Skip to content

azure-dev-cli_0.5.0-beta.1

Compare
Choose a tag to compare
@azure-sdk azure-sdk released this 11 Jan 18:19
· 943 commits to main since this release
57cba77

0.5.0-beta.1 (2023-01-11)

Features Added

  • [#1311] Add support to install script with MSI on Windows.
  • [#1312] Allow users to configure service endpoints using SERVICE_<service>_ENDPOINTS.
  • [#1323] Add API Management Service support for all templates.
  • [#1326] Add purge support for API Management Service.
  • [#1076] Refactor the Bicep tool in azd to use the standalone API vs az command wrapper.
  • [#1087] Add NodeJs and Terraform devcontainer.
  • [#965] Add UX style for azd init.
  • [#1100] Add Shell completion.
  • [#1086] Add FederatedIdentityCredentials (FICS).
  • [#1177] Add command azd auth token.
  • [#1210] Have azd acquire Bicep.
  • [#1133] Add UX style for azd provision.
  • [#1248] Support redirect port for azd login.
  • [#1269] Add UX style for azd deploy.

Breaking Changes

  • [#1129] Remove all dependencies on az cli.
  • [#1105] azd env new now accepts the name of the environment as the first argument, i.e. azd env new <environment>. Previously, this behavior was accomplished via the global environment flag -e, i.e. azd env new -e <environment>.
  • [#1022] azd no longer uses the az CLI to authenticate with Azure by default. You will need to run azd login after upgrading. You may run azd config set auth.useAzCliAuth true to restore the old behavior of using az for authentication.

Bugs Fixed

  • [#1107] Fix Bicep path not found.
  • [#1096] Fix Java version check for major-only release.
  • [#1105] Fix env new to use positional argument.
  • [#1168] Fix purge option for command azd down --force --purge to purge key vaults and app configurations resources.

If you have existing pipelines that use azd, you will need to update your pipelines to use the new azd login methods when authenticating against Azure.

GitHub Actions pipelines:

Update your azure-dev.yml to stop using the azure/login@v1 action, and instead log in using azd directly. To do so, replace:

- name: Log in with Azure
  uses: azure/login@v1
  with:
    creds: ${{ secrets.AZURE_CREDENTIALS }}

with

With Client Credentials

- name: Log in with Azure (Client Credentials)
  run: |
    $info = $Env:AZURE_CREDENTIALS | ConvertFrom-Json -AsHashtable;
    Write-Host "::add-mask::$($info.clientSecret)"

    azd login `
      --client-id "$($info.clientId)" `
      --client-secret "$($info.clientSecret)" `
      --tenant-id "$($info.tenantId)"
  shell: pwsh
  env:
    AZURE_CREDENTIALS: ${{ secrets.AZURE_CREDENTIALS }}

With Federated Credentials

- name: Log in with Azure (Federated Credentials)
  run: |
    azd login `
      --client-id "$Env:AZURE_CLIENT_ID" `
      --federated-credential-provider "github" `
      --tenant-id "$Env:AZURE_TENANT_ID"
  shell: pwsh

Azure DevOps pipelines:

Update your azure-dev.yml file to force azd to use az for authentication. To do so, add a new step before any other steps which use azd:

- pwsh: |
    azd config set auth.useAzCliAuth "true"
  displayName: Configure azd to Use az CLI Authentication.

We plan to improve this behavior with [#1126].