Adding runtime site name to valid JWT audiences (slot scenarios). #10186
Azure Pipelines / Azure.azure-functions-host
succeeded
May 30, 2024 in 13m 40s
Build #3.22.0-22918 had test failures
Details
- Failed: 78 (1.79%)
- Passed: 4,234 (97.07%)
- Other: 50 (1.15%)
- Total: 4,362
Annotations
azure-pipelines / Azure.azure-functions-host
Microsoft.Azure.WebJobs.Script.Tests.SecretsRepositoryTests.GetSecretSnapshots_ReturnsExpected(repositoryType: FileSystem, secretsType: Host)
Microsoft.Azure.Services.AppAuthentication.AzureServiceTokenProviderException : Parameters: Connection String: RunAs=App;AppId=444681e3-715c-4d22-ae13-ccd7d05ab318;TenantId=72f988bf-86f1-41af-91ab-2d7cd011db47;AppKey=<<Redacted>>, Resource: https://vault.azure.net, Authority: https://login.microsoftonline.com/72f988bf-86f1-41af-91ab-2d7cd011db47. Exception Message: Access token could not be acquired. AADSTS7000215: Invalid client secret provided. Ensure the secret being sent in the request is the client secret value, not the client secret ID, for a secret added to app '444681e3-715c-4d22-ae13-ccd7d05ab318'. Trace ID: a8388dec-077e-4334-b1df-1e90f9799400 Correlation ID: bad32d21-9368-4ada-9641-6baf712eba87 Timestamp: 2024-05-24 21:34:53Z
Raw output
at Microsoft.Azure.Services.AppAuthentication.AzureServiceTokenProvider.GetAccessTokenAsyncImpl(String authority, String resource, String scope)
at Microsoft.Azure.KeyVault.KeyVaultCredential.PreAuthenticate(Uri url)
at Microsoft.Azure.KeyVault.KeyVaultCredential.ProcessHttpRequestAsync(HttpRequestMessage request, CancellationToken cancellationToken)
at Microsoft.Azure.KeyVault.KeyVaultClient.GetSecretsWithHttpMessagesAsync(String vaultBaseUrl, Nullable`1 maxresults, Dictionary`2 customHeaders, CancellationToken cancellationToken)
at Microsoft.Azure.KeyVault.KeyVaultClientExtensions.GetSecretsAsync(IKeyVaultClient operations, String vaultBaseUrl, Nullable`1 maxresults, CancellationToken cancellationToken)
at Microsoft.Azure.WebJobs.Script.WebHost.KeyVaultSecretsRepository.GetKeyVaultSecretsPagesAsync(KeyVaultClient keyVaultClient, String keyVaultBaseUrl) in D:\a\_work\1\s\src\WebJobs.Script.WebHost\Security\KeyManagement\KeyVaultSecretsRepository.cs:line 213
at Microsoft.Azure.WebJobs.Script.Tests.SecretsRepositoryTests.Fixture.ClearAllKeyVaultSecrets() in D:\a\_work\1\s\test\WebJobs.Script.Tests.Integration\Host\SecretsRepositoryTests.cs:line 810
at Microsoft.Azure.WebJobs.Script.Tests.SecretsRepositoryTests.Fixture.TestInitialize(SecretsRepositoryType repositoryType, String secretsDirectory, String testSiteName) in D:\a\_work\1\s\test\WebJobs.Script.Tests.Integration\Host\SecretsRepositoryTests.cs:line 597
at Microsoft.Azure.WebJobs.Script.Tests.SecretsRepositoryTests.GetSecretSnapshots_ReturnsExpected(SecretsRepositoryType repositoryType, ScriptSecretsType secretsType) in D:\a\_work\1\s\test\WebJobs.Script.Tests.Integration\Host\SecretsRepositoryTests.cs:line 347
--- End of stack trace from previous location where exception was thrown ---
azure-pipelines / Azure.azure-functions-host
Microsoft.Azure.WebJobs.Script.Tests.SecretsRepositoryTests.ReadAsync_ReadsExpectedFile(repositoryType: BlobStorageSas, secretsType: Function)
Microsoft.Azure.Services.AppAuthentication.AzureServiceTokenProviderException : Parameters: Connection String: RunAs=App;AppId=444681e3-715c-4d22-ae13-ccd7d05ab318;TenantId=72f988bf-86f1-41af-91ab-2d7cd011db47;AppKey=<<Redacted>>, Resource: https://vault.azure.net, Authority: https://login.microsoftonline.com/72f988bf-86f1-41af-91ab-2d7cd011db47. Exception Message: Access token could not be acquired. AADSTS7000215: Invalid client secret provided. Ensure the secret being sent in the request is the client secret value, not the client secret ID, for a secret added to app '444681e3-715c-4d22-ae13-ccd7d05ab318'. Trace ID: 866439c2-d7d7-441f-844c-8a8dde3a9800 Correlation ID: 347b52d2-15a2-4797-9487-314f55de8da0 Timestamp: 2024-05-24 21:34:50Z
Raw output
at Microsoft.Azure.Services.AppAuthentication.AzureServiceTokenProvider.GetAccessTokenAsyncImpl(String authority, String resource, String scope)
at Microsoft.Azure.KeyVault.KeyVaultCredential.PreAuthenticate(Uri url)
at Microsoft.Azure.KeyVault.KeyVaultCredential.ProcessHttpRequestAsync(HttpRequestMessage request, CancellationToken cancellationToken)
at Microsoft.Azure.KeyVault.KeyVaultClient.GetSecretsWithHttpMessagesAsync(String vaultBaseUrl, Nullable`1 maxresults, Dictionary`2 customHeaders, CancellationToken cancellationToken)
at Microsoft.Azure.KeyVault.KeyVaultClientExtensions.GetSecretsAsync(IKeyVaultClient operations, String vaultBaseUrl, Nullable`1 maxresults, CancellationToken cancellationToken)
at Microsoft.Azure.WebJobs.Script.WebHost.KeyVaultSecretsRepository.GetKeyVaultSecretsPagesAsync(KeyVaultClient keyVaultClient, String keyVaultBaseUrl) in D:\a\_work\1\s\src\WebJobs.Script.WebHost\Security\KeyManagement\KeyVaultSecretsRepository.cs:line 213
at Microsoft.Azure.WebJobs.Script.Tests.SecretsRepositoryTests.Fixture.ClearAllKeyVaultSecrets() in D:\a\_work\1\s\test\WebJobs.Script.Tests.Integration\Host\SecretsRepositoryTests.cs:line 810
at Microsoft.Azure.WebJobs.Script.Tests.SecretsRepositoryTests.Fixture.TestInitialize(SecretsRepositoryType repositoryType, String secretsDirectory, String testSiteName) in D:\a\_work\1\s\test\WebJobs.Script.Tests.Integration\Host\SecretsRepositoryTests.cs:line 597
at Microsoft.Azure.WebJobs.Script.Tests.SecretsRepositoryTests.ReadAsync_ReadsExpectedFile(SecretsRepositoryType repositoryType, ScriptSecretsType secretsType) in D:\a\_work\1\s\test\WebJobs.Script.Tests.Integration\Host\SecretsRepositoryTests.cs:line 99
--- End of stack trace from previous location where exception was thrown ---
azure-pipelines / Azure.azure-functions-host
Microsoft.Azure.WebJobs.Script.Tests.SecretsRepositoryTests.ReadAsync_ReadsExpectedKeyVaultPages(repositoryType: KeyVault, secretsType: Function)
Microsoft.Azure.Services.AppAuthentication.AzureServiceTokenProviderException : Parameters: Connection String: RunAs=App;AppId=444681e3-715c-4d22-ae13-ccd7d05ab318;TenantId=72f988bf-86f1-41af-91ab-2d7cd011db47;AppKey=<<Redacted>>, Resource: https://vault.azure.net, Authority: https://login.microsoftonline.com/72f988bf-86f1-41af-91ab-2d7cd011db47. Exception Message: Access token could not be acquired. AADSTS7000215: Invalid client secret provided. Ensure the secret being sent in the request is the client secret value, not the client secret ID, for a secret added to app '444681e3-715c-4d22-ae13-ccd7d05ab318'. Trace ID: af9c2967-6653-4b56-9184-b9af17bd8900 Correlation ID: 5e7acf89-69c4-4279-b08b-3e8fe7c9dd0b Timestamp: 2024-05-24 21:34:56Z
Raw output
at Microsoft.Azure.Services.AppAuthentication.AzureServiceTokenProvider.GetAccessTokenAsyncImpl(String authority, String resource, String scope)
at Microsoft.Azure.KeyVault.KeyVaultCredential.PreAuthenticate(Uri url)
at Microsoft.Azure.KeyVault.KeyVaultCredential.ProcessHttpRequestAsync(HttpRequestMessage request, CancellationToken cancellationToken)
at Microsoft.Azure.KeyVault.KeyVaultClient.GetSecretsWithHttpMessagesAsync(String vaultBaseUrl, Nullable`1 maxresults, Dictionary`2 customHeaders, CancellationToken cancellationToken)
at Microsoft.Azure.KeyVault.KeyVaultClientExtensions.GetSecretsAsync(IKeyVaultClient operations, String vaultBaseUrl, Nullable`1 maxresults, CancellationToken cancellationToken)
at Microsoft.Azure.WebJobs.Script.WebHost.KeyVaultSecretsRepository.GetKeyVaultSecretsPagesAsync(KeyVaultClient keyVaultClient, String keyVaultBaseUrl) in D:\a\_work\1\s\src\WebJobs.Script.WebHost\Security\KeyManagement\KeyVaultSecretsRepository.cs:line 213
at Microsoft.Azure.WebJobs.Script.Tests.SecretsRepositoryTests.Fixture.ClearAllKeyVaultSecrets() in D:\a\_work\1\s\test\WebJobs.Script.Tests.Integration\Host\SecretsRepositoryTests.cs:line 810
at Microsoft.Azure.WebJobs.Script.Tests.SecretsRepositoryTests.Fixture.TestInitialize(SecretsRepositoryType repositoryType, String secretsDirectory, String testSiteName) in D:\a\_work\1\s\test\WebJobs.Script.Tests.Integration\Host\SecretsRepositoryTests.cs:line 597
at Microsoft.Azure.WebJobs.Script.Tests.SecretsRepositoryTests.ReadAsync_ReadsExpectedKeyVaultPages(SecretsRepositoryType repositoryType, ScriptSecretsType secretsType) in D:\a\_work\1\s\test\WebJobs.Script.Tests.Integration\Host\SecretsRepositoryTests.cs:line 150
--- End of stack trace from previous location where exception was thrown ---
azure-pipelines / Azure.azure-functions-host
Microsoft.Azure.WebJobs.Script.Tests.SecretsRepositoryTests.WriteAsync_CreatesExpectedFile(repositoryType: BlobStorage, secretsType: Host)
Microsoft.Azure.Services.AppAuthentication.AzureServiceTokenProviderException : Parameters: Connection String: RunAs=App;AppId=444681e3-715c-4d22-ae13-ccd7d05ab318;TenantId=72f988bf-86f1-41af-91ab-2d7cd011db47;AppKey=<<Redacted>>, Resource: https://vault.azure.net, Authority: https://login.microsoftonline.com/72f988bf-86f1-41af-91ab-2d7cd011db47. Exception Message: Access token could not be acquired. AADSTS7000215: Invalid client secret provided. Ensure the secret being sent in the request is the client secret value, not the client secret ID, for a secret added to app '444681e3-715c-4d22-ae13-ccd7d05ab318'. Trace ID: e114be25-3aee-4ba9-8960-2b6f763d8900 Correlation ID: 8fee071c-0da0-426c-8b49-beabb0584c5d Timestamp: 2024-05-24 21:34:47Z
Raw output
at Microsoft.Azure.Services.AppAuthentication.AzureServiceTokenProvider.GetAccessTokenAsyncImpl(String authority, String resource, String scope)
at Microsoft.Azure.KeyVault.KeyVaultCredential.PreAuthenticate(Uri url)
at Microsoft.Azure.KeyVault.KeyVaultCredential.ProcessHttpRequestAsync(HttpRequestMessage request, CancellationToken cancellationToken)
at Microsoft.Azure.KeyVault.KeyVaultClient.GetSecretsWithHttpMessagesAsync(String vaultBaseUrl, Nullable`1 maxresults, Dictionary`2 customHeaders, CancellationToken cancellationToken)
at Microsoft.Azure.KeyVault.KeyVaultClientExtensions.GetSecretsAsync(IKeyVaultClient operations, String vaultBaseUrl, Nullable`1 maxresults, CancellationToken cancellationToken)
at Microsoft.Azure.WebJobs.Script.WebHost.KeyVaultSecretsRepository.GetKeyVaultSecretsPagesAsync(KeyVaultClient keyVaultClient, String keyVaultBaseUrl) in D:\a\_work\1\s\src\WebJobs.Script.WebHost\Security\KeyManagement\KeyVaultSecretsRepository.cs:line 213
at Microsoft.Azure.WebJobs.Script.Tests.SecretsRepositoryTests.Fixture.ClearAllKeyVaultSecrets() in D:\a\_work\1\s\test\WebJobs.Script.Tests.Integration\Host\SecretsRepositoryTests.cs:line 810
at Microsoft.Azure.WebJobs.Script.Tests.SecretsRepositoryTests.Fixture.TestInitialize(SecretsRepositoryType repositoryType, String secretsDirectory, String testSiteName) in D:\a\_work\1\s\test\WebJobs.Script.Tests.Integration\Host\SecretsRepositoryTests.cs:line 597
at Microsoft.Azure.WebJobs.Script.Tests.SecretsRepositoryTests.WriteAsync_CreatesExpectedFile(SecretsRepositoryType repositoryType, ScriptSecretsType secretsType) in D:\a\_work\1\s\test\WebJobs.Script.Tests.Integration\Host\SecretsRepositoryTests.cs:line 228
--- End of stack trace from previous location where exception was thrown ---
Loading