Add module settings in the Bicep config file
In a bicepconfig.json file, you can create aliases for module paths and configure profile and credential precedence for publishing and restoring modules.
This article describes the settings that are available for working with Bicep modules.
Aliases for modules
To simplify the path for linking to modules, create aliases in the config file. An alias refers to either a module registry or a resource group that contains template specs.
The config file has a property for moduleAliases
. This property contains all of the aliases you define. Under this property, the aliases are divided based on whether they refer to a registry or a template spec.
To create an alias for a Bicep registry, add a br
property. To add an alias for a template spec, use the ts
property.
{
"moduleAliases": {
"br": {
<add-registry-aliases>
},
"ts": {
<add-template-specs-aliases>
}
}
}
Within the br
property, add as many aliases as you need. For each alias, give it a name and the following properties:
- registry (required): registry login server name
- modulePath (optional): registry repository where the modules are stored
Within the ts
property, add as many aliases as you need. For each alias, give it a name and the following properties:
- subscription (required): the subscription ID that hosts the template specs
- resourceGroup (required): the name of the resource group that contains the template specs
The following example shows a config file that defines two aliases for a module registry, and one alias for a resource group that contains template specs.
{
"moduleAliases": {
"br": {
"ContosoRegistry": {
"registry": "contosoregistry.azurecr.io"
},
"CoreModules": {
"registry": "contosoregistry.azurecr.io",
"modulePath": "bicep/modules/core"
}
},
"ts": {
"CoreSpecs": {
"subscription": "00000000-0000-0000-0000-000000000000",
"resourceGroup": "CoreSpecsRG"
}
}
}
}
When using an alias in the module reference, you must use the formats:
br/<alias>:<file>:<tag>
ts/<alias>:<file>:<tag>
Define your aliases to the folder or resource group that contains modules, not the file itself. The file name must be included in the reference to the module.
Without the aliases, you would link to a module in a registry with the full path.
module stgModule 'br:contosoregistry.azurecr.io/bicep/modules/core/storage:v1' = {
With the aliases, you can simplify the link by using the alias for the registry.
module stgModule 'br/ContosoRegistry:bicep/modules/core/storage:v1' = {
Or, you can simplify the link by using the alias that specifies the registry and module path.
module stgModule 'br/CoreModules:storage:v1' = {
For a template spec, use:
module stgModule 'ts/CoreSpecs:storage:v1' = {
An alias has been predefined for public modules. To reference a public module, you can use the format:
br/public:<file>:<tag>
Note
Non-AVM (Azure Verified Modules) modules are retired from the public module registry with most of them available as AVM modules.
You can override the public module registry alias definition in the bicepconfig.json file:
{
"moduleAliases": {
"br": {
"public": {
"registry": "<your_module_registry>",
"modulePath": "<optional_module_path>"
}
}
}
}
Configure profiles and credentials
To publish modules to a private module registry or to restore external modules to the local cache, the account must have the correct permissions to access the registry. You can manually configure currentProfile
and credentialPrecedence
in the Bicep config file for authenticating to the registry.
{
"cloud": {
"currentProfile": "AzureCloud",
"profiles": {
"AzureCloud": {
"resourceManagerEndpoint": "https://management.azure.com",
"activeDirectoryAuthority": "https://login.microsoftonline.com"
},
"AzureChinaCloud": {
"resourceManagerEndpoint": "https://management.chinacloudapi.cn",
"activeDirectoryAuthority": "https://login.chinacloudapi.cn"
},
"AzureUSGovernment": {
"resourceManagerEndpoint": "https://management.usgovcloudapi.net",
"activeDirectoryAuthority": "https://login.microsoftonline.us"
}
},
"credentialPrecedence": [
"AzureCLI",
"AzurePowerShell"
]
}
}
The available profiles are:
- AzureCloud
- AzureChinaCloud
- AzureUSGovernment
By default, Bicep uses the AzureCloud
profile and the credentials of the user authenticated in Azure CLI or Azure PowerShell. You can customize these profiles or include new ones for your on-premises environments. If you want to publish or restore a module to a national cloud environment such as AzureUSGovernment
, you must set "currentProfile": "AzureUSGovernment"
even if you've selected that cloud profile in the Azure CLI. Bicep is unable to automatically determine the current cloud profile based on Azure CLI settings.
Bicep uses the Azure.Identity SDK to do authentication. The available credential types are:
Note
The Bicep deploy command in Visual Studio Code uses the new built-in authentication API for managing authentication. It doesn't use cloud profiles from bicepconfig.json. To sign in to a custom cloud, select Manage > Settings > Extension > Microsoft accounts > Microsoft Sovereign Cloud. At this time, multiple signed-in accounts aren't supported.