You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Azure DevOps OIDC token endpoint, however, requires a HTTP POST request:
POST https://dev.azure.com/{organization}/{scopeIdentifier}/_apis/distributedtask/hubs/{hubName}/plans/{planId}/jobs/{jobId}/oidctoken?serviceConnectionId={serviceConnectionId}&api-version=7.1-preview.1
Consequently, URL-sourced credentials can't yet be applied to Azure Pipelines. The process fails with the following error, when using the specified credential file:
There was a problem refreshing your current auth tokens: ('Unable to retrieve Identity Pool subject token', '{"count":1,"value":{"Message":"The requested resource does not support http method \'GET\'."}}')
Hi @lsirac , Thanks for the reference. Are the custom credential suppliers also easy to distribute? I prefer the built-in credentials as it doesn't require additional dependencies for the consumers.
btw, I've temporarily settled on the ExecutableSourceCredential to execute the post request.
Is your feature request related to a problem? Please describe.
External account URL-sourced credentials require a HTTP GET endpoint:
The Azure DevOps OIDC token endpoint, however, requires a HTTP POST request:
Source: https://learn.microsoft.com/en-us/rest/api/azure/devops/distributedtask/oidctoken/create?view=azure-devops-rest-7.1
Consequently, URL-sourced credentials can't yet be applied to Azure Pipelines. The process fails with the following error, when using the specified credential file:
Describe the solution you'd like
Ability to use POST URL-sourced credentials endpoints.
Describe alternatives you've considered
AWS credentials are supported with a dedicated credential source type. Could be an option, as it reduces the need for the
Bearer <System.AccessToken>
-header. See: https://learn.microsoft.com/en-us/azure/devops/pipelines/build/variables?view=azure-devops&tabs=yaml#systemaccesstokenThe text was updated successfully, but these errors were encountered: