Deploying ARM Templates with Artifacts Located in a Private GitHub Repository


I have spent the last few days authoring an Azure Resource Manager (ARM) template. The template is stored in a private GitHub repository. It contains several nested templates, one of which deploys an Azure Automation account with several runbooks. For the nested templates and automation runbooks, the location must be a URI. Therefore the nested templates and the Azure Automation runbooks that I wish to deploy in the ARM templates must be located in location that is accessible by Azure Resource Manager. There are many good examples in the Azure Quickstart Template GitHub repository, for example, in the oms-all-deploy template, these artifacts are being referenced as URIs pointing to the raw content in GitHub:

Nested Templates:



Azure Automation runbook:


As you can see from the examples above, the template is referencing these artifacts as the raw file content in github (located in This method works well when your templates and artifacts are stored in a public GitHub repository, but it won’t work when they are stored in a private repository. For example, if I click on the “Raw” button for a file stored in a private repo like shown below:


you will see a token was added to the raw file content URI:


This token was generated for your current session once you’ve logged in to GitHub. Although as most of you guys already know that you can generate Personal Access token in GitHub, you can not replace this token in the URL with the Personal Access Token you have generated. The personal access token must be added as part of the authorization header in the HTTP request, and you also need to add another header “Accept”: “application/vnd.github.VERSION.raw”. Obviously we cannot add HTTP headers in ARM templates, therefore we cannot reference artifacts located in a private GitHub repositories out of the box. Someone has already started a thread in the MSDN forum: the workaround they came up with was building a HTTP proxy server and add the required headers in the proxy server. This to me seems awfully complicated and it also brings limitations that you can only deploy the templates in the network that you can access such a proxy server.


I spent most of my day yesterday trying to figure out if there is a way to deploy artifacts located in a private GitHub repository and I couldn’t find a way to use the Personal Access Token as a parameter in the HTTP GET request. As I accepted the fact that I wouldn’t be able to do it and started removing all nested templates in my project, I had a light bulb moment when I was driving to the supermarket yesterday afternoon, and the idea I came up with is super simple:  since I cannot pass the personal access token in the URL, I can just write a very simple “proxy” Azure Function app that accept the GitHub personal access token from the URL parameter, then construct the HTTP header, make the request to GitHub, and return the HTTP response it received from GitHub. Once this function is written, we can use the URI to the function as the artifact location instead of the GitHub URI.

GitHubPrivateRepoFileFetcher Azure Function

I’ve written something similar before, so this HTTP Trigger C# Azure function app literally took me 10 minutes to write. I named this function GitHubPrivateRepoFileFetcher:

This function requires 2 parameters to be passed in from the URL:

  • githuburi – the original URI to the raw GitHub file content
  • githubaccesstoken – the GitHub personal access token you have generated

Since the function does not contain any sensitive information, and I’d like to ensure the function URI is not too long, I have configured the function Authorization level to Anonymous so I don’t have to use an authorization code to invoke the Azure Function.


To call this function, you need to construct the URL as the following:

https://<Function App Name><GitHub User Name>/<Repository>/<branch>/<path to the file>&githubaccesstoken=<GitHub Person Access Token>


GitHub Personal Access Token

Before start using the GitHubPrivateRepoFileFetcher function, you will firstly need to generate a GitHub personal access token if you don’t already have one. The token must have access to repo as shown below:


Constructing ARM Templates

In the ARM templates, define the following parameters (and define the default value to match your environment):

define the linked template URL in the variables section:

For the Azure Automation runbook that I am planning to deploy, define the URI to the script in the variables section similar to the previous example:

For the Azure Automation runbook resource, use the variable defined above in the script uri property:


Most of the ARM template repositories contains the “Deploy to Azure” and “Visualize” buttons as shown below:


To add the “Deploy to Azure” button to your markdown file, you will need to add the following code to the markdown (modify the URL to suit your environment):

For the “Visualize” button, add the following code in the markdown:

Basically, add the Azure Function URL with required parameters as the parameter to the azure custom deployment and URIs. you will need to encode the function URI. you can use an an online encoder utility such as to encode the original Azure Function URI.

When you click the “Deploy to Azure” button, you will be redirected to the Azure portal:


When the deployment is completed, the resources defined in the ARM templates are created:



By using the “proxy” Azure Function GitHubPrivateRepoFileFetcher, you can easily retrieve the content of a file in private GitHub repo without having to use custom headers in HTTP request. This “proxy” Azure Function is generic that you can use for any Azure subscriptions and any GitHub private repositories. If you regularly use GitHub private repositories for ARM templates, I strongly recommend you to create such a Azure function to assist you with your deployments.

If you have any questions or recommendations, please feel free to contact me.

Leave a Reply

%d bloggers like this: