From ba68177afd7c9ccf829887ad77d40f9eb9e6a06e Mon Sep 17 00:00:00 2001 From: Eldar Borge <124266445+stbeldarborge@users.noreply.github.com> Date: Wed, 13 Nov 2024 09:05:21 +0100 Subject: [PATCH] Add code to Azure DNS bearer token --- dnsapi.md | 11 +++++++++-- 1 file changed, 9 insertions(+), 2 deletions(-) diff --git a/dnsapi.md b/dnsapi.md index bac85ba..a93bdab 100644 --- a/dnsapi.md +++ b/dnsapi.md @@ -1032,9 +1032,16 @@ You need to extract the token earlier in your CI/CD, for example with this comma ```sh az account get-access-token --query accessToken --output tsv ``` -And then pass it to acme.sh with the environment variable `AZUREDNS_BEARERTOKEN`. +And then pass it to acme.sh with the environment variable `AZUREDNS_BEARERTOKEN`: +```sh +export AZUREDNS_BEARERTOKEN="" +``` -Finally, you need to set the tenant ID and subscription ID in the environment variables `AZUREDNS_TENANTID` and `AZUREDNS_SUBSCRIPTIONID`. +Finally, you need to set the tenant ID and subscription ID in the environment variables `AZUREDNS_TENANTID` and `AZUREDNS_SUBSCRIPTIONID`: +```sh +export AZUREDNS_SUBSCRIPTIONID="" +export AZUREDNS_TENANTID="" +``` Then you can issue the certificate with acme.sh, for example: ```sh