Azure CLI azure resource show
与Azure PowerShell Get-AzureRmResource
类似,它始终使用“GET”方法。如果你添加“-vv”选项,你会看到它使用的REST API。另一方面,PowerShell Invoke-AzureRmResourceAction
正在使用“POST”方法。如果您将'-debug'选项添加到Invoke-AzureRmResourceAction
您将能够看到REST API。
https://management.azure.com/subscriptions/<your subscription id>/resourceGroups/<resource group>/providers/Microsoft.Web/sites/<app service>/config/publishingcredentials/list?api-version=2015-08-01
这里是一个PowerShell脚本调用这个REST API:
Add-Type -Path 'C:\Program Files\Microsoft Azure Active Directory Connect\Microsoft.IdentityModel.Clients.ActiveDirectory.dll'
# The tenant ID of you Subscription. You can use tenant name instead.
$tenantID = "<the tenant ID of your Subscription>"
# You can leave the variables as what they are, if you are under Azure Cloud Environment.
$loginEndpoint = "https://login.windows.net/"
$managementResourceURI = "https://management.core.windows.net/"
$redirectURI = New-Object System.Uri ("urn:ietf:wg:oauth:2.0:oob")
$clientID = "1950a258-227b-4e31-a9cf-717495945fc2"
# Fill in the below variables.
$subscriptionID = "<your subscription id>"
$resouceGroup = "<your resource group>"
$appService = "<your app service>"
$username = "<your Azure account>"
# Constructing the authentication string.
$authString = $loginEndpoint + $tenantID
# Use the above authentication string to create an authentication context.
$authenticationContext = New-Object Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext ($authString, $false)
$promptBehaviour = [Microsoft.IdentityModel.Clients.ActiveDirectory.PromptBehavior]::Auto
$userIdentifierType = [Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifierType]::RequiredDisplayableId
$userIdentifier = New-Object Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier ($username, $userIdentifierType)
# Prompt for signing in.
$authenticationResult = $authenticationContext.AcquireToken($managementResourceURI, $clientID, $redirectURI, $promptBehaviour, $userIdentifier);
# construct authorization header for the REST API.
$authHeader = $authenticationResult.AccessTokenType + " " + $authenticationResult.AccessToken
$headers = @{"Authorization"=$authHeader; "Content-Type"="application/json"}
# Invoke the REST API.
Invoke-RestMethod -Method POST -Uri "https://management.azure.com/subscriptions/$subscriptionID/resourceGroups/$resourceGroup/providers/Microsoft.Web/sites/$appService/config/publishingcredentials/list?api-version=2015-08-01" `
-Headers $headers
如果你是Linux系统下,你可以使用卷曲通过OAuth 2,以下bash脚本会给你出版凭证您的网络应用程序。但是,为了使用我的脚本,您需要create a service principle和install curl in you Linux system。
#!/bin/bash
tenantID="<the tenant id of your subscription>"
client_id="<the client id of your AD application>"
client_secret="<a key you added to your AD application>"
body="grant_type=client_credentials&client_id=$client_id&client_secret=$client_secret&resource=https%3A%2F%2Fmanagement.core.windows.net%2F"
authorization=$(curl -X POST -H "Content-Type: application/x-www-form-urlencoded" --data-ascii "$body" "https://login.microsoftonline.com/$tenantID/oauth2/token" | python -c 'import json,sys;obj=json.load(sys.stdin);print(obj["token_type"]+" "+obj["access_token"])')
subscriptionID="<your subscription id>"
resourceGroup="<the resource group of you web app>"
appService="<your web app>"
curl -X POST -H "Authorization: $authorization" --data-ascii "" "https://management.azure.com/subscriptions/$subscriptionID/resourceGroups/$resourceGroup/providers/Microsoft.Web/sites/$appService/config/publishingcredentials/list?api-version=2015-08-01"
感谢您提供使用REST API获取发布凭证的详细示例。我完全可以在其他情况下使用这个例子。在Azure CLI修复为支持第2级资源之前,我想我必须使用Windows机器来处理Jenkin服务器并使用Azure PowerShell。 –
我已经检查过Azure CLI,他们实际上使用'--parent'选项来支持Level 2资源。然而,这对你的情况没有帮助,因为'azure resource show'总是使用“GET”方法,而在你的情况下,你需要使用“POST”方法。我会稍微更新我的答案。 –