🚀 Add KeyVaultKeyReference parameter for GitHub App authentication#63
🚀 Add KeyVaultKeyReference parameter for GitHub App authentication#63MariusStorhaug merged 11 commits intomainfrom
Conversation
Co-authored-by: MariusStorhaug <17722253+MariusStorhaug@users.noreply.github.com>
|
Add a test that proves the keyvaultkeyreference logon type is working. Assume there is an environment with AZURE_CLIENT_ID, AZURE_TENANT_ID and AZURE_SUBSCRIPTION_ID variables (vars) are available. Assume that the variable KEYVAULT_KEY_REFERENCE is also available. |
Co-authored-by: MariusStorhaug <17722253+MariusStorhaug@users.noreply.github.com>
Added test |
Co-authored-by: MariusStorhaug <17722253+MariusStorhaug@users.noreply.github.com>
Co-authored-by: MariusStorhaug <17722253+MariusStorhaug@users.noreply.github.com>
…riables in KeyVaultKeyReference workflow
…vateKey in init.ps1
This PR adds support for authenticating GitHub Apps using Azure KeyVault key references, enabling secure private key storage in Azure KeyVault instead of GitHub secrets.
Changes Made
🔧 Core Implementation
KeyVaultKeyReferenceinput parameter with proper description and environment variable mappingPrivateKeyandKeyVaultKeyReferenceClientIDmust be provided with exactly one key parameterConnect-GitHub -ClientID <ClientID> -KeyVaultKeyReference <url>📚 Documentation
KeyVaultKeyReferenceto inputs documentation tableazure/loginaction for KeyVault authenticationUsage Example
Validation
The implementation includes comprehensive validation:
PrivateKeyorKeyVaultKeyReferencecan be providedClientIDmust be provided with exactly one key parameterAuthentication Flow
The action now supports three authentication methods:
Tokenparameter (existing)ClientID+PrivateKey(existing)ClientID+KeyVaultKeyReference(new)Fixes #62.
💬 Share your feedback on Copilot coding agent for the chance to win a $200 gift card! Click here to start the survey.