Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

In azure, force service principal credentials to be explicitely set. #544

Merged
merged 1 commit into from Jan 18, 2022

Conversation

whites11
Copy link
Contributor

On azure, when running terraform from the SREs machines, we used to rely on the locally set up credentials to interact with azure API.

This proved to be unreliable and ineffective for a couple of reasons:

  • lighthouse access that we request to customers for our own access does not have all required permissions
  • CI/CD uses a different authentication method, leading to problems

With this PR we force the presence of service principal credentials as variables.

@whites11 whites11 self-assigned this Jan 18, 2022
@whites11 whites11 requested a review from a team January 18, 2022 10:48
Copy link
Member

@fiunchinho fiunchinho left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTMIIWFY

@whites11 whites11 merged commit 883c1f1 into master Jan 18, 2022
@whites11 whites11 deleted the azure-use-sp branch January 18, 2022 10:55
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
4 participants