You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
GitHub Actions and Azure Pipelines allow you to run CI/CD workflows with self-hosted runners and agents. You can run self-hosted runners and agents using event-driven Azure Container Apps [jobs](./jobs.md).
17
17
18
-
## Managing Personal Access Tokens (PAT)
19
-
20
-
As each container registers itself as a one-time agent, managing the configured PAT can be challenging. At some point, the PAT expires, and agents can't register. From an automation perspective, using Azure Pipelines to create the agents with a PAT requires personal intervention.
21
-
22
-
> [!NOTE]
23
-
> A job access token makes more sense in this scenario. Designed for automated workflows, job access tokens help avoid manual intervention when the PAT expires.
24
-
25
18
Self-hosted runners are useful when you need to run workflows that require access to local resources or tools that aren't available to a cloud-hosted runner. For example, a self-hosted runner in a Container Apps job allows your workflow to access resources inside the job's virtual network that isn't accessible to a cloud-hosted runner.
26
19
27
20
Running self-hosted runners as event-driven jobs allows you to take advantage of the serverless nature of Azure Container Apps. Jobs execute automatically when a workflow is triggered and exit when the job completes.
@@ -42,6 +35,9 @@ In this tutorial, you learn how to run GitHub Actions runners as an [event-drive
42
35
> [!IMPORTANT]
43
36
> Self-hosted runners are only recommended for *private* repositories. Using them with public repositories can allow dangerous code to execute on your self-hosted runner. For more information, see [Self-hosted runner security](https://docs.github.com/en/actions/hosting-your-own-runners/managing-self-hosted-runners/about-self-hosted-runners#self-hosted-runner-security).
44
37
38
+
> [!NOTE]
39
+
> The personal access token (PAT) has an expiration date. It's the customer's responsibility to ensure that the PAT is regularly rotated and isn't expired. Monitor and update your PAT accordingly to maintain uninterrupted services.
40
+
45
41
::: zone-end
46
42
47
43
::: zone pivot="container-apps-jobs-self-hosted-ci-cd-azure-pipelines"
@@ -59,6 +55,9 @@ In this tutorial, you learn how to run Azure Pipelines agents as an [event-drive
59
55
> [!IMPORTANT]
60
56
> Self-hosted agents are only recommended for *private* projects. Using them with public projects can allow dangerous code to execute on your self-hosted agent. For more information, see [Self-hosted agent security](/azure/devops/pipelines/agents/linux-agent#permissions).
61
57
58
+
> [!NOTE]
59
+
> The personal access token (PAT) has an expiration date. It's the customer's responsibility to ensure that the PAT is regularly rotated and isn't expired. Monitor and update your PAT accordingly to maintain uninterrupted services.
60
+
62
61
::: zone-end
63
62
64
63
> [!NOTE]
@@ -981,7 +980,7 @@ Once a self-hosted agent job is configured, you can run a pipeline and verify it
981
980
Once you're done, run the following command to delete the resource group that contains your Container Apps resources.
982
981
983
982
>[!CAUTION]
984
-
> The following command deletes the specified resource group and all resources contained within it. If resources outside the scope of this tutorial exist in the specified resource group, they'll also be deleted.
983
+
> The following command deletes the specified resource group and all resources contained within it. If resources outside the scope of this tutorial exist in the specified resource group, they're also deleted.
0 commit comments