GitHub
This section details the prerequisites for GitHub.
The accelerator does not support GitHub personal accounts, since they don’t support all the features required for security. You must have a GitHub organization account or the accelerator will fail on apply. You can create a free organization here. Learn more about account types here.
If you choose to use afreeorganization account the accelerator bootstrap will make your repositories public. It must do this to support the functionality required by the accelerator. This is not recommended for production environments.
This first PAT is referred to as token-1.
- Navigate to github.com.
- Click on your user icon in the top right and select
Settings. - Scroll down and click on
Developer Settingsin the left navigation. - Click
Personal access tokensin the left navigation and selectFine-grained tokens. - Click
Generate new tokenat the top. - Enter
Azure Landing Zone Terraform Acceleratorin theToken namefield. - Alter the
Resource ownerdrop down and select your organization. - Alter the
Expirationdrop down and selectCustom. - Choose tomorrows date in the date picker.
- Alter the
Repository accessradio button and selectAll repositories. - Add the following
Repositorypermissions:Actions:Read and writeAdministration:Read and writeContents:Read and writeEnvironments:Read and writeSecrets:Read and writeVariables:Read and writeWorkflows:Read and write
- Add the following
Organizationpermissions:Members:Read and writeSelf-hosted runners:Read and writeOnly required if you plan to use Runner Groups at the organization level.
- Click
Generate token. - Copy the token and save it somewhere safe.
If you are using self-hosted runners, you will need to create a second PAT that we’ll refer to as token-2 for them. You can do this by following these steps:
Select
No expirationfor theExpirationfield.You may want to set a shorter expiration date for security reasons. In either case, you will need to have a process in place to extend expiration the token before it expires.Navigate to github.com.
Click on your user icon in the top right and select
Settings.Scroll down and click on
Developer Settingsin the left navigation.Click
Personal access tokensin the left navigation and selectFine-grained tokens.Click
Generate new tokenat the top.Enter
Azure Landing Zone Terraform Accelerator Runner Registrationin theToken namefield.Alter the
Resource ownerdrop down and select your organization.Alter the
Expirationdrop down and selectNo Expiration.You can of course set an expiration date if you prefer, but you’ll need to ensure you have a process in place to renew it before it expires.Alter the
Repository accessradio button and selectAll repositories.You can should this post bootstrap deployment to limit access to only the repository where you will be using self-hosted runner. We’ll remind you to do this in the next steps after the bootstrap is complete.Add the following
Repositorypermissions:Administration:Read and write
Add the following
Organizationpermissions:Self-hosted runners:Read and writeOnly required if you plan to use Runner Groups at the organization level.
Click
Generate token.Copy the token and save it somewhere safe.