Create variable group in Azure DevOps project.
Usage:
spk variable-group [command] [options]
Commands:
Global options:
-v, --verbose Enable verbose logging
-h, --help Usage information
An existing Azure DevOps project is required to create a Variable Group. In addition, to link secrets from an Azure key vault as variables in Variable Group, you will need an existing key vault containing your secrets and the Service Principal for authorization with Azure Key Vault.
- Use existng or create a service prrincipal either in Azure Portal or with Azure CLI.
- Use existing or create a Key Vault in Azure Portal or with Azure CLI.
- Give the service principal
get
andlist
access in Azure Key Vault. Follow step 2 from these instructions.
Add a new variable group in Azure DevOps project
Usage:
spk variable-group create|c [options]
Options:
-f, --file <file> Path to the yaml file that contains variable group manifest
-o, --org-name <organization-name> Azure DevOps organization name; falls back to azure_devops.org in spk config
-d, --devops-project <project> Azure DevOps project name; falls back to azure_devops.project in spk config
-a, --personal-access-token <personal-access-token> Personal access token from Azure DevOps org; falls back to azure_devops.access_token in spk config
Variable Group Yaml Manifest File Format
-
Variable Group manifest with variables stored in Azure DevOps
name: "myvg" description: "myvg description" type: "Vsts" variables: storage-account-name: value: fabrikamstorage storage-account-access-key: value: "fabrikamstorage access key" isSecret: true
NOTE:
variables
value can also support json format as shown below.variables: { storage-account-name: { value: "fabrikamstorage" }, storage-account-access-key: {value: "fabrikamstorage access key", isSecret: true } }
-
Variable Group manifest with varibles linking to secrets in Azure Key Vault
name: "myvg" description: "myvg description" type: "AzureKeyVault" variables: storage-account-name: enabled: true storage-account-access-key: enabled: true personal-access-token: enabled: true key_vault_provider: name: "mykeyvault" # name of the Azure Key Vault with Secrets service_endpoint: # service endpoint is required to authorize with Azure Key Vault name: "service-connection-name" # service endpoint name to find an existing endpoint or to create a new endpoint with this name subscription_id: "subscription-id" # Azure Subscription id where Key Vault exist subscription_name: "sub-name" # Azure Subscription name where Key Vault exist service_principal_id: "service-principal-id" # Service Principal Id that has 'Get' and 'List' in Key Vault Access Policy service_principal_secret: "service-principal-secret" # Service Principal secret tenant_id: "tenant-id" # AAD Tenant Id for the above Service Principal
NOTE:
-
SPK will create a new service endpoint when it does not exist by
service_endpoint: name
. -
variables
value can also support json format as shown below.variables: { fabrikam-storage-account: { enabled: true }, fabrikam-storage-account-access-key: { enabled: true }, azdo-personal-access-token: { enabled: true } }
-