Skip to main content

git-ape-onboarding


title: "Git Ape Onboarding" sidebar_label: "Git Ape Onboarding" description: "Onboard a repository, Azure subscription(s), and user identity for Git-Ape CI/CD using a skill-driven CLI playbook. Use for first-time setup of OIDC, federated credentials, RBAC, GitHub environments, and required secrets."​

Git Ape Onboarding

Onboard a repository, Azure subscription(s), and user identity for Git-Ape CI/CD using a skill-driven CLI playbook. Use for first-time setup of OIDC, federated credentials, RBAC, GitHub environments, and required secrets.

Details​

PropertyValue
Skill Directory.github/skills/git-ape-onboarding/
PhaseOperations
User Invocable✅ Yes
Usage/git-ape-onboarding GitHub repo URL, subscription target(s), and onboarding mode (single or multi-environment)

Documentation​

Git-Ape Onboarding

Use this skill to bootstrap a repository for Git-Ape deployments by executing the onboarding workflow directly from Copilot Chat.

This skill is the source of truth for onboarding behavior. Do not depend on a standalone repository script for setup logic.

When to Use​

  • First-time setup of a repository for Git-Ape
  • New subscription onboarding (single environment)
  • Multi-environment onboarding (dev/staging/prod across different subscriptions)
  • New user handoff where OIDC, RBAC, and GitHub environments must be created

What It Configures​

This skill configures:

  1. Entra ID App Registration and service principal (or reuses existing)
  2. OIDC federated credentials for GitHub Actions
  3. RBAC role assignment(s) on subscription scope
  4. GitHub environments (azure-deploy*, azure-destroy)
  5. Required GitHub secrets (AZURE_CLIENT_ID, AZURE_TENANT_ID, AZURE_SUBSCRIPTION_ID)

Prerequisites​

Before onboarding, run the prereq-check skill to verify all required tools are installed and auth sessions are active:

/prereq-check

The prereq-check skill validates: az (≥ 2.50), gh (≥ 2.0), jq (≥ 1.6), git, and active Azure/GitHub auth sessions. If anything is missing, it shows platform-specific install commands.

Do NOT proceed with onboarding until prereq-check reports ✅ READY.

Additionally, the Azure identity used must have Owner or User Access Administrator on the target subscription(s), and the GitHub identity must have admin access to the target repository.

Execution Modes​

Invoke the skill from chat and let the agent gather missing parameters:

/git-ape-onboarding

Parameterized single environment​

/git-ape-onboarding onboard https://github.com/org/repo on subscription 00000000-0000-0000-0000-000000000000 with Contributor

Parameterized multi-environment​

/git-ape-onboarding onboard https://github.com/org/repo with dev on 11111111-1111-1111-1111-111111111111 as Contributor, staging on 22222222-2222-2222-2222-222222222222 as Contributor, prod on 33333333-3333-3333-3333-333333333333 as Contributor+UserAccessAdministrator

Command Playbook​

When the agent executes this skill, it should run the equivalent Azure and GitHub CLI commands directly in this order:

  1. Validate prerequisites and current auth context.
  2. Resolve repo metadata:
gh repo view <org>/<repo>
gh api repos/<org>/<repo> --jq '{repo_id: .id, owner_id: .owner.id}'
gh api orgs/<org>/actions/oidc/customization/sub --jq '.use_default'
  1. Create or reuse the Entra app registration and service principal:
CLIENT_ID=$(az ad app create --display-name "$SP_NAME" --query appId -o tsv)
az ad sp create --id "$CLIENT_ID"
TENANT_ID=$(az account show --query tenantId -o tsv)
OBJECT_ID=$(az ad app show --id "$CLIENT_ID" --query id -o tsv)
  1. Build the OIDC subject prefix:
# default format
OIDC_PREFIX="repo:<org>/<repo>"

# if org customization returns false
OIDC_PREFIX="repository_owner_id:<OWNER_ID>:repository_id:<REPO_ID>"
  1. Create federated credentials for main, pull_request, azure-deploy*, and azure-destroy.
  2. Assign RBAC on each target subscription.
  3. Set GitHub repo or environment secrets.
  4. Create GitHub environments and branch policies when permissions allow.
  5. Capture compliance and Azure Policy preferences (see below).
  6. Verify federated credentials, role assignments, and secrets.

Step 9: Compliance & Azure Policy Preferences​

After RBAC and environment setup, ask the user about compliance requirements and update the ## Compliance & Azure Policy section in .github/copilot-instructions.md:

  1. Ask compliance framework:

    Which compliance framework should Git-Ape use for policy recommendations?
    - General Azure best practices (recommended)
    - CIS Azure Foundations v3.0
    - NIST SP 800-53 Rev 5
    - None — skip policy recommendations
  2. Ask enforcement mode:

    How should policies be enforced initially?
    - Audit only (recommended — evaluate compliance without blocking)
    - Enforce (Deny — block non-compliant deployments immediately)
  3. Update copilot-instructions.md with the user's choices:

    • Edit the ## Compliance & Azure Policy → ### Compliance Frameworks section
    • Set the ### Policy Enforcement Mode default to the user's choice
    • Commit the update as part of the onboarding changes

Safe-Execution Rules​

  1. Echo target repository and subscription(s) before execution.
  2. Require explicit user confirmation before running onboarding.
  3. Never print secret values in chat output.
  4. Summarize what was created or updated (app registration, federated credentials, role assignments, GitHub environments).
  5. If onboarding fails, surface the failing step and command context, then stop.

Suggested Agent Flow​

  1. Run /prereq-check to validate tools and auth. Stop if it doesn't report ✅ READY.
  2. Confirm target repo URL, onboarding mode, and role model.
  3. Validate current Azure/GitHub auth context (subscription, tenant, GitHub org).
  4. Ask for final confirmation.
  5. Execute the required Azure CLI and GitHub CLI commands directly from this playbook.
  6. Ask compliance framework and enforcement mode preferences (Step 9 in playbook).
  7. Update copilot-instructions.md with compliance preferences.
  8. Summarize outcome and suggest verification commands.

Known Gotchas​

GitHub Org Custom OIDC Subject Template (e.g. Azure org)​

Some GitHub organizations (notably the Azure org) override the default OIDC subject claim template to use numeric ID-based subjects instead of name-based ones.

The skill auto-detects this by calling:

gh api "orgs/{org}/actions/oidc/customization/sub" --jq ".use_default"
  • Returns true → standard format: repo:Azure/git-ape-private:pull_request
  • Returns false → ID format: repository_owner_id:6844498:repository_id:1184905165:pull_request

If OIDC login fails with AADSTS700213: No matching federated identity record, the federated credential subjects don't match what GitHub is presenting. Fix by re-running onboarding (the skill will auto-detect and use the correct format), or manually updating existing credentials:

# Get repo/owner IDs
gh api repos/Azure/git-ape-private --jq '{repo_id: .id, owner_id: .owner.id}'

# Update each federated credential with correct subject
az ad app federated-credential update \
--id <APP_OBJECT_ID> \
--federated-credential-id <CRED_ID> \
--parameters '{"subject":"repository_owner_id:<OWNER_ID>:repository_id:<REPO_ID>:pull_request"}'

Disabled Subscriptions​

Azure subscriptions in a Disabled state are read-only — RBAC assignments will fail. Verify subscription state before onboarding:

az account show --subscription <SUB_ID> --query "{name:name,state:state}" -o table
# Test write access:
az group list --subscription <SUB_ID> --query "length(@)" -o tsv

Verification Commands​

# Azure context
az account show --query "{name:name,id:id,tenantId:tenantId}" -o table

# GitHub auth
gh auth status

# Validate app federated credentials — check subjects match org OIDC format
az ad app federated-credential list --id <APP_OBJECT_ID> -o json | jq -r '.[] | "\(.name): \(.subject)"'

# Check GitHub org OIDC subject template (true = name-based, false = ID-based)
gh api orgs/<ORG>/actions/oidc/customization/sub --jq '.use_default'

# Get repo and owner numeric IDs (needed for ID-based subject construction)
gh api repos/<ORG>/<REPO> --jq '{repo_id: .id, owner_id: .owner.id}'

# Validate role assignments for SP (replace principal object id)
az role assignment list --assignee-object-id <SP_OBJECT_ID> --all -o table