Jenkins plugin to manage Azure credentials.
It supports the following Azure credential types:
- Azure Service Principal,
with the following authentication mechanism:
- Client secret
- Certificate (Add the certificate to Jenkins credentials store and reference it in the Azure Service Principal configuration)
- Azure Managed Service Identity (MSI)
- Credentials In Azure Key Vault
-
Update your project POM file to reference
azure-credentials
plugin and necessary dependencies:... <dependencies> <dependency> <groupId>org.jenkins-ci.plugins</groupId> <artifactId>azure-credentials</artifactId> <version>${azure-credentials.version}</version> </dependency> <dependency> <groupId>org.jenkins-ci.plugins</groupId> <artifactId>azure-commons-core</artifactId> <version>${azure-commons.version}</version> </dependency> ... </dependencies> <build> <plugins> <plugin> <groupId>org.jenkins-ci.tools</groupId> <artifactId>maven-hpi-plugin</artifactId> <configuration> <maskClasses> com.microsoft.jenkins.azurecommons.core. </maskClasses> </configuration> </plugin> </plugins> ... </build>
-
Add the credential selector in the
config.jelly
andDescriptor
... <f:entry title="${%azureCredentialsId_title}" field="azureCredentialsId"> <c:select expressionAllowed="false"/> </f:entry> ...
public ListBoxModel doFillAzureCredentialsIdItems(@AncestorInPath Item owner) { StandardListBoxModel model = new StandardListBoxModel(); model.add(Messages.ACSDeploymentContext_selectAzureCredentials(), Constants.INVALID_OPTION); model.includeAs(ACL.SYSTEM, owner, AzureBaseCredentials.class); return model; }
-
Build the Azure client from the credential
AzureBaseCredentials credential = AzureCredentialUtil.getCredential2(credentialsId); // Resolve the class loader incompatibility issue. Works along with maskClasses in the POM TokenCredentialData token = TokenCredentialData.deserialize(credential.serializeToTokenData()); Azure azClient = AzureClientFactory.getClient(token);
CredentialsProvider.lookupCredentials(AzureBaseCredentials.class, null, ACL.SYSTEM, Collections.<DomainRequirement>emptyList());
Custom binding for AzureCredentials to support reading Azure service principal in both freestyle and pipeline using Credentials Binding plugin.
In freestyle jobs, click Use secret text(s) or file(s)
in the Build Environment
in the configuration page and add a Microsoft Azure Service Principal
item, which allows you add credential bindings where the Variable value will be used as the name of the environment variable that your build can use to access the value of the credential. With the default variable names you can reference the service principal as the following:
echo "My client id is $AZURE_CLIENT_ID"
echo "My client secret is $AZURE_CLIENT_SECRET"
echo "My tenant id is $AZURE_TENANT_ID"
echo "My subscription id is $AZURE_SUBSCRIPTION_ID"
In pipelines, there're two ways to construct this binding:
-
With defaults, which will read specified service principal into four predefined environment variables:
AZURE_SUBSCRIPTION_ID
,AZURE_CLIENT_ID
,AZURE_CLIENT_SECRET
,AZURE_TENANT_ID
. Sample pipeline code:withCredentials([azureServicePrincipal('credentials_id')]) { sh 'az login --service-principal -u $AZURE_CLIENT_ID -p $AZURE_CLIENT_SECRET -t $AZURE_TENANT_ID' }
-
With custom name, where you can control the names of the variables. Sample pipeline code:
withCredentials([azureServicePrincipal(credentialsId: 'credentials_id', subscriptionIdVariable: 'SUBS_ID', clientIdVariable: 'CLIENT_ID', clientSecretVariable: 'CLIENT_SECRET', tenantIdVariable: 'TENANT_ID')]) { sh 'az login --service-principal -u $CLIENT_ID -p $CLIENT_SECRET -t $TENANT_ID' }
We use Jenkins JIRA to record all bugs and feature requests. Please follow beblow steps to create your own issues.
- Search in Jira to see if the issue was existed already.
- Create a new issue with the component
azure-credentials-plugin
.
You can refer to Jira doc for detailed instructions about creating an issue.