-
Notifications
You must be signed in to change notification settings - Fork 4.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Authentication: Refreshing the Service Principal Token before using it #1544
Conversation
Tests run fine for a Service Principal:
and testing this for CLI auth works as expected too 👍 |
Nice! Glad to see this bug fixed. Since it'll be a bit before I get back to that PR (I hope I can get to it next week) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't really have the Azure knowledge here, but the solution looks reasonable to me.
I assume the auth logic in general would be difficult to test.
yeah, it seems fine in my testing so 👍 |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 hashibot-feedback@hashicorp.com. Thanks! |
This fix was originally contributed by @sophos-jeff in #1349 but has been split-out
This allows Azure CLI auth to be used to accessing Key Vaults, which fixes #656.