如何配置 Azure 应用服务以使用 terraform 从 ACR 中提取图像?

mar*_*ark 10 azure docker terraform azure-web-app-service azure-container-registry

我有以下 terraform 模块来在同一计划下设置应用程序服务:

provider "azurerm" {
}

variable "env" {
    type = string
    description = "The SDLC environment (qa, dev, prod, etc...)"
}

variable "appsvc_names" {
    type = list(string)
    description = "The names of the app services to create under the same app service plan"
}

locals {
    location = "eastus2"
    resource_group_name = "app505-dfpg-${var.env}-web-${local.location}"
    acr_name = "app505dfpgnedeploycr88836"
}

resource "azurerm_app_service_plan" "asp" {
    name                = "${local.resource_group_name}-asp"
    location            = local.location
    resource_group_name = local.resource_group_name
    kind                = "Linux"
    reserved            = true

    sku {
        tier = "Basic"
        size = "B1"
    }
}

resource "azurerm_app_service" "appsvc" {
    for_each            = toset(var.appsvc_names)

    name                = "${local.resource_group_name}-${each.value}-appsvc"
    location            = local.location
    resource_group_name = local.resource_group_name
    app_service_plan_id = azurerm_app_service_plan.asp.id

    site_config {
        linux_fx_version = "DOCKER|${local.acr_name}/${each.value}:latest"
    }

    app_settings = {
        DOCKER_REGISTRY_SERVER_URL = "https://${local.acr_name}.azurecr.io"
    } 
}

output "hostnames" {
  value = {
    for appsvc in azurerm_app_service.appsvc: appsvc.name => appsvc.default_site_hostname
  }
}
Run Code Online (Sandbox Code Playgroud)

我通过以下配置调用它:

terraform {
    backend "azurerm" {
    }
}

locals {
    appsvc_names = ["gateway"]
}

module "web" {
    source = "../../modules/web"
    env = "qa"
    appsvc_names = local.appsvc_names
}

output "hostnames" {
    description = "The hostnames of the created app services"
    value       = module.web.hostnames
}
Run Code Online (Sandbox Code Playgroud)

容器注册表中有我需要的图像:

C:\> az acr login --name app505dfpgnedeploycr88836
Login Succeeded
C:\> az acr repository list  --name app505dfpgnedeploycr88836
[
  "gateway"
]
C:\> az acr repository show-tags --name app505dfpgnedeploycr88836 --repository gateway
[
  "latest"
]
C:\>
Run Code Online (Sandbox Code Playgroud)

当我应用 terraform 配置时,一切都创建得很好,但是检查 Azure 门户中创建的应用程序服务资源发现其容器设置没有显示 docker 映像:

在此输入图像描述

现在,我可以手动切换到另一个 ACR,然后返回到我只想得到的 ACR:

在此输入图像描述

Cannot perform credential operations for /subscriptions/0f1c414a-a389-47df-aab8-a351876ecd47/resourceGroups/app505-dfpg-ne-deploy-eastus2/providers/Microsoft.ContainerRegistry/registries/app505dfpgnedeploycr88836 as admin user is disabled. Kindly enable admin user as per docs: https://learn.microsoft.com/en-us/azure/container-registry/container-registry-authentication#admin-account
Run Code Online (Sandbox Code Playgroud)

这让我很困惑。根据https://learn.microsoft.com/en-us/azure/container-registry/container-registry-authentication#admin-account不应使用管理员用户,因此我的 ACR 没有管理员用户。另一方面,我知道我需要以某种方式配置应用程序服务以使用 ACR 进行身份验证。

那么正确的做法是什么?

Pau*_*her 11

因此,自从Azure RM 提供程序v2.71版本以来,这已经成为可能。有几件事必须发生......

  1. 将托管身份分配给应用程序(也可以使用用户分配,但需要更多工作)
  2. site_config.acr_use_managed_identity_credentials属性设置为 true
  3. 授予应用程序对容器的身份 ACRPull 权限。

下面是上面代码的修改版本,未经测试,但应该没问题

provider "azurerm" {
}

variable "env" {
    type = string
    description = "The SDLC environment (qa, dev, prod, etc...)"
}

variable "appsvc_names" {
    type = list(string)
    description = "The names of the app services to create under the same app service plan"
}

locals {
    location = "eastus2"
    resource_group_name = "app505-dfpg-${var.env}-web-${local.location}"
    acr_name = "app505dfpgnedeploycr88836"
}

resource "azurerm_app_service_plan" "asp" {
    name                = "${local.resource_group_name}-asp"
    location            = local.location
    resource_group_name = local.resource_group_name
    kind                = "Linux"
    reserved            = true

    sku {
        tier = "Basic"
        size = "B1"
    }
}

resource "azurerm_app_service" "appsvc" {
    for_each            = toset(var.appsvc_names)

    name                = "${local.resource_group_name}-${each.value}-appsvc"
    location            = local.location
    resource_group_name = local.resource_group_name
    app_service_plan_id = azurerm_app_service_plan.asp.id

    site_config {
        linux_fx_version = "DOCKER|${local.acr_name}/${each.value}:latest"
        acr_use_managed_identity_credentials = true
    }

    app_settings = {
        DOCKER_REGISTRY_SERVER_URL = "https://${local.acr_name}.azurecr.io"
    }

    identity {
        type = "SystemAssigned"
    }   
}

data "azurerm_container_registry" "this" {
  name                = local.acr_name
  resource_group_name = local.resource_group_name
}

resource "azurerm_role_assignment" "acr" {
  for_each             = azurerm_app_service.appsvc
  
  role_definition_name = "AcrPull"
  scope                = azurerm_container_registry.this.id
  principal_id         = each.value.identity[0].principal_id
}

output "hostnames" {
  value = {
    for appsvc in azurerm_app_service.appsvc: appsvc.name => appsvc.default_site_hostname
  }
}
Run Code Online (Sandbox Code Playgroud)

已编辑 2021 年 12 月 21 日有关 Azure 重置值的MS 文档问题 现已解决,您还可以通过门户控制托管身份。


4c7*_*b41 5

因此,您可以将服务主体身份验证与App Service一起使用,但您必须创建服务主体,授予其对注册表的 ACRpull 权限,并在 App Service site_config 中使用服务主体登录\密码

DOCKER_REGISTRY_SERVER_USERNAME
DOCKER_REGISTRY_SERVER_PASSWORD

  • 但这意味着将其密码存储在版本控制中。不过,我可以将其作为变量使用,然后在 Azure DevOps 服务器中安排一个秘密变量。 (2认同)