GitHub Actions workflows (CI/CD)
To deploy the Azure TRE using GitHub workflows, create a fork of the repository.
Deployment is done using the /.github/workflows/deploy_tre.yml
workflow. This method is also used to deploy the dev/test environment for the original Azure TRE repository.
Setup instructions
Before you can run the deploy_tre.yml
workflow there are some one-time configuration steps that we need to do, similar to the Pre-deployment steps for manual deployment.
Tip
In some of the steps below, you are asked to configure repository secrets. Follow the GitHub guide on creating repository secrets if you are unfamiliar with this step.
- Create a service principal for the subscription so that the workflow can provision Azure resources.
- Decide on a TRE ID and the location for the Azure resources
- Create app registrations for API authentication
- Create app registrations and a user for the E2E tests
- Create a workspace app registration for setting up workspaces (for the E2E tests)
- Create a Teams WebHook for deployment notifications
- Configure repository secrets
- Deploy the TRE using the workflow
Create a service principal for provisioning resources
-
Login to Azure
Log in to Azure using
az login
and select the Azure subscription you wish to deploy Azure TRE to:az login az account list az account set --subscription <subscription ID>
See Sign in with Azure CLI for more details.
-
Create a service principal
A service principal needs to be created to authorize CI/CD workflows to provision resources for the TRE workspaces and workspace services.
Create a main service principal with "Owner" role:
az ad sp create-for-rbac --name "sp-aztre-cicd" --role Owner --scopes /subscriptions/<subscription_id> --sdk-auth
Caution
Save the JSON output locally - as you will need it later for setting secrets in the build
-
Create a repository secret named
AZURE_CREDENTIALS
and use the JSON output from the previous step as its value. Note it should look similar to this:{ "clientId": "", "clientSecret": "", "subscriptionId": "", "tenantId": "" }
Decide on a TRE ID and Azure resources location
Configure the TRE ID and LOCATION repository secrets
Secret name |
Description |
---|---|
TRE_ID |
A globally unique identifier. TRE_ID can be found in the resource names of the Azure TRE instance; for example, a TRE_ID of tre-dev-42 will result in a resource group name for Azure TRE instance of rg-tre-dev-42 . This must be less than 12 characters. Allowed characters: Alphanumeric, underscores, and hyphens. |
LOCATION |
The Azure location (region) for all resources. E.g. westeurope |
Create app registrations for API authentication
Follow the instructions to run the app registration script in the Authentication and Authorization document. Use the values for TRE ID and LOCATION from above.
Configure the TRE API and Swagger UI repository secrets
Secret name |
Description |
---|---|
AAD_TENANT_ID |
The tenant ID of the Azure AD. |
SWAGGER_UI_CLIENT_ID |
The application (client) ID of the TRE Swagger UI app. |
API_CLIENT_ID |
The application (client) ID of the TRE API app. |
API_CLIENT_SECRET |
The application password (client secret) of the TRE API app. |
Create an app registration and a user for the E2E tests
Follow the instructions to create an app registration and a test user for the E2E tests in the Authentication and Authorization document.
Configure the E2E Test repository secrets
Secret name |
Description |
---|---|
TEST_APP_ID |
The application (client) ID of the E2E Test app |
TEST_USER_NAME |
The username of the E2E Test User |
TEST_USER_PASSWORD |
The password of the E2E Test User |
Create a workspace app registration for setting up workspaces (for the E2E tests)
Follow the instructions to create a workspace app registration (used for the E2E tests) - and make the E2E test user a WorkspaceOwner for the app registration.
Configure the TEST_WORKSPACE_APP_ID repository secret
Secret name |
Description |
---|---|
TEST_WORKSPACE_APP_ID |
The application (client) ID of the Workspaces app. |
TEST_WORKSPACE_APP_SECRET |
The application (client) secret of the Workspaces app. |
Create a Teams Webhook for deployment notifications
The deploy_tre.yml
workflow sends a notification to a Microsoft Teams channel when it finishes running.
Note
If you don't want to notify a channel, you can also remove the Notify dedicated teams channel steps in the workflow
-
Follow the Microsoft Docs to create a webhook for your channel
-
Configure the MS_TEAMS_WEBHOOK_URI repository secret
Secret nameDescription MS_TEAMS_WEBHOOK_URI
URI for the Teams channel webhook
Configure repository secrets
Configure additional repository secrets used in the deployment workflow
Secret name |
Description |
---|---|
MGMT_RESOURCE_GROUP_NAME |
The name of the shared resource group for all Azure TRE core resources. |
MGMT_STORAGE_ACCOUNT_NAME |
The name of the storage account to hold the Terraform state and other deployment artifacts. E.g. mystorageaccount . |
ACR_NAME |
A globally unique name for the Azure Container Registry (ACR) that will be created to store deployment images. |
CORE_ADDRESS_SPACE |
The address space for the Azure TRE core virtual network. E.g. 10.1.0.0/22 . Recommended /22 or larger. |
TRE_ADDRESS_SPACE |
The address space for the whole TRE environment virtual network where workspaces networks will be created (can include the core network as well). E.g. 10.0.0.0/12 |
TERRAFORM_STATE_CONTAINER_NAME |
Optional. The name of the blob container to hold the Terraform state. Default value is tfstate . |
CORE_APP_SERVICE_PLAN_SKU |
Optional. The SKU used for AppService plan for core infrastructure. Default value is P1v2 . |
WORKSPACE_APP_SERVICE_PLAN_SKU |
Optional. The SKU used for AppService plan used in E2E tests. Default value is P1v2 . |
Deploy the TRE using the workflow
With all the repository secrets set, you can trigger a workflow run by pushing to develop/main of your fork, or by dispatching the workflow manually.