-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SharedTokenCacheCredential authentication fails in Azure.Identity on ubuntu #17052
Comments
Thank you for your feedback. Tagging and routing to the team member best able to assist. |
@thoemmi Thank you for filing this issue, I'm sorry you're running into this problem. I'll investigate the root cause of this regression and hopefully release a patch for it soon. In the meantime you should be able to work around this by excluding the var credential = new DefaultAzureCredential(new DefaultAzureCredentialOptions { ExcludeSharedTokenCacheCredential = true }); This should work around the issue your experiencing in your CI and should not impact your authentication in your developement environment as the |
@schaabs, thanks for your quick answer. The work around you proposed indeed does the trick, and our release pipeline is green again 👍 I guess I shall not close this issue as you've added it to the December milestone. |
@thoemmi I'm glad to hear that you're unblocked. Yes, please leave the issue open as we intend to fix this regression, and we'll close it once the fix is merged. |
Hello @schaabs
I kinda understand that it's related to refres token and even tried to, instead of creating a new DefaultAzureCredential, instantiating an existing one using clientId and clientSecret, but I'm not sure that's how it should be addressed. |
@schaabs - This popped up for me today as well. By removing SharedTokenCacheCredential from DAC, are we saying it isn't support on Linux?
|
Where do I need to add the workaround? Is it written to the application code or the dockerfile? |
@R2J2 - See this comment. #17052 (comment) You remove it in your code. |
This is happening to me currently (April '22) using release latest versions of all nugets. OPening a new issue, but also pursuing with Azure support and will update if that yields any results. |
#28120 Help :) |
We have written an internal command line tool that allows us to read secrets from Azure Keyvault. This tool consumes Azure.Identity, Azure.Security.KeyVault.*, and Azure.ResourceManager.Resources
We run this tool both on our dev machines and in the Azure DevOps release pipeline. However, today we have updated Azure.Identity from 1.2.2 to 1.3.0. While the tool still runs without any issue on my Windows machine, it fails on the build agent in the release pipeline (ubuntu-18.04):
I don't know if this is caused by Azure.Identity itself or by the MSAL token cache extension you're using.
The text was updated successfully, but these errors were encountered: