Testing OIDC #252
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- | ||
name: Integration tests on Azure | ||
on: # yamllint disable-line rule:truthy | ||
workflow_dispatch: | ||
pull_request: | ||
branches: | ||
- oidc_connect | ||
jobs: | ||
permissions: | ||
id-token: write | ||
contents: read | ||
integration-tests-azure: | ||
name: Regular | ||
strategy: | ||
fail-fast: false | ||
max-parallel: 1 | ||
matrix: | ||
profile: ["ci_azure_auto"] | ||
python_version: ["3.11"] | ||
msodbc_version: ["17", "18"] | ||
runs-on: ubuntu-latest | ||
container: | ||
image: ghcr.io/${{ github.repository }}:CI-${{ matrix.python_version }}-msodbc${{ matrix.msodbc_version }} | ||
steps: | ||
# Checkout repository | ||
- name: Checkout repository | ||
uses: actions/checkout@v4 | ||
# Azure login using federated credentials | ||
- name: Azure login with OIDC | ||
uses: azure/login@v2 | ||
with: | ||
client-id: ${{ secrets.DBT_AZURE_SP_NAME }} | ||
tenant-id: ${{ secrets.DBT_AZURE_TENANT }} | ||
allow-no-subscriptions: true | ||
federated-token: true | ||
# Get an access token for a specific resource (e.g., a database) | ||
- name: Get Azure Access Token | ||
id: get-token | ||
run: | | ||
TOKEN=$(az account get-access-token --resource "https://database.windows.net//.default" --query accessToken -o tsv) | ||
echo "::add-mask::$TOKEN" # Mask the token in the logs | ||
echo "ACCESS_TOKEN=$TOKEN" >> $GITHUB_ENV | ||
echo "Token fetched successfully" | ||
# Print the token (for debugging) | ||
- name: Print Access Token | ||
run: | | ||
echo "Access Token: ${{ env.ACCESS_TOKEN }}" |