps1 @@ -61,34 +61,27 @@ function Test-NamePrefixAvailability { # Replace parameter file tokens # ----------------------------- - $ConvertTokensInputs = @{ - FilePathList = $parameterFiles - Tokens = $Tokens - } - # Tokens in settings.json - $settingsFilePath = Join-Path $root 'settings.json' - if (Test-Path $settingsFilePath) { - $Settings = Get-Content -Path $settingsFilePath -Raw | ConvertFrom-Json -AsHashtable - $ConvertTokensInputs += @{ - TokenPrefix = $Settings.parameterFileTokens.tokenPrefix - TokenSuffix = $Settings.parameterFileTokens.tokenSuffix - } + # Tokens in settings.yml + $GlobalVariablesObject = Get-Content -Path (Join-Path $PSScriptRoot '..\..\settings.yml') | ConvertFrom-Yaml -ErrorAction Stop | Select-Object -ExpandProperty variables - if ($Settings.parameterFileTokens.localTokens) { - $tokenMap = @{} - foreach ($token in $Settings.parameterFileTokens.localTokens) { - $tokenMap += @{ $token.name = $token.value } - } - Write-Verbose ('Using local tokens [{0}]' -f ($tokenMap.Keys -join ', ')) -Verbose - $ConvertTokensInputs.Tokens += $tokenMap + # Construct Token Configuration Input + $tokenConfiguration = @{ + FilePathList = $parameterFiles + Tokens = @{ + 'namePrefix' = $namePrefix } + TokenPrefix = $GlobalVariablesObject | Select-Object -ExpandProperty tokenPrefix + TokenSuffix = $GlobalVariablesObject | Select-Object -ExpandProperty tokenSuffix } - try { - # Invoke Token Replacement Functionality and Convert Tokens in Parameter Files - $null = Convert-TokensInFileList @ConvertTokensInputs + # Add additional tokens provided by the user + $tokenConfiguration.Tokens += $Tokens + + # Invoke Token Replacement Functionality and Convert Tokens in Parameter Files + $null = Convert-TokensInFileList @tokenConfiguration + try { # Extract Parameter Names # ----------------------- @@ -179,10 +172,7 @@ function Test-NamePrefixAvailability { # Restore parameter files # ----------------------- Write-Verbose 'Restoring Tokens' - $ConvertTokensInputs += @{ - SwapValueWithName = $true - } - $null = Convert-TokensInFileList @ConvertTokensInputs + $null = Convert-TokensInFileList @tokenConfiguration -SwapValueWithName $true } }