title | description | author | ms.author | ms.reviewer | ms.topic | ms.date | ms.custom |
---|---|---|---|---|---|---|---|
Deploy by Using GitHub Actions |
Learn how to deploy your code to Azure App Service from a CI/CD pipeline by using GitHub Actions. Customize the build tasks and run complex deployments. |
cephalin |
cephalin |
ushan |
how-to |
01/16/2025 |
github-actions-azure, devx-track-azurecli |
Use GitHub Actions to automate your workflow and deploy to Azure App Service from GitHub.
- An Azure account with an active subscription. Create an account for free.
- A GitHub account. If you don't have one, sign up for free.
GitHub Actions deployment is integrated into the default Create Web App process. Set Continuous deployment to Enable in the Deployment tab, and configure your chosen organization, repository, and branch.
:::image type="content" source="media/deploy-github-actions/create-wizard-deployment.png" alt-text="Screenshot that shows how to enable GitHub Actions deployment in the App Service Deployment tab.":::
When you enable continuous deployment, the Create Web App process automatically picks the authentication method based on the basic authentication selection and configures your app and your GitHub repository accordingly:
Basic authentication selection | Authentication method |
---|---|
Disable | User-assigned identity (OpenID Connect) (recommended) |
Enable | Basic authentication |
Note
When you create an app, you might receive an error that states that your Azure account doesn't have certain permissions. Your account might need the required permissions to create and configure the user-assigned identity. For an alternative, see the following section.
For an existing app, you can quickly get started with GitHub Actions by using Deployment Center in App Service. This turnkey method generates a GitHub Actions workflow file based on your application stack and commits it to your GitHub repository.
By using Deployment Center, you can also easily configure the more secure OpenID Connect authentication with a user-assigned identity. For more information, see the user-assigned identity option.
If your Azure account has the needed permissions, you can create a user-assigned identity. Otherwise, you can select an existing user-assigned managed identity in the Identity dropdown menu. You can work with your Azure administrator to create a user-assigned managed identity with the Website Contributor role.
For more information, see Continuous deployment to Azure App Service.
You can deploy a workflow without using Deployment Center. Perform these three steps:
- Generate deployment credentials.
- Configure the GitHub secret.
- Add the workflow file to your GitHub repository.
We recommend that you use OpenID Connect to authenticate with Azure App Service for GitHub Actions. This authentication method uses short-lived tokens. Setting up OpenID Connect with GitHub Actions is more complex but offers hardened security.
You can also authenticate with a user-assigned managed identity, a service principal, or a publish profile.
The following procedure describes the steps for creating a Microsoft Entra application, service principal, and federated credentials using Azure CLI statements. To learn how to create a Microsoft Entra application, service principal, and federated credentials in the Azure portal, see Connect GitHub and Azure.
-
If you don't have an existing application, register a new Microsoft Entra application and service principal that can access resources. Create the Microsoft Entra application.
az ad app create --display-name myApp
This command returns a JSON output with an
appId
that is yourclient-id
. Save the value to use as theAZURE_CLIENT_ID
GitHub secret later.You use the
objectId
value when you create federated credentials with Graph API and reference it as theAPPLICATION-OBJECT-ID
. -
Create a service principal. Replace the
$appID
with theappId
from your JSON output.This command generates a JSON output with a different
objectId
to use in the next step. The newobjectId
is theassignee-object-id
.Copy the
appOwnerTenantId
to later use as a GitHub secret forAZURE_TENANT_ID
.az ad sp create --id $appId
-
Create a new role assignment by subscription and object. By default, the role assignment is tied to your default subscription. Replace
$subscriptionId
with your subscription ID,$resourceGroupName
with your resource group name,$webappName
with your web app name, and$assigneeObjectId
with the generatedid
. Learn how to manage Azure subscriptions with the Azure CLI.az role assignment create --role contributor --subscription $subscriptionId --assignee-object-id $assigneeObjectId --scope /subscriptions/$subscriptionId/resourceGroups/$resourceGroupName/providers/Microsoft.Web/sites/$webappName --assignee-principal-type ServicePrincipal
-
Run the following command to create a new federated identity credential for your Microsoft Entra app.
-
Replace
APPLICATION-OBJECT-ID
with theappId
that you generated during app creation for your Active Directory application. -
Set a value for
CREDENTIAL-NAME
to reference later. -
Set the
subject
. GitHub defines its value depending on your workflow:- For jobs in your GitHub Actions environment, use:
repo:< Organization/Repository >:environment:< Name >
- For jobs not tied to an environment, include the ref path for branch/tag based on the ref path used for triggering the workflow:
repo:< Organization/Repository >:ref:< ref path>
. For example,repo:n-username/ node_express:ref:refs/heads/my-branch
orrepo:n-username/ node_express:ref:refs/tags/my-tag
. - For workflows triggered by a pull request event, use:
repo:< Organization/Repository >:pull_request
.
- For jobs in your GitHub Actions environment, use:
az ad app federated-credential create --id <APPLICATION-OBJECT-ID> --parameters credential.json ("credential.json" contains the following content) { "name": "<CREDENTIAL-NAME>", "issuer": "https://token.actions.githubusercontent.com", "subject": "repo:organization/repository:ref:refs/heads/main", "description": "Testing", "audiences": [ "api://AzureADTokenExchange" ] }
-
Note
To use publish profile, you must enable basic authentication.
A publish profile is an app-level credential. Set up your publish profile as a GitHub secret.
-
Go to App Service in the Azure portal.
-
On the Overview page, select Download publish profile.
-
Save the downloaded file. Use the contents of the file to create a GitHub secret.
Note
As of October 2020, Linux web apps need the app setting WEBSITE_WEBDEPLOY_USE_SCM
set to true
before downloading the publish profile.
You can create a service principal with the az ad sp create-for-rbac
command in the Azure CLI. Run this command by using Azure Cloud Shell in the Azure portal or by selecting Open Cloud Shell.
az ad sp create-for-rbac --name "myApp" --role contributor \
--scopes /subscriptions/<subscription-id>/resourceGroups/<group-name>/providers/Microsoft.Web/sites/<app-name> \
--json-auth
In the previous example, replace the placeholders with your subscription ID, resource group name, and app name. The output is a JSON object with the role assignment credentials that provide access to your App Service app. The output should look similar to the following JSON snippet. Copy this JSON object for later.
{
"clientId": "<GUID>",
"clientSecret": "<GUID>",
"subscriptionId": "<GUID>",
"tenantId": "<GUID>",
(...)
}
Important
We recommend that you grant minimum access. The scope in the previous example is limited to the specific App Service app and not the entire resource group.
You need to provide your application's Client ID, Tenant ID, and Subscription ID to the Azure/login
action. These values can either be provided directly in the workflow or can be stored in GitHub secrets and referenced in your workflow. Saving the values as GitHub secrets is the more secure option.
-
Open your GitHub repository and go to Settings > Security > Secrets and variables > Actions > New repository secret.
-
Create secrets for
AZURE_CLIENT_ID
,AZURE_TENANT_ID
, andAZURE_SUBSCRIPTION_ID
. Use these values from your Active Directory application for your GitHub secrets:GitHub secret Active Directory application AZURE_CLIENT_ID
Application (client) ID AZURE_TENANT_ID
Directory (tenant) ID AZURE_SUBSCRIPTION_ID
Subscription ID -
Select Add secret to save each secret.
In GitHub, browse to your repository. Select Settings > Security > Secrets and variables > Actions > New repository secret.
To use the app-level credentials that you created in the previous section, paste the contents of the downloaded publish profile file into the secret's value field. Name the secret AZURE_WEBAPP_PUBLISH_PROFILE
.
When you configure the GitHub workflow file later, use the AZURE_WEBAPP_PUBLISH_PROFILE
in the Deploy Azure Web App action. For example:
- uses: azure/webapps-deploy@v2
with:
publish-profile: ${{ secrets.AZURE_WEBAPP_PUBLISH_PROFILE }}
In GitHub, browse to your repository. Select Settings > Security > Secrets and variables > Actions > New repository secret.
To use the user-level credentials that you created in the previous section, paste the entire JSON output from the Azure CLI command into the secret's value field. Name the secret AZURE_CREDENTIALS
.
When you configure the GitHub workflow file later, use the secret for the input creds
of Azure/login
. For example:
- uses: azure/login@v2
with:
creds: ${{ secrets.AZURE_CREDENTIALS }}
A YAML (.yml) file in the /.github/workflows/
path in your GitHub repository defines a workflow. This definition contains the various steps and parameters that make up the workflow.
At a minimum, the workflow file has the following distinct steps:
- Authenticate with App Service by using the GitHub secret you created.
- Build the web app.
- Deploy the web app.
To deploy your code to an App Service app, use the azure/webapps-deploy@v3
action. The action requires the name of your web app in app-name
and, depending on your language stack, the path of a *.zip
, *.war
, *.jar
, or folder to deploy in package
. For a complete list of possible inputs for the azure/webapps-deploy@v3
action, see action.yml.
The following examples show the part of the workflow that builds the web app, in different supported languages.
[!INCLUDE deploy-github-actions-openid-connect]
[!INCLUDE deploy-github-actions-publish-profile]
[!INCLUDE deploy-github-actions-service-principal]
- How do I deploy a WAR file through the Maven plugin?
- How do I deploy a WAR file through the Azure CLI?
- How do I deploy a startup file?
- How do I deploy to a container?
- How do I update the Tomcat configuration after deployment?
If you configured your Java Tomcat project with the Maven plugin, you can also deploy to Azure App Service through this plugin. If you use the Azure CLI GitHub action, it makes use of your Azure credentials.
- name: Azure CLI script file
uses: azure/cli@v2
with:
inlineScript: |
mvn package azure-webapp:deploy
For more information on how to use and configure the Maven plugin, see Maven plugin wiki for Azure App Service.
If you prefer to use the Azure CLI to deploy to App Service, you can use the GitHub Action for the Azure CLI.
- name: Azure CLI script
uses: azure/cli@v2
with:
inlineScript: |
az webapp deploy --src-path '${{ github.workspace }}/target/yourpackage.war' --name ${{ env.AZURE_WEBAPP_NAME }} --resource-group ${{ env.RESOURCE_GROUP }} --async true --type war
For more information on how to use and configure the GitHub action for the Azure CLI, see the Azure CLI GitHub action.
For more information on the az webapp deploy
command, including how to use it and the parameter details, see az webapp deploy
documentation.
Use the GitHub Action for the Azure CLI. For example:
- name: Deploy startup script
uses: azure/cli@v2
with:
inlineScript: |
az webapp deploy --src-path ${{ github.workspace }}/src/main/azure/createPasswordlessDataSource.sh --name ${{ env.AZURE_WEBAPP_NAME }} --resource-group ${{ env.RESOURCE_GROUP }} --type startup --track-status false
With the Azure Web Deploy action, you can automate your workflow to deploy custom containers to App Service by using GitHub Actions. For more information, see Deploy to a container.
If you want to update any of your web apps settings after deployment, you can use the App Service settings action.
- uses: azure/appservice-settings@v1
with:
app-name: 'my-app'
slot-name: 'staging' # Optional and needed only if the settings have to be configured on the specific deployment slot
app-settings-json: '[{ "name": "CATALINA_OPTS", "value": "-Dfoo=bar" }]'
connection-strings-json: '${{ secrets.CONNECTION_STRINGS }}'
general-settings-json: '{"alwaysOn": "false", "webSocketsEnabled": "true"}' #'General configuration settings as Key Value pairs'
id: settings
For more information on how to use and configure this action, see the App Service settings repository.
Check out the following references on Azure GitHub Actions and workflows: