Skip to content

Commit 5795e5d

Browse files
committed
Used AZURE_CREDENTIALS
1 parent fdf985f commit 5795e5d

File tree

2 files changed

+13
-19
lines changed

2 files changed

+13
-19
lines changed

.github/workflows/terraform-create.yml

Lines changed: 7 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,11 @@ permissions:
99
contents: read
1010

1111
env:
12-
ARM_CLIENT_ID: ${{ secrets.ARM_CLIENT_ID }}
13-
ARM_CLIENT_SECRET: ${{ secrets.ARM_CLIENT_SECRET }}
14-
ARM_SUBSCRIPTION_ID: ${{ secrets.ARM_SUBSCRIPTION_ID }}
15-
ARM_TENANT_ID: ${{ secrets.ARM_TENANT_ID }}
16-
12+
ARM_CLIENT_ID: ${{ fromJson(secrets.AZURE_CREDENTIALS).clientId }}
13+
ARM_CLIENT_SECRET: ${{ fromJson(secrets.AZURE_CREDENTIALS).clientSecret }}
14+
ARM_SUBSCRIPTION_ID: ${{ fromJson(secrets.AZURE_CREDENTIALS).subscriptionId }}
15+
ARM_TENANT_ID: ${{ fromJson(secrets.AZURE_CREDENTIALS).tenantId }}
16+
1717
jobs:
1818
terraform:
1919
runs-on: ubuntu-latest
@@ -26,10 +26,7 @@ jobs:
2626
- name: Azure Login (for backend bootstrap)
2727
uses: azure/login@v1
2828
with:
29-
client-id: ${{ secrets.ARM_CLIENT_ID }}
30-
client-secret: ${{ secrets.ARM_CLIENT_SECRET }}
31-
tenant-id: ${{ secrets.ARM_TENANT_ID }}
32-
subscription-id: ${{ secrets.ARM_SUBSCRIPTION_ID }}
29+
creds: ${{ secrets.AZURE_CREDENTIALS }}
3330

3431
- name: Ensure backend storage exists (idempotent)
3532
run: |
@@ -44,4 +41,4 @@ jobs:
4441
run: terraform init -input=false -no-color
4542

4643
- name: Terraform Apply
47-
run: terraform apply -auto-approve -input=false -no-color -var "client_id=${{ secrets.ARM_CLIENT_ID }}" -var "client_secret=${{ secrets.ARM_CLIENT_SECRET }}" -var "subscription_id=${{ secrets.ARM_SUBSCRIPTION_ID }}" -var "tenant_id=${{ secrets.ARM_TENANT_ID }}" -var "ssh_public_key=${{ secrets.VM_SSH_PUB_KEY }}"
44+
run: terraform apply -auto-approve -input=false -no-color -var "client_id=${{ secrets.ARM_CLIENT_ID }}" -var "client_secret=${{ secrets.ARM_CLIENT_SECRET }}" -var "subscription_id=${{ secrets.ARM_SUBSCRIPTION_ID }}" -var "tenant_id=${{ secrets.ARM_TENANT_ID }}" -var "ssh_public_key=${{ secrets.VM_SSH_PUB_KEY }}"

.github/workflows/terraform-destroy.yml

Lines changed: 6 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -7,10 +7,10 @@ permissions:
77
contents: read
88

99
env:
10-
ARM_CLIENT_ID: ${{ secrets.ARM_CLIENT_ID }}
11-
ARM_CLIENT_SECRET: ${{ secrets.ARM_CLIENT_SECRET }}
12-
ARM_SUBSCRIPTION_ID: ${{ secrets.ARM_SUBSCRIPTION_ID }}
13-
ARM_TENANT_ID: ${{ secrets.ARM_TENANT_ID }}
10+
ARM_CLIENT_ID: ${{ fromJson(secrets.AZURE_CREDENTIALS).clientId }}
11+
ARM_CLIENT_SECRET: ${{ fromJson(secrets.AZURE_CREDENTIALS).clientSecret }}
12+
ARM_SUBSCRIPTION_ID: ${{ fromJson(secrets.AZURE_CREDENTIALS).subscriptionId }}
13+
ARM_TENANT_ID: ${{ fromJson(secrets.AZURE_CREDENTIALS).tenantId }}
1414

1515
jobs:
1616
terraform-destroy:
@@ -24,10 +24,7 @@ jobs:
2424
- name: Azure Login (for backend)
2525
uses: azure/login@v1
2626
with:
27-
client-id: ${{ secrets.ARM_CLIENT_ID }}
28-
client-secret: ${{ secrets.ARM_CLIENT_SECRET }}
29-
tenant-id: ${{ secrets.ARM_TENANT_ID }}
30-
subscription-id: ${{ secrets.ARM_SUBSCRIPTION_ID }}
27+
creds: ${{ secrets.AZURE_CREDENTIALS }}
3128

3229
- name: Setup Terraform
3330
uses: hashicorp/setup-terraform@v2
@@ -36,4 +33,4 @@ jobs:
3633
run: terraform init -input=false -no-color
3734

3835
- name: Terraform Destroy
39-
run: terraform destroy -auto-approve -input=false -no-color -var "client_id=${{ secrets.ARM_CLIENT_ID }}" -var "client_secret=${{ secrets.ARM_CLIENT_SECRET }}" -var "subscription_id=${{ secrets.ARM_SUBSCRIPTION_ID }}" -var "tenant_id=${{ secrets.ARM_TENANT_ID }}" -var "ssh_public_key=${{ secrets.VM_SSH_PUB_KEY }}"
36+
run: terraform destroy -auto-approve -input=false -no-color -var "client_id=${{ secrets.ARM_CLIENT_ID }}" -var "client_secret=${{ secrets.ARM_CLIENT_SECRET }}" -var "subscription_id=${{ secrets.ARM_SUBSCRIPTION_ID }}" -var "tenant_id=${{ secrets.ARM_TENANT_ID }}" -var "ssh_public_key=${{ secrets.VM_SSH_PUB_KEY }}"

0 commit comments

Comments
 (0)