Fail to run `azd pipeline config --provider github` and `azd pipeline config --provider azdo`
Describe the issue:
When running the azd pipeline config --provider github and azd pipeline config --provider azdo commands, the error message fails as follows:
Repro Steps:
- Login in with command:
azd auth login. - Run command:
azd init -t todo-python-mongo-terraform -b staging. - Run command:
azd pipeline config --provider githuborazd pipeline config --provider azdo.
Environment:
- Template:
todo-python-mongo-terraform,todo-nodejs-mongo-terraform,todo-java-postgresql-terraform. - Branch:
staging - OS: Windows, Linux, Mac, Cloud Shell, DevContainer, Codespaces.
- Azd version: azd version 1.11.0-beta.1-pr.4140256 (commit b6402defbf4c4210855e14c114988010e0a51ed7) and azd version 1.11.0-beta.1-daily.4152592 (commit e2ff8ba7dcc5b3f7e883213a2315a8b275294def)
Expected behavior:
azd pipeline config --provider github and azd pipeline config --provider azdo commands can be run successfully.
@jongio for notification.
@jongio This issue can also be reproduced in main. We tested the following four scenarios and they can all be reproduced:
- Template:
todo-python-mongo-terraform,todo-nodejs-mongo-terraform,todo-java-postgresql-terraform. - OS: Windows, Linux, Mac, Cloud Shell, DevContainer, Codespaces.
- Test Scenario:
- Templates under the
mainbranch + azd version 1.11.0-beta.1-daily.4152592 (commit e2ff8ba7dcc5b3f7e883213a2315a8b275294def). - Templates under the
mainbranch + azd version 1.11.0-beta.1-pr.4140256 (commit b6402defbf4c4210855e14c114988010e0a51ed7). - Templates under the
stagingbranch + azd version 1.11.0-beta.1-daily.4152592 (commit e2ff8ba7dcc5b3f7e883213a2315a8b275294def). - Templates under the
stagingbranch + azd version 1.11.0-beta.1-pr.4140256 (commit b6402defbf4c4210855e14c114988010e0a51ed7).
@vhvb1989 do you think our internal subscriptions have policies which restrict dealing with client-credentials? but from a pipeline config feature POV we do support client-credentials?
@rajeshkamal5050 yes, the internal policy to block client-secrets was applied some days ago. If we want to run these tests, we need to use a different Tenant/Sub w/o the policy. Or we need to move the terraform scenarios to use managed identity (see: https://github.com/Azure/azure-dev/pull/4343)
@vhvb1989 May be a test tenant would help here for us in testing such features which are still supported?
cc @weshaggard @danieljurek
Our new TME test tenant isn't up and running yet but once it is ready it might be worth using here.
@rajeshkamal5050 In the latest round of azd manual testing, this issue still exists.
- Template:
todo-python-mongo-terraform,todo-nodejs-mongo-terraform,todo-java-postgresql-terraform. - OS: Windows, Mac, DevContainer.
- Branch:
staging - Azd version: azd version 1.11.0-beta.1-daily.4152592 (commit e2ff8ba7dcc5b3f7e883213a2315a8b275294def)
@rajeshkamal5050 and @jongio In the latest round of azd manual testing, this issue still exists.
- Template:
todo-python-mongo-terraform,todo-nodejs-mongo-terraform,todo-java-postgresql-terraform. - OS: Windows.
- Branch:
staging - Azd version: azd version 1.10.3-pr.4243081 (commit 2c05c152915bdfd82e20d3350f249b22accd3deb) and azd version 1.11.0-beta.1-daily.4244391 (commit 8fc9d80640aa6f45f1a7d7631087c4a5f54e9e63).
@rajeshkamal5050 In the latest round of azd manual testing, this issue still exists.
- Template:
todo-python-mongo-terraform,todo-nodejs-mongo-terraform,todo-java-postgresql-terraform. - OS: Windows, Mac, DevContainer.
- Branch:
staging - Azd version: azd version 1.11.0-beta.1-daily.4247716 (commit f4695c408eab9ea3cdedd1c3cb39aa01ad90123e)
@rajeshkamal5050 In the latest round of azd manual testing, this issue still exists.
- Template:
todo-python-mongo-terraform,todo-nodejs-mongo-terraform,todo-java-postgresql-terraform. - OS: Windows, Mac, DevContainer.
- Branch: staging.
- Azd version: azd version 1.12.0-beta.1-daily.4359062 (commit 6cd82ae9ff02e156a0056e994215191469442ab3).
@rajeshkamal5050 In the latest round of azd manual testing, this issue still exists.
- Template:
todo-python-mongo-terraform,todo-nodejs-mongo-terraform,todo-java-postgresql-terraform. - OS: Windows, Mac, DevContainer.
- Branch: staging.
- Azd version: azd version 1.12.0-beta.1-daily.4442669 (commit 9b60cbc2a703200eb04d325988dc359886b2dfcb).
@rajeshkamal5050 In the latest round of azd manual testing, this issue still exists.
- Template:
todo-python-mongo-terraform,todo-nodejs-mongo-terraform,todo-java-postgresql-terraform. - OS: Windows, Mac, DevContainer.
- Branch: staging.
- Azd version: azd version 1.12.0-beta.1-daily.4489231 (commit a6eb17988fc047579a8edaaa86f302f5f0ab4bb8).
Closing as expected behavior. Client credentials won't work in Tenants with policies that prevents this.
azd supports Federated Credentials now for Terraform as well and people can use this instead of secret credentials.