You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/storage/blobs/storage-blobs-static-site-github-actions.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ Get started with [GitHub Actions](https://docs.github.com/en/actions) by using a
25
25
An Azure subscription and GitHub account.
26
26
27
27
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
28
-
- A GitHub repository with your static website code. If you don't have a GitHub account, [sign up for free](https://github.com/join).
28
+
- A GitHub repository with your static website code. If you do not have a GitHub account, [sign up for free](https://github.com/join).
29
29
- A working static website hosted in Azure Storage. Learn how to [host a static website in Azure Storage](storage-blob-static-website-how-to.md). To follow this example, you should also deploy [Azure CDN](static-website-content-delivery-network.md).
30
30
31
31
> [!NOTE]
@@ -44,7 +44,7 @@ Replace the placeholder `myStaticSite` with the name of your site hosted in Azur
44
44
az ad sp create-for-rbac --name {myStaticSite} --role contributor --scopes /subscriptions/{subscription-id}/resourceGroups/{resource-group} --sdk-auth
45
45
```
46
46
47
-
In the example above, replace the placeholders with your subscription ID and resource group name. The output is a JSON object with the role assignment credentials that provide access to your storage account similar to below. Copy this JSON object for later.
47
+
In the example, replace the placeholders with your subscription ID and resource group name. The output is a JSON object with the role assignment credentials that provide access to your storage account. Copy this JSON object for later.
48
48
49
49
```output
50
50
{
@@ -63,15 +63,15 @@ In the example above, replace the placeholders with your subscription ID and res
63
63
64
64
OpenID Connect is an authentication method that uses short-lived tokens. Setting up [OpenID Connect with GitHub Actions](https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect) is more complex process that offers hardened security.
65
65
66
-
1. If you do not have an existing application, register a [new Active Directory application and service principal that can access resources](../active-directory/develop/howto-create-service-principal-portal.md). Create the Active Directory application.
66
+
1. If you do not have an existing application, register a [new Active Directory application and service principal that can access resources](../../active-directory/develop/howto-create-service-principal-portal.md). Create the Active Directory application.
67
67
68
68
```azurecli-interactive
69
69
az ad app create --display-name myApp
70
70
```
71
71
72
72
This command will output JSON with an `appId` that is your `client-id`. Save the value to use as the `AZURE_CLIENT_ID` GitHub secret later.
73
73
74
-
You'll use the `objectId` value when creating federated credentials with Graph API and reference it as the `APPLICATION-OBJECT-ID`.
74
+
You will use the `objectId` value when creating federated credentials with Graph API and reference it as the `APPLICATION-OBJECT-ID`.
75
75
76
76
1. Create a service principal. Replace the `$appID` with the appId from your JSON output.
77
77
@@ -126,7 +126,7 @@ To learn how to create a Create an active directory application, service princip
126
126
127
127
# [OpenID Connect](#tab/openid)
128
128
129
-
You need to provide your application's **Client ID**, **Tenant ID** and **Subscription ID** to the login action. These values can either be provided directly in the workflow or can be stored in GitHub secrets and referenced in your workflow. Saving the values as GitHub secrets is the more secure option.
129
+
You need to provide your application's **Client ID**, **Tenant ID**, and **Subscription ID** to the login action. These values can either be provided directly in the workflow or can be stored in GitHub secrets and referenced in your workflow. Saving the values as GitHub secrets is the more secure option.
130
130
131
131
1. Open your GitHub repository and go to **Settings**.
132
132
@@ -166,7 +166,7 @@ You need to provide your application's **Client ID**, **Tenant ID** and **Subscr
166
166
branches: [ main ]
167
167
```
168
168
169
-
1. Rename your workflow `Blob storage website CI` and add the checkout and login actions. These actions will checkout your site code and authenticate with Azure using the `AZURE_CREDENTIALS` GitHub secret you created earlier.
169
+
1. Rename your workflow `Blob storage website CI` and add the checkout and login actions. These actions will check out your site code and authenticate with Azure using the `AZURE_CREDENTIALS` GitHub secret you created earlier.
170
170
171
171
```yaml
172
172
name: Blob storage website CI
@@ -269,7 +269,7 @@ You need to provide your application's **Client ID**, **Tenant ID** and **Subscr
269
269
contents: read
270
270
```
271
271
272
-
1. Add checkout and login actions. These actions will checkout your site code and authenticate with Azure using the GitHub secrets you created earlier.
272
+
1. Add checkout and login actions. These actions will check out your site code and authenticate with Azure using the GitHub secrets you created earlier.
0 commit comments