You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+34-9Lines changed: 34 additions & 9 deletions
Original file line number
Diff line number
Diff line change
@@ -8,13 +8,22 @@ This plugin contains a collection of actions:
8
8
-`azure:pipeline:run`
9
9
-`azure:pipeline:permit`
10
10
11
-
It utilizes Azure DevOps REST APIs to [create](https://docs.microsoft.com/en-us/rest/api/azure/devops/pipelines/pipelines/create?view=azure-devops-rest-6.1), [run](https://docs.microsoft.com/en-us/rest/api/azure/devops/pipelines/runs/run-pipeline?view=azure-devops-rest-6.1), and [authorize](https://docs.microsoft.com/en-us/rest/api/azure/devops/approvalsandchecks/pipeline-permissions/update-pipeline-permisions-for-resource?view=azure-devops-rest-7.1) Azure pipelines.
> Note: If you are using this plugin in a Backstage monorepo that contains the code for `@backstage/plugin-scaffolder-backend`, you need to modify your internal build processes to transpile files from the `node_modules` folder as well.
23
+
> Note: If you are using this plugin in a Backstage monorepo that contains the
24
+
> code for `@backstage/plugin-scaffolder-backend`, you need to modify your
25
+
> internal build processes to transpile files from the `node_modules` folder as
26
+
> well.
18
27
19
28
You need to configure the actions in your backend:
20
29
@@ -25,7 +34,9 @@ You need to configure the actions in your backend:
Configure the actions (you can check the [docs](https://backstage.io/docs/features/software-templates/writing-custom-actions#registering-custom-actions) to see all options):
The Azure pipeline actions use an [Azure PAT (personal access token)](https://docs.microsoft.com/en-us/azure/devops/organizations/accounts/use-personal-access-tokens-to-authenticate) for authorization. The PAT requires `Read & execute` permission for `Build` for the `azure:pipeline:create` and `azure:pipeline:run` actions. For the `azure:pipeline:permit` action the PAT requires `Read, query, & manage` permission for `Service Connections`. Simply add the PAT to your `app-config.yaml`:
74
+
The Azure pipeline actions use an [Azure PAT (personal access
After loading and configuring the Azure pipeline template actions, you can use the actions in your template:
96
+
After loading and configuring the Azure pipeline template actions, you can use
97
+
the actions in your template:
79
98
80
99
```yaml
81
100
# template.yaml
@@ -192,6 +211,12 @@ spec:
192
211
entityRef: ${{ steps.register.output.entityRef }}
193
212
```
194
213
195
-
**_Note_**: The `azure:pipeline:permit` action authorizes/unauthorizes a pipeline for a given resource. To authorize a pipeline for a [service endpoint](https://docs.microsoft.com/en-us/azure/virtual-network/virtual-network-service-endpoints-overview) set `resourceType` to `endpoint`, provide `resourceId` with the service endpoint ID (replace `<serviceEndpointId>` in the example code above), and set authorized to `true`.
214
+
**_Note_**: The `azure:pipeline:permit` action authorizes/unauthorizes a
215
+
pipeline for a given resource. To authorize a pipeline for a [service
0 commit comments