You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/ce/getting-started/with-opentofu.mdx
+60Lines changed: 60 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,6 +10,7 @@ In this tutorial, you will set up Digger to automate OpenTofu pull requests usin
10
10
- Your cloud provider credentials:
11
11
- For AWS: [Hashicorp's AWS tutorial](https://developer.hashicorp.com/terraform/tutorials/aws-get-started/aws-build)
12
12
- For GCP: [Hashicorp's GCP tutorial](https://developer.hashicorp.com/terraform/tutorials/gcp-get-started/google-cloud-platform-build)
13
+
- For Azure: [Hashicorp's Azure tutorial](https://developer.hashicorp.com/terraform/tutorials/azure-get-started/azure-build)
13
14
14
15
# Step 1: create your Digger account
15
16
@@ -42,6 +43,13 @@ In GitHub repository settings, go to Secrets and Variables - Actions. Create the
42
43
-`GCP_CREDENTIALS` - contents of your GCP Service Account Key json file You
43
44
can also [use OIDC](/gcp/federated-oidc-access/) for GCP authentication.
44
45
</Tab>
46
+
<Tabtitle="Azure">
47
+
-`AZURE_CLIENT_ID` - Your Azure App Registration Client ID
48
+
-`AZURE_TENANT_ID` - Your Azure Tenant ID
49
+
-`AZURE_SUBSCRIPTION_ID` - Your Azure Subscription ID
50
+
51
+
You'll need to configure OIDC authentication by setting up federated credentials in your Azure App Registration. See [Azure OIDC setup](/ce/azure-specific/azure) for details.
52
+
</Tab>
45
53
</Tabs>
46
54
47
55
# Step 4: Create digger.yml
@@ -158,6 +166,57 @@ Place it at `.github/workflows/digger_workflow.yml` (name is important!)
158
166
- Verify that GCP is configured correctly by running `gcloud info`
159
167
160
168
</Tab>
169
+
<Tab title="Azure">
170
+
```yaml
171
+
name: Digger Workflow
172
+
173
+
on:
174
+
workflow_dispatch:
175
+
inputs:
176
+
spec:
177
+
required: true
178
+
run_name:
179
+
required: false
180
+
181
+
run-name: '${{inputs.run_name}}'
182
+
183
+
jobs:
184
+
digger-job:
185
+
runs-on: ubuntu-latest
186
+
permissions:
187
+
contents: write # required to merge PRs
188
+
actions: write # required for plan persistence
189
+
id-token: write # required for workload-identity-federation
190
+
pull-requests: write # required to post PR comments
191
+
issues: read # required to check if PR number is an issue or not
192
+
statuses: write # required to validate combined PR status
Copy file name to clipboardExpand all lines: docs/ce/getting-started/with-terraform.mdx
+60Lines changed: 60 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,6 +10,7 @@ In this tutorial, you will set up Digger to automate terraform pull requests usi
10
10
- Your cloud provider credentials:
11
11
- For AWS: [Hashicorp's AWS tutorial](https://developer.hashicorp.com/terraform/tutorials/aws-get-started/aws-build)
12
12
- For GCP: [Hashicorp's GCP tutorial](https://developer.hashicorp.com/terraform/tutorials/gcp-get-started/google-cloud-platform-build)
13
+
- For Azure: [Hashicorp's Azure tutorial](https://developer.hashicorp.com/terraform/tutorials/azure-get-started/azure-build)
13
14
14
15
# Step 1: create your Digger account
15
16
@@ -42,6 +43,13 @@ In GitHub repository settings, go to Secrets and Variables - Actions. Create the
42
43
-`GCP_CREDENTIALS` - contents of your GCP Service Account Key json file You
43
44
can also [use OIDC](/gcp/federated-oidc-access/) for GCP authentication.
44
45
</Tab>
46
+
<Tabtitle="Azure">
47
+
-`AZURE_CLIENT_ID` - Your Azure App Registration Client ID
48
+
-`AZURE_TENANT_ID` - Your Azure Tenant ID
49
+
-`AZURE_SUBSCRIPTION_ID` - Your Azure Subscription ID
50
+
51
+
You'll need to configure OIDC authentication by setting up federated credentials in your Azure App Registration. See [Azure OIDC setup](/ce/azure-specific/azure) for details.
52
+
</Tab>
45
53
</Tabs>
46
54
47
55
# Step 4: Create digger.yml
@@ -158,6 +166,57 @@ Place it at `.github/workflows/digger_workflow.yml` (name is important!)
158
166
- Verify that GCP is configured correctly by running `gcloud info`
159
167
160
168
</Tab>
169
+
<Tab title="Azure">
170
+
```yaml
171
+
name: Digger Workflow
172
+
173
+
on:
174
+
workflow_dispatch:
175
+
inputs:
176
+
spec:
177
+
required: true
178
+
run_name:
179
+
required: false
180
+
181
+
run-name: '${{inputs.run_name}}'
182
+
183
+
jobs:
184
+
digger-job:
185
+
runs-on: ubuntu-latest
186
+
permissions:
187
+
contents: write # required to merge PRs
188
+
actions: write # required for plan persistence
189
+
id-token: write # required for workload-identity-federation
190
+
pull-requests: write # required to post PR comments
191
+
issues: read # required to check if PR number is an issue or not
192
+
statuses: write # required to validate combined PR status
Copy file name to clipboardExpand all lines: docs/ce/getting-started/with-terragrunt.mdx
+59Lines changed: 59 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,6 +10,7 @@ In this tutorial, you will set up Digger to automate Terragrunt pull requests us
10
10
- Your cloud provider credentials:
11
11
- For AWS: [Hashicorp's AWS tutorial](https://developer.hashicorp.com/terraform/tutorials/aws-get-started/aws-build)
12
12
- For GCP: [Hashicorp's GCP tutorial](https://developer.hashicorp.com/terraform/tutorials/gcp-get-started/google-cloud-platform-build)
13
+
- For Azure: [Hashicorp's Azure tutorial](https://developer.hashicorp.com/terraform/tutorials/azure-get-started/azure-build)
13
14
14
15
# Step 1: create your Digger account
15
16
@@ -44,6 +45,13 @@ In GitHub repository settings, go to Secrets and Variables - Actions. Create the
44
45
45
46
You can also [use OIDC](/gcp/federated-oidc-access/) for GCP authentication.
46
47
</Tab>
48
+
<Tabtitle="Azure">
49
+
-`AZURE_CLIENT_ID` - Your Azure App Registration Client ID
50
+
-`AZURE_TENANT_ID` - Your Azure Tenant ID
51
+
-`AZURE_SUBSCRIPTION_ID` - Your Azure Subscription ID
52
+
53
+
You'll need to configure OIDC authentication by setting up federated credentials in your Azure App Registration. See [Azure OIDC setup](/ce/azure-specific/azure) for details.
54
+
</Tab>
47
55
</Tabs>
48
56
49
57
# Step 4: Create digger.yml
@@ -204,6 +212,57 @@ Place it at `.github/workflows/digger_workflow.yml` (name is important!)
204
212
- Set up Google Cloud SDK for use in the subsequent steps via Google's official [Setup-gcloud action](https://github.com/google-github-actions/setup-gcloud)
205
213
- Verify that GCP is configured correctly by running `gcloud info`
206
214
</Tab>
215
+
<Tab title="Azure">
216
+
```yaml
217
+
name: Digger Workflow
218
+
219
+
on:
220
+
workflow_dispatch:
221
+
inputs:
222
+
spec:
223
+
required: true
224
+
run_name:
225
+
required: false
226
+
227
+
run-name: '${{inputs.run_name}}'
228
+
229
+
jobs:
230
+
digger-job:
231
+
runs-on: ubuntu-latest
232
+
permissions:
233
+
contents: write # required to merge PRs
234
+
actions: write # required for plan persistence
235
+
id-token: write # required for workload-identity-federation
236
+
pull-requests: write # required to post PR comments
237
+
issues: read # required to check if PR number is an issue or not
238
+
statuses: write # required to validate combined PR status
0 commit comments