Testing OIDC #255
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- | |
name: Integration tests on Fabric DW | |
on: # yamllint disable-line rule:truthy | |
workflow_dispatch: | |
pull_request: | |
branches: | |
- oidc_connect | |
permissions: | |
id-token: write | |
contents: read | |
jobs: | |
integration-tests-azure: | |
name: Regular | |
strategy: | |
fail-fast: false | |
max-parallel: 1 | |
matrix: | |
profile: ["ci_azure_auto"] | |
python_version: ["3.11"] | |
msodbc_version: ["17", "18"] | |
runs-on: ubuntu-latest | |
steps: | |
# Checkout repository | |
- name: Checkout repository | |
uses: actions/checkout@v4 | |
- name: Log in to GitHub Container Registry | |
run: echo "${{ secrets.GITHUB_TOKEN }}" | docker login ghcr.io -u ${{ github.actor }} --password-stdin | |
- name: Pull Docker image | |
run: docker pull ghcr.io/microsoft/dbt-fabric:CI-3.11-msodbc17 | |
# Azure login using federated credentials | |
- name: Azure login with OIDC | |
uses: azure/login@v2 | |
with: | |
client-id: ${{ secrets.DBT_AZURE_SP_NAME }} | |
tenant-id: ${{ secrets.DBT_AZURE_TENANT }} | |
allow-no-subscriptions: true | |
federated-token: true | |
# Get an access token for a specific resource (e.g., a database) | |
- name: Get Azure Access Token | |
id: get-token | |
run: | | |
TOKEN=$(az account get-access-token --resource "https://database.windows.net//.default" --query accessToken -o tsv) | |
echo "::add-mask::$TOKEN" # Mask the token in the logs | |
echo "ACCESS_TOKEN=$TOKEN" >> $GITHUB_ENV | |
echo "Token fetched successfully" | |
# Print the token (for debugging) | |
- name: Print Access Token | |
run: | | |
echo "Access Token: ${{ env.ACCESS_TOKEN }}" |