Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
v4.0
Removal of the InsiderSasToken
As of October 1st 2023, Business Central insider builds are now publicly available. When creating local containers with the insider builds, you will have to accept the insider EULA (https://go.microsoft.com/fwlink/?linkid=2245051) in order to continue.
AL-Go for GitHub allows you to build and test using insider builds without any explicit approval, but please note that the insider artifacts contains the insider Eula and you automatically accept this when using the builds.
Issues
New Settings
enableExternalRulesets
: set this setting to true if you want to allow AL-Go to automatically download external references in rulesets.deliverTo<deliveryTarget>
: is not really new, but has new properties and wasn't documented. The complete list of properties is here (note that some properties are deliveryTarget specific):Deployment
Environment URL is now displayed underneath the environment being deployed to in the build summary. For Custom Deployment, the script can set the GitHub Output variable
environmentUrl
in order to show a custom URL.v3.3
Issues
Breaking changes
Earlier, you could specify a mapping to an environment name in an environment secret called
<environmentname>_EnvironmentName
,<environmentname>-EnvironmentName
or justEnvironmentName
. You could also specify the projects you want to deploy to an environment as an environment secret calledProjects
.This mechanism is no longer supported and you will get an error if your repository has these secrets. Instead you should use the
DeployTo<environmentName>
setting described below.Earlier, you could also specify the projects you want to deploy to an environment in a setting called
<environmentName>_Projects
or<environmentName>-Projects
. This is also no longer supported. Instead use theDeployTo<environmentName>
and remove the old settings.New Actions
DetermineDeliveryTargets
: Determine which delivery targets should be used for delivering artifacts from the build job.DetermineDeploymentEnvironments
: Determine which deployment environments should be used for the workflow.New Settings
projectName
: project setting used as friendly name for an AL-Go project, to be used in the UI for various workflows, e.g. CICD, Pull Request Build.fullBuildPatterns
: used byDetermineProjectsToBuild
action to specify changes in which files and folders would trigger a full build (building all AL-Go projects).excludeEnvironments
: used byDetermineDeploymentEnvironments
action to exclude environments from the list of environments considered for deployment.deployTo<environmentName>
: is not really new, but has new properties. The complete list of properties is here:Custom Deployment
By specifying a custom EnvironmentType in the DeployTo structure for an environment, you can now add a script in the .github folder called
DeployTo<environmentType>.ps1
. This script will be executed instead of the standard deployment mechanism with the following parameters in a HashTable:$parameters.type
$parameters.apps
$parameters.EnvironmentType
$parameters.EnvironmentName
$parameters.Branches
$parameters.AuthContext
$parameters.BranchesFromPolicy
$parameters.Projects
$parameters.ContinuousDeployment
$parameters."runs-on"
Status Checks in Pull Requests
AL-Go for GitHub now adds status checks to Pull Requests Builds. In your GitHub branch protection rules, you can set up "Pull Request Status Check" to be a required status check to ensure Pull Request Builds succeed before merging.
Secrets in AL-Go for GitHub
In v3.2 of AL-Go for GitHub, all secrets requested by AL-Go for GitHub were available to all steps in a job one compressed JSON structure in env:Secrets.
With this update, only the steps that actually requires secrets will have the secrets available.
v3.2
Issues
Issue 542 Deploy Workflow fails
Issue 558 CI/CD attempts to deploy from feature branch
Issue 559 Changelog includes wrong commits
Publish to AppSource fails if publisher name or app name contains national or special characters
Issue 598 Cleanup during flush if build pipeline doesn't cleanup properly
Issue 608 When creating a release, throw error if no new artifacts have been added
Issue 528 Give better error messages when uploading to storage accounts
Create Online Development environment workflow failed in AppSource template unless AppSourceCopMandatoryAffixes is defined in repository settings file
Create Online Development environment workflow didn't have a project parameter and only worked for single project repositories
Create Online Development environment workflow didn't work if runs-on was set to Linux
Special characters are not supported in RepoName, Project names or other settings - Use UTF8 encoding to handle special characters in GITHUB_OUTPUT and GITHUB_ENV
Issue 555
AL-Go contains several workflows, which create a Pull Request or pushes code directly.
All (except Update AL-Go System Files) earlier used the GITHUB_TOKEN to create the PR or commit.
The problem using GITHUB_TOKEN is that is doesn't trigger a pull request build or a commit build.
This is by design: https://docs.github.com/en/actions/using-workflows/triggering-a-workflow#triggering-a-workflow-from-a-workflow
Now, you can set the checkbox called Use GhTokenWorkflow to allowing you to use the GhTokenWorkflow instead of the GITHUB_TOKEN - making sure that workflows are triggered
New Settings
keyVaultCodesignCertificateName
: With this setting you can delegate the codesigning to an Azure Key Vault. This can be useful if your certificate has to be stored in a Hardware Security ModulePullRequestTrigger
: With this setting you can set which trigger to use for Pull Request Builds. By default AL-Go will use pull_request_target.New Actions
DownloadProjectDependencies
: Downloads the dependency apps for a given project and build mode.Settings and Secrets in AL-Go for GitHub
In earlier versions of AL-Go for GitHub, all settings were available as individual environment variables to scripts and overrides, this is no longer the case.
Settings were also available as one compressed JSON structure in env:Settings, this is still the case.
Settings can no longer contain line breaks. It might have been possible to use line breaks earlier, but it would likely have unwanted consequences.
Use
$settings = $ENV:Settings | ConvertFrom-Json
to get all settings in PowerShell.In earlier versions of AL-Go for GitHub, all secrets requested by AL-Go for GitHub were available as individual environment variables to scripts and overrides, this is no longer the case.
As described in bug 647, all secrets available to the workflow were also available in env:_Secrets, this is no longer the case.
All requested secrets were also available (base64 encoded) as one compressed JSON structure in env:Secrets, this is still the case.
Use
$secrets = $ENV:Secrets | ConvertFrom-Json
to get all requested secrets in PowerShell.You cannot get to any secrets that weren't requested by AL-Go for GitHub.
v3.1
Issues
Issue microsoft#446 Wrong NewLine character in Release Notes
Issue microsoft#453 DeliverToStorage - override fails reading secrets
Issue microsoft#434 Use gh auth token to get authentication token instead of gh auth status
Issue microsoft#501 The Create New App action will now use 22.0.0.0 as default application reference and include NoImplicitwith feature.
New behavior
The following workflows:
All these actions now uses the selected branch in the Run workflow dialog as the target for the Pull Request or Direct COMMIT.
New Settings
UseCompilerFolder
: Setting useCompilerFolder to true causes your pipelines to use containerless compiling. Unless you also setdoNotPublishApps
to true, setting useCompilerFolder to true won't give you any performance advantage, since AL-Go for GitHub will still need to create a container in order to publish and test the apps. In the future, publishing and testing will be split from building and there will be other options for getting an instance of Business Central for publishing and testing.vsixFile
: vsixFile should be a direct download URL to the version of the AL Language extension you want to use for building the project or repo. By default, AL-Go will use the AL Language extension that comes with the Business Central Artifacts.New Workflows
The workflow appears under the Actions tab in GitHub, but it is not actionable in any way.
New Actions
License File
With the changes to the CRONUS license in Business Central version 22, that license can in most cases be used as a developer license for AppSource Apps and it is no longer mandatory to specify a license file in AppSource App repositories.
Obviously, if you build and test your app for Business Central versions prior to 21, it will fail if you don't specify a licenseFileUrl secret.
v3.0
NOTE: When upgrading to this version
When upgrading to this version form earlier versions of AL-Go for GitHub, you will need to run the Update AL-Go System Files workflow twice if you have the
useProjectDependencies
setting set to true.Publish to unknown environment
You can now run the Publish To Environment workflow without creating the environment in GitHub or settings up-front, just by specifying the name of a single environment in the Environment Name when running the workflow.
Subsequently, if an AuthContext secret hasn't been created for this environment, the Device Code flow authentication will be initiated from the Publish To Environment workflow and you can publish to the new environment without ever creating a secret.
Open Workflow details to get the device Code for authentication in the job summary for the initialize job.
Create Online Dev. Environment
When running the Create Online Dev. Environment workflow without having the adminCenterApiCredentials secret created, the workflow will intiate the deviceCode flow and allow you to authenticate to the Business Central Admin Center.
Open Workflow details to get the device Code for authentication in the job summary for the initialize job.
Issues
Changes to Pull Request Process
In v2.4 and earlier, the PullRequestHandler would trigger the CI/CD workflow to run the PR build.
Now, the PullRequestHandler will perform the build and the CI/CD workflow is only run on push (or manual dispatch) and will perform a complete build.
Build modes per project
Build modes can now be specified per project
New Actions
Truncated due to size limits!