page_type | languages | products | description | urlFragment | ||
---|---|---|---|---|---|---|
sample |
|
|
These samples demonstrate various interaction with Azure Stack Hub. |
Hybrid-JavaScript-Samples |
Hybrid-JavaScript-Samples
This repository shows samples on how to use Azure SDK for JavaScript and TypeScript with Azure Stack Hub. Each directory contains a sample in TypeScript with a README on how to run it.
Prerequisites
Refer to this Azure Stack Hub documentation page for more information: https://docs.microsoft.com/en-us/azure-stack/user/azure-stack-version-profile-nodejs.
Certificate
The first option is to use custom local certificate for NodeJS on Windows 10:
- Get your AzureStack certificate object using the name of the certificate (Powershell Core script).
$mycert = Get-ChildItem Cert:\CurrentUser\Root | Where-Object Subject -eq "CN=MyAzureCertName"
- Export the certificate as a .cer file.
Export-Certificate -Type CERT -FilePath mycert.cer -Cert $mycert
- Convert .cer file to .pem file (you can use openssl tool that is installed with Git bash and is located in
C:\Program Files\Git\usr\bin
).openssl x509 -inform der -in mycert.cer -out mypem.pem
- Set
NODE_EXTRA_CA_CERTS
environment variable.NODE_EXTRA_CA_CERTS=<PATH TO mypem.pem file>
The second option is to disable TLS validation without setting NODE_EXTRA_CA_CERTS
to the local NodeJS .pem file.
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
Setup
- Rename
azureSecretSpConfig.json.dist
andazureCertSpConfig.json.dist
toazureSecretSpConfig.json
andazureCertSpConfig.json
. - Fill in the following values in the corresponding JSON files:
Set the following JSON properties in ./azureSecretSpConfig.json
.
Variable | Description |
---|---|
clientId |
Service principal application id |
clientSecret |
Service principal application secret |
objectId |
Service principal object id |
tenantId |
Azure Stack Hub tenant ID |
subscriptionId |
Subscription id used to access offers in Azure Stack Hub |
resourceManagerEndpointUrl |
Azure Stack Hub Resource Manager Endpoint |
location |
Azure Resource location |
Service principal PowerShell object output example:
AAD
Secret : System.Security.SecureString # clientSecret (decrypt for external use)
ServicePrincipalNames : {bd6bb75f-5fd6-4db9-91b7-4a6941e7feb9, http://azs-sptest01}
ApplicationId : bd6bb75f-5fd6-4db9-91b7-4a6941e7feb9 # clientId
DisplayName : azs-sptest01
Id : 36a22ee4-e2b0-411d-8f21-0ea8b4b5c46f # objectId
AdfsId :
Type : ServicePrincipal
ADFS
ApplicationIdentifier : S-1-5-21-2937821301-3551617933-4294865508-76632 # objectId
ClientId : 7591924e-0341-4812-8d23-52ef0aa27eff # clientId
Thumbprint :
ApplicationName : Azurestack-azs-sptest01
ClientSecret : <Redacted> # clientSecret
PSComputerName : <Redacted>
RunspaceId : e841cbbc-3d8e-45fd-b63f-42adbfbf664b
Contributing
This project welcomes contributions and suggestions. Most contributions require you to agree to a Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us the rights to use your contribution. For details, visit https://cla.opensource.microsoft.com.
When you submit a pull request, a CLA bot will automatically determine whether you need to provide a CLA and decorate the PR appropriately (e.g., status check, comment). Simply follow the instructions provided by the bot. You will only need to do this once across all repos using our CLA.
This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact [email protected] with any additional questions or comments.