Skip to content

Commit 3d0614e

Browse files
jprusikpixman20
andauthored
[PM-24375] Convert base64 string for dotenv values to individual key-value pairs (#356)
* replace ENV-FILE secret with individual key-value pairs * further adjustments * further further adjustments * Trying out shared action for setting up env file * cleanup * move setup-env-file action out of workflows directory --------- Co-authored-by: Andy Pixley <[email protected]>
1 parent e738e02 commit 3d0614e

File tree

9 files changed

+308
-177
lines changed

9 files changed

+308
-177
lines changed
Lines changed: 132 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,132 @@
1+
name: Create Env File
2+
description: "Creates a .env file with necessary environment variables including secrets for the workflow."
3+
inputs:
4+
AZURE_SUBSCRIPTION_ID:
5+
description: "Azure Subscription ID for the service principal."
6+
required: true
7+
AZURE_TENANT_ID:
8+
description: "Azure Tenant ID for the service principal."
9+
required: true
10+
AZURE_CLIENT_ID:
11+
description: "Azure Client ID for the service principal."
12+
required: true
13+
BW_DB_PORT:
14+
description: "Port for the Bitwarden database."
15+
required: true
16+
BW_DB_PROVIDER:
17+
description: "Database provider for Bitwarden."
18+
required: true
19+
BW_DB_SERVER:
20+
description: "Database server for Bitwarden."
21+
required: true
22+
BW_DOMAIN:
23+
description: "Domain for Bitwarden."
24+
required: true
25+
BW_ENABLE_SSL:
26+
description: "Enable SSL for Bitwarden."
27+
required: true
28+
BW_SSL_CERT:
29+
description: "SSL certificate for Bitwarden."
30+
required: true
31+
BW_SSL_KEY:
32+
description: "SSL key for Bitwarden."
33+
required: true
34+
CI:
35+
description: "CI environment variable."
36+
required: true
37+
CLI_SERVE_HOST:
38+
description: "Host for CLI serve."
39+
required: true
40+
CLI_SERVE_PORT:
41+
description: "Port for CLI serve."
42+
required: true
43+
EXTENSION_BUILD_PATH:
44+
description: "Path to extension build."
45+
required: true
46+
PAGES_HOST:
47+
description: "Host for pages."
48+
required: true
49+
PAGES_HOST_INSECURE_PORT:
50+
description: "Insecure port for pages host."
51+
required: true
52+
PAGES_HOST_PORT:
53+
description: "Port for pages host."
54+
required: true
55+
VAULT_HOST_INSECURE_PORT:
56+
description: "Insecure port for vault host."
57+
required: true
58+
VAULT_HOST_PORT:
59+
description: "Port for vault host."
60+
required: true
61+
VAULT_HOST_URL:
62+
description: "URL for vault host."
63+
required: true
64+
65+
runs:
66+
using: "composite"
67+
steps:
68+
- name: Log in to Azure
69+
uses: bitwarden/gh-actions/azure-login@main
70+
with:
71+
subscription_id: ${{ inputs.AZURE_SUBSCRIPTION_ID }}
72+
tenant_id: ${{ inputs.AZURE_TENANT_ID }}
73+
client_id: ${{ inputs.AZURE_CLIENT_ID }}
74+
75+
- name: Get Azure Key Vault secrets
76+
id: get-kv-secrets
77+
uses: bitwarden/gh-actions/get-keyvault-secrets@main
78+
with:
79+
keyvault: gh-browser-interactions
80+
secrets: "
81+
BW-INSTALLATION-ID,
82+
BW-INSTALLATION-KEY,
83+
GENERATED-RSA-KEY-PAIR-PROTECTED-PRIVATE-KEY,
84+
GENERATED-RSA-KEY-PAIR-PUBLIC-KEY,
85+
PROTECTED-SYMMETRIC-KEY,
86+
MASTER-PASSWORD-HASH,
87+
KDF-ITERATIONS,
88+
BW-DB-PASSWORD,
89+
BW-DB-USERNAME,
90+
BW-DB-DATABASE,
91+
VAULT-EMAIL,
92+
VAULT-PASSWORD,
93+
PUBLIC-TEST-EMAIL"
94+
95+
- name: Log out from Azure
96+
uses: bitwarden/gh-actions/azure-logout@main
97+
98+
- name: Create dotenv file
99+
shell: bash
100+
run: |
101+
sudo setcap 'cap_net_bind_service=+ep' `which node`
102+
> .env
103+
echo "BW_DB_DATABASE=\"${{ steps.get-kv-secrets.outputs.BW-DB-DATABASE }}\"" >> .env
104+
echo "BW_DB_PASSWORD=\"${{ steps.get-kv-secrets.outputs.BW-DB-PASSWORD }}\"" >> .env
105+
echo "BW_DB_USERNAME=\"${{ steps.get-kv-secrets.outputs.BW-DB-USERNAME }}\"" >> .env
106+
echo "BW_INSTALLATION_ID=\"${{ steps.get-kv-secrets.outputs.BW-INSTALLATION-ID }}\"" >> .env
107+
echo "BW_INSTALLATION_KEY=\"${{ steps.get-kv-secrets.outputs.BW-INSTALLATION-KEY }}\"" >> .env
108+
echo "GENERATED_RSA_KEY_PAIR_PROTECTED_PRIVATE_KEY=\"${{ steps.get-kv-secrets.outputs.GENERATED-RSA-KEY-PAIR-PROTECTED-PRIVATE-KEY }}\"" >> .env
109+
echo "GENERATED_RSA_KEY_PAIR_PUBLIC_KEY=\"${{ steps.get-kv-secrets.outputs.GENERATED-RSA-KEY-PAIR-PUBLIC-KEY }}\"" >> .env
110+
echo "KDF_ITERATIONS=${{ steps.get-kv-secrets.outputs.KDF-ITERATIONS }}" >> .env
111+
echo "MASTER_PASSWORD_HASH=\"${{ steps.get-kv-secrets.outputs.MASTER-PASSWORD-HASH }}\"" >> .env
112+
echo "PROTECTED_SYMMETRIC_KEY=\"${{ steps.get-kv-secrets.outputs.PROTECTED-SYMMETRIC-KEY }}\"" >> .env
113+
echo "PUBLIC_TEST_EMAIL=\"${{ steps.get-kv-secrets.outputs.PUBLIC-TEST-EMAIL }}\"" >> .env
114+
echo "VAULT_EMAIL=\"${{ steps.get-kv-secrets.outputs.VAULT-EMAIL }}\"" >> .env
115+
echo "VAULT_PASSWORD=\"${{ steps.get-kv-secrets.outputs.VAULT-PASSWORD }}\"" >> .env
116+
echo "BW_DB_PORT=${{ inputs.BW_DB_PORT }}" >> .env
117+
echo "BW_DB_PROVIDER=\"${{ inputs.BW_DB_PROVIDER }}\"" >> .env
118+
echo "BW_DB_SERVER=\"${{ inputs.BW_DB_SERVER }}\"" >> .env
119+
echo "BW_DOMAIN=\"${{ inputs.BW_DOMAIN }}\"" >> .env
120+
echo "BW_ENABLE_SSL=\"${{ inputs.BW_ENABLE_SSL }}\"" >> .env
121+
echo "BW_SSL_CERT=\"${{ inputs.BW_SSL_CERT }}\"" >> .env
122+
echo "BW_SSL_KEY=\"${{ inputs.BW_SSL_KEY }}\"" >> .env
123+
echo "CI=${{ inputs.CI }}" >> .env
124+
echo "CLI_SERVE_HOST=\"${{ inputs.CLI_SERVE_HOST }}\"" >> .env
125+
echo "CLI_SERVE_PORT=${{ inputs.CLI_SERVE_PORT }}" >> .env
126+
echo "EXTENSION_BUILD_PATH=\"${{ inputs.EXTENSION_BUILD_PATH }}\"" >> .env
127+
echo "PAGES_HOST_INSECURE_PORT=${{ inputs.PAGES_HOST_INSECURE_PORT }}" >> .env
128+
echo "PAGES_HOST_PORT=${{ inputs.PAGES_HOST_PORT }}" >> .env
129+
echo "PAGES_HOST=\"${{ inputs.PAGES_HOST }}\"" >> .env
130+
echo "VAULT_HOST_INSECURE_PORT=${{ inputs.VAULT_HOST_INSECURE_PORT }}" >> .env
131+
echo "VAULT_HOST_PORT=${{ inputs.VAULT_HOST_PORT }}" >> .env
132+
echo "VAULT_HOST_URL=\"${{ inputs.VAULT_HOST_URL }}\"" >> .env

.github/workflows/a11y-eval-all.yml

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -31,29 +31,29 @@ jobs:
3131
cache-dependency-path: "**/package-lock.json"
3232
node-version: "23"
3333

34-
- name: Log in to Azure
35-
uses: bitwarden/gh-actions/azure-login@main
36-
with:
37-
subscription_id: ${{ secrets.AZURE_SUBSCRIPTION_ID }}
38-
tenant_id: ${{ secrets.AZURE_TENANT_ID }}
39-
client_id: ${{ secrets.AZURE_CLIENT_ID }}
40-
41-
- name: Get Azure Key Vault secrets
42-
id: get-kv-secrets
43-
uses: bitwarden/gh-actions/get-keyvault-secrets@main
44-
with:
45-
keyvault: gh-browser-interactions
46-
secrets: "ENV-FILE,BW-INSTALLATION-ID,BW-INSTALLATION-KEY"
47-
48-
- name: Log out from Azure
49-
uses: bitwarden/gh-actions/azure-logout@main
50-
5134
- name: Create dotenv file
52-
run: |
53-
sudo setcap 'cap_net_bind_service=+ep' `which node`
54-
echo "${{ steps.get-kv-secrets.outputs.ENV-FILE }}" | base64 --decode > .env
55-
echo "BW_INSTALLATION_ID=${{ steps.get-kv-secrets.outputs.BW-INSTALLATION-ID }}" >> .env
56-
echo "BW_INSTALLATION_KEY=${{ steps.get-kv-secrets.outputs.BW-INSTALLATION-KEY }}" >> .env
35+
uses: ./.github/actions/setup-env-file
36+
with:
37+
AZURE_CLIENT_ID: ${{ secrets.AZURE_CLIENT_ID }}
38+
AZURE_SUBSCRIPTION_ID: ${{ secrets.AZURE_SUBSCRIPTION_ID }}
39+
AZURE_TENANT_ID: ${{ secrets.AZURE_TENANT_ID }}
40+
BW_DB_PORT: ${{ vars.BW_DB_PORT }}
41+
BW_DB_PROVIDER: ${{ vars.BW_DB_PROVIDER }}
42+
BW_DB_SERVER: ${{ vars.BW_DB_SERVER }}
43+
BW_DOMAIN: ${{ vars.BW_DOMAIN }}
44+
BW_ENABLE_SSL: ${{ vars.BW_ENABLE_SSL }}
45+
BW_SSL_CERT: ${{ vars.BW_SSL_CERT }}
46+
BW_SSL_KEY: ${{ vars.BW_SSL_KEY }}
47+
CI: true
48+
CLI_SERVE_HOST: ${{ vars.CLI_SERVE_HOST }}
49+
CLI_SERVE_PORT: ${{ vars.CLI_SERVE_PORT }}
50+
EXTENSION_BUILD_PATH: ${{ vars.EXTENSION_BUILD_PATH }}
51+
PAGES_HOST_INSECURE_PORT: ${{ vars.PAGES_HOST_INSECURE_PORT }}
52+
PAGES_HOST_PORT: ${{ vars.PAGES_HOST_PORT }}
53+
PAGES_HOST: ${{ vars.PAGES_HOST }}
54+
VAULT_HOST_INSECURE_PORT: ${{ vars.VAULT_HOST_INSECURE_PORT }}
55+
VAULT_HOST_PORT: ${{ vars.VAULT_HOST_PORT }}
56+
VAULT_HOST_URL: ${{ vars.VAULT_HOST_URL }}
5757

5858
- name: Create feature flags file
5959
run: echo "{\"flagValues\":${{ inputs.FEATURE_FLAGS }}}" > flags.json

.github/workflows/a11y-eval-browser.yml

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -31,29 +31,29 @@ jobs:
3131
cache-dependency-path: "**/package-lock.json"
3232
node-version: "23"
3333

34-
- name: Log in to Azure
35-
uses: bitwarden/gh-actions/azure-login@main
36-
with:
37-
subscription_id: ${{ secrets.AZURE_SUBSCRIPTION_ID }}
38-
tenant_id: ${{ secrets.AZURE_TENANT_ID }}
39-
client_id: ${{ secrets.AZURE_CLIENT_ID }}
40-
41-
- name: Get Azure Key Vault secrets
42-
id: get-kv-secrets
43-
uses: bitwarden/gh-actions/get-keyvault-secrets@main
44-
with:
45-
keyvault: gh-browser-interactions
46-
secrets: "ENV-FILE,BW-INSTALLATION-ID,BW-INSTALLATION-KEY"
47-
48-
- name: Log out from Azure
49-
uses: bitwarden/gh-actions/azure-logout@main
50-
5134
- name: Create dotenv file
52-
run: |
53-
sudo setcap 'cap_net_bind_service=+ep' `which node`
54-
echo "${{ steps.get-kv-secrets.outputs.ENV-FILE }}" | base64 --decode > .env
55-
echo "BW_INSTALLATION_ID=${{ steps.get-kv-secrets.outputs.BW-INSTALLATION-ID }}" >> .env
56-
echo "BW_INSTALLATION_KEY=${{ steps.get-kv-secrets.outputs.BW-INSTALLATION-KEY }}" >> .env
35+
uses: ./.github/actions/setup-env-file
36+
with:
37+
AZURE_CLIENT_ID: ${{ secrets.AZURE_CLIENT_ID }}
38+
AZURE_SUBSCRIPTION_ID: ${{ secrets.AZURE_SUBSCRIPTION_ID }}
39+
AZURE_TENANT_ID: ${{ secrets.AZURE_TENANT_ID }}
40+
BW_DB_PORT: ${{ vars.BW_DB_PORT }}
41+
BW_DB_PROVIDER: ${{ vars.BW_DB_PROVIDER }}
42+
BW_DB_SERVER: ${{ vars.BW_DB_SERVER }}
43+
BW_DOMAIN: ${{ vars.BW_DOMAIN }}
44+
BW_ENABLE_SSL: ${{ vars.BW_ENABLE_SSL }}
45+
BW_SSL_CERT: ${{ vars.BW_SSL_CERT }}
46+
BW_SSL_KEY: ${{ vars.BW_SSL_KEY }}
47+
CI: true
48+
CLI_SERVE_HOST: ${{ vars.CLI_SERVE_HOST }}
49+
CLI_SERVE_PORT: ${{ vars.CLI_SERVE_PORT }}
50+
EXTENSION_BUILD_PATH: ${{ vars.EXTENSION_BUILD_PATH }}
51+
PAGES_HOST_INSECURE_PORT: ${{ vars.PAGES_HOST_INSECURE_PORT }}
52+
PAGES_HOST_PORT: ${{ vars.PAGES_HOST_PORT }}
53+
PAGES_HOST: ${{ vars.PAGES_HOST }}
54+
VAULT_HOST_INSECURE_PORT: ${{ vars.VAULT_HOST_INSECURE_PORT }}
55+
VAULT_HOST_PORT: ${{ vars.VAULT_HOST_PORT }}
56+
VAULT_HOST_URL: ${{ vars.VAULT_HOST_URL }}
5757

5858
- name: Create feature flags file
5959
run: echo "{\"flagValues\":${{ inputs.FEATURE_FLAGS }}}" > flags.json

.github/workflows/a11y-eval-web.yml

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -27,29 +27,29 @@ jobs:
2727
cache-dependency-path: "**/package-lock.json"
2828
node-version: "23"
2929

30-
- name: Log in to Azure
31-
uses: bitwarden/gh-actions/azure-login@main
32-
with:
33-
subscription_id: ${{ secrets.AZURE_SUBSCRIPTION_ID }}
34-
tenant_id: ${{ secrets.AZURE_TENANT_ID }}
35-
client_id: ${{ secrets.AZURE_CLIENT_ID }}
36-
37-
- name: Get Azure Key Vault secrets
38-
id: get-kv-secrets
39-
uses: bitwarden/gh-actions/get-keyvault-secrets@main
40-
with:
41-
keyvault: gh-browser-interactions
42-
secrets: "ENV-FILE,BW-INSTALLATION-ID,BW-INSTALLATION-KEY"
43-
44-
- name: Log out from Azure
45-
uses: bitwarden/gh-actions/azure-logout@main
46-
4730
- name: Create dotenv file
48-
run: |
49-
sudo setcap 'cap_net_bind_service=+ep' `which node`
50-
echo "${{ steps.get-kv-secrets.outputs.ENV-FILE }}" | base64 --decode > .env
51-
echo "BW_INSTALLATION_ID=${{ steps.get-kv-secrets.outputs.BW-INSTALLATION-ID }}" >> .env
52-
echo "BW_INSTALLATION_KEY=${{ steps.get-kv-secrets.outputs.BW-INSTALLATION-KEY }}" >> .env
31+
uses: ./.github/actions/setup-env-file
32+
with:
33+
AZURE_CLIENT_ID: ${{ secrets.AZURE_CLIENT_ID }}
34+
AZURE_SUBSCRIPTION_ID: ${{ secrets.AZURE_SUBSCRIPTION_ID }}
35+
AZURE_TENANT_ID: ${{ secrets.AZURE_TENANT_ID }}
36+
BW_DB_PORT: ${{ vars.BW_DB_PORT }}
37+
BW_DB_PROVIDER: ${{ vars.BW_DB_PROVIDER }}
38+
BW_DB_SERVER: ${{ vars.BW_DB_SERVER }}
39+
BW_DOMAIN: ${{ vars.BW_DOMAIN }}
40+
BW_ENABLE_SSL: ${{ vars.BW_ENABLE_SSL }}
41+
BW_SSL_CERT: ${{ vars.BW_SSL_CERT }}
42+
BW_SSL_KEY: ${{ vars.BW_SSL_KEY }}
43+
CI: true
44+
CLI_SERVE_HOST: ${{ vars.CLI_SERVE_HOST }}
45+
CLI_SERVE_PORT: ${{ vars.CLI_SERVE_PORT }}
46+
EXTENSION_BUILD_PATH: ${{ vars.EXTENSION_BUILD_PATH }}
47+
PAGES_HOST_INSECURE_PORT: ${{ vars.PAGES_HOST_INSECURE_PORT }}
48+
PAGES_HOST_PORT: ${{ vars.PAGES_HOST_PORT }}
49+
PAGES_HOST: ${{ vars.PAGES_HOST }}
50+
VAULT_HOST_INSECURE_PORT: ${{ vars.VAULT_HOST_INSECURE_PORT }}
51+
VAULT_HOST_PORT: ${{ vars.VAULT_HOST_PORT }}
52+
VAULT_HOST_URL: ${{ vars.VAULT_HOST_URL }}
5353

5454
- name: Create feature flags file
5555
run: echo "{\"flagValues\":${{ inputs.FEATURE_FLAGS }}}" > flags.json

.github/workflows/test-all-custom-flags.yml

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -35,29 +35,29 @@ jobs:
3535
cache-dependency-path: "**/package-lock.json"
3636
node-version: "23"
3737

38-
- name: Log in to Azure
39-
uses: bitwarden/gh-actions/azure-login@main
40-
with:
41-
subscription_id: ${{ secrets.AZURE_SUBSCRIPTION_ID }}
42-
tenant_id: ${{ secrets.AZURE_TENANT_ID }}
43-
client_id: ${{ secrets.AZURE_CLIENT_ID }}
44-
45-
- name: Get Azure Key Vault secrets
46-
id: get-kv-secrets
47-
uses: bitwarden/gh-actions/get-keyvault-secrets@main
48-
with:
49-
keyvault: gh-browser-interactions
50-
secrets: "ENV-FILE,BW-INSTALLATION-ID,BW-INSTALLATION-KEY"
51-
52-
- name: Log out from Azure
53-
uses: bitwarden/gh-actions/azure-logout@main
54-
5538
- name: Create dotenv file
56-
run: |
57-
sudo setcap 'cap_net_bind_service=+ep' `which node`
58-
echo "${{ steps.get-kv-secrets.outputs.ENV-FILE }}" | base64 --decode > .env
59-
echo "BW_INSTALLATION_ID=${{ steps.get-kv-secrets.outputs.BW-INSTALLATION-ID }}" >> .env
60-
echo "BW_INSTALLATION_KEY=${{ steps.get-kv-secrets.outputs.BW-INSTALLATION-KEY }}" >> .env
39+
uses: ./.github/actions/setup-env-file
40+
with:
41+
AZURE_CLIENT_ID: ${{ secrets.AZURE_CLIENT_ID }}
42+
AZURE_SUBSCRIPTION_ID: ${{ secrets.AZURE_SUBSCRIPTION_ID }}
43+
AZURE_TENANT_ID: ${{ secrets.AZURE_TENANT_ID }}
44+
BW_DB_PORT: ${{ vars.BW_DB_PORT }}
45+
BW_DB_PROVIDER: ${{ vars.BW_DB_PROVIDER }}
46+
BW_DB_SERVER: ${{ vars.BW_DB_SERVER }}
47+
BW_DOMAIN: ${{ vars.BW_DOMAIN }}
48+
BW_ENABLE_SSL: ${{ vars.BW_ENABLE_SSL }}
49+
BW_SSL_CERT: ${{ vars.BW_SSL_CERT }}
50+
BW_SSL_KEY: ${{ vars.BW_SSL_KEY }}
51+
CI: true
52+
CLI_SERVE_HOST: ${{ vars.CLI_SERVE_HOST }}
53+
CLI_SERVE_PORT: ${{ vars.CLI_SERVE_PORT }}
54+
EXTENSION_BUILD_PATH: ${{ vars.EXTENSION_BUILD_PATH }}
55+
PAGES_HOST_INSECURE_PORT: ${{ vars.PAGES_HOST_INSECURE_PORT }}
56+
PAGES_HOST_PORT: ${{ vars.PAGES_HOST_PORT }}
57+
PAGES_HOST: ${{ vars.PAGES_HOST }}
58+
VAULT_HOST_INSECURE_PORT: ${{ vars.VAULT_HOST_INSECURE_PORT }}
59+
VAULT_HOST_PORT: ${{ vars.VAULT_HOST_PORT }}
60+
VAULT_HOST_URL: ${{ vars.VAULT_HOST_URL }}
6161

6262
- name: Create feature flags file
6363
run: echo "{\"flagValues\":${{ inputs.FEATURE_FLAGS || '{}' }}}" > flags.json

.github/workflows/test-all.yml

Lines changed: 22 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -34,30 +34,29 @@ jobs:
3434
cache-dependency-path: "**/package-lock.json"
3535
node-version: "23"
3636

37-
- name: Log in to Azure
38-
uses: bitwarden/gh-actions/azure-login@main
39-
with:
40-
subscription_id: ${{ secrets.AZURE_SUBSCRIPTION_ID }}
41-
tenant_id: ${{ secrets.AZURE_TENANT_ID }}
42-
client_id: ${{ secrets.AZURE_CLIENT_ID }}
43-
44-
- name: Get Azure Key Vault secrets
45-
id: get-kv-secrets
46-
uses: bitwarden/gh-actions/get-keyvault-secrets@main
47-
with:
48-
keyvault: gh-browser-interactions
49-
secrets: "ENV-FILE,BW-INSTALLATION-ID,BW-INSTALLATION-KEY"
50-
51-
- name: Log out from Azure
52-
uses: bitwarden/gh-actions/azure-logout@main
53-
5437
- name: Create dotenv file
55-
run: |
56-
sudo setcap 'cap_net_bind_service=+ep' `which node`
57-
echo "${{ steps.get-kv-secrets.outputs.ENV-FILE }}" | base64 --decode > .env
58-
echo "BW_INSTALLATION_ID=${{ steps.get-kv-secrets.outputs.BW-INSTALLATION-ID }}" >> .env
59-
echo "BW_INSTALLATION_KEY=${{ steps.get-kv-secrets.outputs.BW-INSTALLATION-KEY }}" >> .env
60-
echo "REMOTE_VAULT_CONFIG_MATCH=${{ inputs.REMOTE_VAULT_CONFIG_MATCH || vars.BW_REMOTE_VAULT_CONFIG_MATCH }}" >> .env
38+
uses: ./.github/actions/setup-env-file
39+
with:
40+
AZURE_CLIENT_ID: ${{ secrets.AZURE_CLIENT_ID }}
41+
AZURE_SUBSCRIPTION_ID: ${{ secrets.AZURE_SUBSCRIPTION_ID }}
42+
AZURE_TENANT_ID: ${{ secrets.AZURE_TENANT_ID }}
43+
BW_DB_PORT: ${{ vars.BW_DB_PORT }}
44+
BW_DB_PROVIDER: ${{ vars.BW_DB_PROVIDER }}
45+
BW_DB_SERVER: ${{ vars.BW_DB_SERVER }}
46+
BW_DOMAIN: ${{ vars.BW_DOMAIN }}
47+
BW_ENABLE_SSL: ${{ vars.BW_ENABLE_SSL }}
48+
BW_SSL_CERT: ${{ vars.BW_SSL_CERT }}
49+
BW_SSL_KEY: ${{ vars.BW_SSL_KEY }}
50+
CI: true
51+
CLI_SERVE_HOST: ${{ vars.CLI_SERVE_HOST }}
52+
CLI_SERVE_PORT: ${{ vars.CLI_SERVE_PORT }}
53+
EXTENSION_BUILD_PATH: ${{ vars.EXTENSION_BUILD_PATH }}
54+
PAGES_HOST_INSECURE_PORT: ${{ vars.PAGES_HOST_INSECURE_PORT }}
55+
PAGES_HOST_PORT: ${{ vars.PAGES_HOST_PORT }}
56+
PAGES_HOST: ${{ vars.PAGES_HOST }}
57+
VAULT_HOST_INSECURE_PORT: ${{ vars.VAULT_HOST_INSECURE_PORT }}
58+
VAULT_HOST_PORT: ${{ vars.VAULT_HOST_PORT }}
59+
VAULT_HOST_URL: ${{ vars.VAULT_HOST_URL }}
6160

6261
- name: Download extension artifact
6362
uses: dawidd6/action-download-artifact@09f2f74827fd3a8607589e5ad7f9398816f540fe # v3.1.4

0 commit comments

Comments
 (0)