-
Notifications
You must be signed in to change notification settings - Fork 205
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
"The requested operation is not allowed" when using --azure-credential #976
Comments
If this is correct, why do you think that this is an issue related to |
Thus as other publishing tools succeed using the same service principal, but vsce doesn't, I suspect vsce. (edit: to be clear just in case there was a misunderstanding, the service principal has Owner permissions and should have full privileges to the publisher) |
Based on the exception type, it seems to be coming from the Marketplace ( |
AzureCLI. The entirety of the task is as follows: - task: AzureCLI@2
inputs:
azureSubscription: Azure Marketplace Service Connection
scriptType: pscore
scriptLocation: inlineScript
inlineScript: >
vsce publish
--azure-credential
--packagePath $(Pipeline.Workspace)\drop_build_main\redacted.vsix
$(extraVsceArgs)
displayName: Publish to Marketplace Azure Marketplace Service Connection is connected to the service principal on the Marketplace account (this same service connection is also used for our VS publishing flows and those work, so it's not a problem with the connection), and extraVsceArgs is either |
Could you try adding the |
Exact same failure, unfortunately. |
I encountered the exact same failure. Is there any update on this issue? I truly appreciate the time and effort you dedicate to maintaining this project. |
vsce's
It may be that the authentication method that is succeeding in obtaining an access token is not the authentication method you expect, and that access token doesn't have the publish privileges you need. You could try setting
Setting these environment variables does not work. $Env:ExcludeEnvironmentCredential='true'
$Env:ExcludeWorkloadIdentityCredential='true'
$Env:ExcludeManagedIdentityCredential='true'
$Env:ExcludeSharedTokenCacheCredential='true'
$Env:ExcludeVisualStudioCredential='true'
$Env:ExcludeVisualStudioCodeCredential='true' |
I too am having the exact same issue when I've tried to use the --azure-credential switch. As @dtivel describes, I suspect that some weird and unknown identity is being found and being used which does not have access to the marketplace. CC: @benibenj , @lszomoru consider documenting this in the vsce documentation? |
@trevors20, thanks much and please let us know if this works. I'm just guessing at this point, so having confirmation on a solution would help a lot. I agree, if this is the problem, we should update documentation with information about this. |
I updated my comment above. My suggested workaround does not work. I believe the root cause is still valid. I tried the It would appear that, contrary to documentation, the Azure SDK for JS does not support the Even if I'm mistaken about |
It has been confirmed: Azure SDK for JS did not actually implement |
@dtivel, thank you very much for looking into this. When you enabled Until we get to the bottom of this you can workaround by getting a token using Couple of troubleshooting steps that can come in handy:
|
Have the same issue and can confirm that getting a token and using with --pat works as a workarround. does not work Also tried same workarounds as above without any resolution for --azrure-credential. |
@SBalslev thanks for trying out the workaround and for confirming that it is working. Would you be able to share the logs that are being generated when you enable the AZURE_LOG_LEVEL? I would like to understand which identity is being picked to be able to implement the correct long-term solution. Thanks! |
Here's the log from the last run before I switched to PAT. This run has all the variables set to true.
|
Based on the logs it looks like the ManagedIdentityCredential was used to get the token:
Are you using the Azure CLI task? Do you specify the |
It is Azure Cli, PS Core.
How do you specify addSpnToEnvironment: true? I don't see an option for it.
…________________________________
From: Ladislau Szomoru ***@***.***>
Sent: Thursday, June 20, 2024 1:59:38 PM
To: microsoft/vscode-vsce ***@***.***>
Cc: Steffen Balslev ***@***.***>; Mention ***@***.***>
Subject: Re: [microsoft/vscode-vsce] "The requested operation is not allowed" when using --azure-credential (Issue #976)
Based on the logs it looks like the ManagedIdentityCredential was used to get the token:
2024-06-19T21:41:31.3937133Z azure:identity:info ChainedTokenCredential => getToken() => Result for ManagedIdentityCredential: SUCCESS. Scopes: 499b84ac-1321-427f-aa17-267ca6975798/.default.
Are you using the Azure CLI task<https://learn.microsoft.com/en-us/azure/devops/pipelines/tasks/reference/azure-cli-v2?view=azure-pipelines>? Do you specify the addSpnToEnvironment: true for the task? I am asking as I seeing the following in the logs and I am wondering if some environment variables are not being set properly.
—
Reply to this email directly, view it on GitHub<#976 (comment)>, or unsubscribe<https://github.com/notifications/unsubscribe-auth/ACH3EK2FY5FVV6QQP3S6CFTZIK72VAVCNFSM6AAAAABHRI44L2VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDCOBQGQ4TMOJTGQ>.
You are receiving this because you were mentioned.Message ID: ***@***.***>
|
I'll test with verbose logs on and get back to you; in the meantime, my hunch based on the above is that vsce is trying to use the managed identity on the VM (our pools all have one to stay in compliance), which is not the identity to use. We need the Az credentials provided by the AzureCLI wrapper task, which is lower priority on the DefaultAzureCredential chain. As for addSpnToEnvironment: that adds environment variables in a different format than EnvironmentCredential expects (namely servicePrincipalId, tenantId, etc. rather than AZURE_CLIENT_ID, AZURE_TENANT_ID, etc.). It's also not clear how the translation would work when using WIF-enabled service connections which don't have a client secret. All in all this seems tricky: I imagine there's certainly times when the managed identity should be used, and times when it shouldn't be. |
Yeah, confirmed it's trying to use the managed identity which is guaranteed to fail. 2024-06-26T23:03:11.7190763Z azure:identity:info EnvironmentCredential => Found the following environment variables: 2024-06-26T23:03:11.7191611Z azure:identity:info WorkloadIdentityCredential => Found the following environment variables: 2024-06-26T23:03:11.7195313Z azure:core-client:warning The baseUri option for SDK Clients has been deprecated, please use endpoint instead. 2024-06-26T23:03:11.7209109Z azure:core-client:warning The baseUri option for SDK Clients has been deprecated, please use endpoint instead. 2024-06-26T23:03:11.7231808Z azure:identity:info WorkloadIdentityCredential => WorkloadIdentityCredential: is unavailable. tenantId, clientId, and federatedTokenFilePath are required parameters. 2024-06-26T23:03:11.7232414Z In DefaultAzureCredential and ManagedIdentityCredential, these can be provided as environment variables - 2024-06-26T23:03:11.7232878Z "AZURE_TENANT_ID", 2024-06-26T23:03:11.7233184Z "AZURE_CLIENT_ID", 2024-06-26T23:03:11.7233613Z "AZURE_FEDERATED_TOKEN_FILE". See the troubleshooting guide for more information: https://aka.ms/azsdk/js/identity/workloadidentitycredential/troubleshoot 2024-06-26T23:03:11.7241907Z azure:identity:info ManagedIdentityCredential - Azure Arc MSI => ManagedIdentityCredential - Azure Arc MSI: The environment variables needed are: IMDS_ENDPOINT and IDENTITY_ENDPOINT 2024-06-26T23:03:11.7248427Z azure:identity:info ManagedIdentityCredential - Fabric MSI => ManagedIdentityCredential - Fabric MSI: Unavailable. The environment variables needed are: IDENTITY_ENDPOINT, IDENTITY_HEADER and IDENTITY_SERVER_THUMBPRINT 2024-06-26T23:03:11.7249587Z azure:identity:info ManagedIdentityCredential - AppServiceMSI 2019 => ManagedIdentityCredential - AppServiceMSI 2019: Unavailable. The environment variables needed are: IDENTITY_ENDPOINT and IDENTITY_HEADER. 2024-06-26T23:03:11.7250564Z azure:identity:info ManagedIdentityCredential - AppServiceMSI 2017 => ManagedIdentityCredential - AppServiceMSI 2017: Unavailable. The environment variables needed are: MSI_ENDPOINT and MSI_SECRET. 2024-06-26T23:03:11.7251518Z azure:identity:info ManagedIdentityCredential - CloudShellMSI => ManagedIdentityCredential - CloudShellMSI: Unavailable. The environment variable MSI_ENDPOINT is needed. 2024-06-26T23:03:11.7252656Z azure:identity:info ManagedIdentityCredential - Token Exchange => ManagedIdentityCredential - Token Exchange: Unavailable. The environment variables needed are: AZURE_CLIENT_ID (or the client ID sent through the parameters), AZURE_TENANT_ID and AZURE_FEDERATED_TOKEN_FILE 2024-06-26T23:03:11.7260893Z azure:identity:info ManagedIdentityCredential - IMDS => ManagedIdentityCredential - IMDS: Pinging the Azure IMDS endpoint 2024-06-26T23:03:12.1256106Z azure:core-rest-pipeline retryPolicy:info Retry 0: Attempting to send request 85578d80-0fbf-4126-a5a0-6b106e696462 2024-06-26T23:03:12.1266008Z azure:core-rest-pipeline:info Request: { 2024-06-26T23:03:12.1266512Z "url": "http://169.254.169.254/metadata/identity/oauth2/token", 2024-06-26T23:03:12.1266929Z "headers": { 2024-06-26T23:03:12.1267275Z "accept": "application/json", 2024-06-26T23:03:12.1267732Z "accept-encoding": "gzip,deflate", 2024-06-26T23:03:12.1268338Z "user-agent": "azsdk-js-identity/4.3.0-beta.3 core-rest-pipeline/1.16.1 Node/18.20.3 OS/(x64-Windows_NT-10.0.20348)", 2024-06-26T23:03:12.1268982Z "x-ms-client-request-id": "85578d80-0fbf-4126-a5a0-6b106e696462" 2024-06-26T23:03:12.1269358Z }, 2024-06-26T23:03:12.1269647Z "method": "GET", 2024-06-26T23:03:12.1269946Z "timeout": 1000, 2024-06-26T23:03:12.1270512Z "disableKeepAlive": false, 2024-06-26T23:03:12.1270837Z "withCredentials": false, 2024-06-26T23:03:12.1271137Z "tracingOptions": { 2024-06-26T23:03:12.1271440Z "tracingContext": { 2024-06-26T23:03:12.1271749Z "_contextMap": {} 2024-06-26T23:03:12.1272027Z } 2024-06-26T23:03:12.1273353Z }, 2024-06-26T23:03:12.1273932Z "requestId": "85578d80-0fbf-4126-a5a0-6b106e696462", 2024-06-26T23:03:12.1274365Z "allowInsecureConnection": true, 2024-06-26T23:03:12.1274707Z "enableBrowserStreams": false 2024-06-26T23:03:12.1276098Z } 2024-06-26T23:03:12.1412088Z azure:core-rest-pipeline:info Response status code: 400 2024-06-26T23:03:12.1412610Z azure:core-rest-pipeline:info Headers: { 2024-06-26T23:03:12.1413169Z "content-type": "application/json; charset=utf-8", 2024-06-26T23:03:12.1413535Z "server": "IMDS/150.870.65.1305", 2024-06-26T23:03:12.1414020Z "x-ms-request-id": "e2dfb8b0-1156-44a5-97a4-35d52e08e6f3", 2024-06-26T23:03:12.1414448Z "date": "Wed, 26 Jun 2024 23:03:11 GMT", 2024-06-26T23:03:12.1414933Z "content-length": "88" 2024-06-26T23:03:12.1415243Z } 2024-06-26T23:03:12.1417106Z azure:core-rest-pipeline retryPolicy:info Retry 0: Received a response from request 85578d80-0fbf-4126-a5a0-6b106e696462 2024-06-26T23:03:12.1418043Z azure:core-rest-pipeline retryPolicy:info Retry 0: Maximum retries reached. Returning the last received response, or throwing the last received error. 2024-06-26T23:03:12.1418935Z azure:identity:info ManagedIdentityCredential - IMDS => ManagedIdentityCredential - IMDS: The Azure IMDS endpoint is available 2024-06-26T23:03:12.3483933Z azure:identity:info ManagedIdentityCredential => SetAppTokenProvider invoked with parameters- {"correlationId":"noCorrelationId","tenantId":"managed_identity","scopes":["499b84ac-1321-427f-aa17-267ca6975798/.default"]} 2024-06-26T23:03:12.3486692Z azure:identity:info ManagedIdentityCredential => authenticateManagedIdentity invoked with scopes- ["499b84ac-1321-427f-aa17-267ca6975798/.default"] and getTokenOptions - {"correlationId":"noCorrelationId","tenantId":"managed_identity","scopes":["499b84ac-1321-427f-aa17-267ca6975798/.default"]} 2024-06-26T23:03:12.3487863Z azure:identity:info ManagedIdentityCredential - IMDS => ManagedIdentityCredential - IMDS: Using the default Azure IMDS endpoint http://169.254.169.254. 2024-06-26T23:03:12.3494851Z azure:identity:info IdentityClient: sending token request to [http://169.254.169.254/metadata/identity/oauth2/token?resource=499b84ac-1321-427f-aa17-267ca6975798&api-version=2018-02-01] 2024-06-26T23:03:12.3497375Z azure:core-rest-pipeline retryPolicy:info Retry 0: Attempting to send request f4d79147-d118-4cb6-9e58-fc15e3c51a40 2024-06-26T23:03:12.3505681Z azure:core-rest-pipeline:info Request: { 2024-06-26T23:03:12.3506337Z "url": "http://169.254.169.254/metadata/identity/oauth2/token?resource=REDACTED&api-version=2018-02-01", 2024-06-26T23:03:12.3506783Z "headers": { 2024-06-26T23:03:12.3507117Z "accept": "application/json", 2024-06-26T23:03:12.3507459Z "metadata": "REDACTED", 2024-06-26T23:03:12.3507921Z "accept-encoding": "gzip,deflate", 2024-06-26T23:03:12.3508568Z "user-agent": "azsdk-js-identity/4.3.0-beta.3 core-rest-pipeline/1.16.1 Node/18.20.3 OS/(x64-Windows_NT-10.0.20348)", 2024-06-26T23:03:12.3509196Z "x-ms-client-request-id": "f4d79147-d118-4cb6-9e58-fc15e3c51a40" 2024-06-26T23:03:12.3509568Z }, 2024-06-26T23:03:12.3509837Z "method": "GET", 2024-06-26T23:03:12.3510118Z "timeout": 0, 2024-06-26T23:03:12.3510410Z "disableKeepAlive": false, 2024-06-26T23:03:12.3510691Z "withCredentials": false, 2024-06-26T23:03:12.3511175Z "requestId": "f4d79147-d118-4cb6-9e58-fc15e3c51a40", 2024-06-26T23:03:12.3511537Z "allowInsecureConnection": true, 2024-06-26T23:03:12.3511877Z "enableBrowserStreams": false 2024-06-26T23:03:12.3512250Z } 2024-06-26T23:03:12.6387147Z azure:core-rest-pipeline:info Response status code: 200 2024-06-26T23:03:12.6387741Z azure:core-rest-pipeline:info Headers: { 2024-06-26T23:03:12.6389793Z "content-type": "application/json; charset=utf-8", 2024-06-26T23:03:12.6390324Z "server": "IMDS/150.870.65.1305", 2024-06-26T23:03:12.6390871Z "x-ms-request-id": "980b8d90-6863-4bea-bcad-dcb1465478fa", 2024-06-26T23:03:12.6391306Z "date": "Wed, 26 Jun 2024 23:03:12 GMT", 2024-06-26T23:03:12.6393229Z "content-length": "1534" 2024-06-26T23:03:12.6393542Z } 2024-06-26T23:03:12.6394118Z azure:core-rest-pipeline retryPolicy:info Retry 0: Received a response from request f4d79147-d118-4cb6-9e58-fc15e3c51a40 2024-06-26T23:03:12.6394809Z azure:core-rest-pipeline retryPolicy:info Retry 0: Processing 2 retry strategies. 2024-06-26T23:03:12.6397545Z azure:core-rest-pipeline retryPolicy:info Retry 0: Processing retry strategy throttlingRetryStrategy. 2024-06-26T23:03:12.6398278Z azure:core-rest-pipeline retryPolicy:info Retry 0: Skipped. 2024-06-26T23:03:12.6398917Z azure:core-rest-pipeline retryPolicy:info Retry 0: Processing retry strategy exponentialRetryStrategy. 2024-06-26T23:03:12.6399466Z azure:core-rest-pipeline retryPolicy:info Retry 0: Skipped. 2024-06-26T23:03:12.6400097Z azure:core-rest-pipeline retryPolicy:info None of the retry strategies could work with the received response. Returning it. 2024-06-26T23:03:12.6400942Z azure:identity:info IdentityClient: [http://169.254.169.254/metadata/identity/oauth2/token?resource=499b84ac-1321-427f-aa17-267ca6975798&api-version=2018-02-01] token acquired, expires on 1719529392000 2024-06-26T23:03:12.6401580Z azure:identity:info ManagedIdentityCredential => SetAppTokenProvider will save the token in cache 2024-06-26T23:03:12.6419488Z azure:identity:info ManagedIdentityCredential => getToken() => SUCCESS. Scopes: 499b84ac-1321-427f-aa17-267ca6975798/.default. 2024-06-26T23:03:12.6420284Z azure:identity:info ManagedIdentityCredential => getToken() => SUCCESS. Scopes: 499b84ac-1321-427f-aa17-267ca6975798/.default. 2024-06-26T23:03:12.6421208Z azure:identity:info ChainedTokenCredential => getToken() => Result for ManagedIdentityCredential: SUCCESS. Scopes: 499b84ac-1321-427f-aa17-267ca6975798/.default. After thinking about this a bit more...I think it might make sense for vsce to have a separate argument controlling whether a managed identity is used, and for --azure-credential to only be for user auth. By providing a dedicated argument, e.g. --managed-identity, people who want to use MIs can specify the client ID of the one they want. This is similar to how other tools do it, such as the Git Credential Manager. Then --azure-credential can be repurposed to only accept user credentials. |
Looking at the Azure CLI task's source code, it looks like when you are using WIF the idToken environment variable is set. I am not yet convinced that having different flags for different auth methods is the way to go. The nice thing with the current implementation is that it follows the default auth chain that can be controlled using environment variables (lots of good documentation and sample available). I will be doing some more testing tomorrow and circle back to this issue with my findings. |
I have set up a sample pipeline and used the following task successfully both with a service connection that was created using the "automatic" flow as well as the "manual" flow. If you still have problems getting this to work I would love to see the output that is being displayed with your pipeline (please replace steps:
- task: AzureCLI@2
displayName: 'Azure CLI'
inputs:
azureSubscription: <SERVICE_CONNECTION>
scriptType: ps
scriptLocation: inlineScript
inlineScript: |
$env:AZURE_LOG_LEVEL = "verbose"
az rest -u https://app.vssps.visualstudio.com/_apis/profile/profiles/me --resource 499b84ac-1321-427f-aa17-267ca6975798
npx @vscode/vsce@latest verify-pat <PUBLISHER_NAME> --azure-credential |
@lszomoru does your pool have a managed identity attached to it? Here is what I see with the requested changes. 2024-07-01T18:37:20.2330611Z { 2024-07-01T18:37:20.2383089Z "coreRevision": 453058499, 2024-07-01T18:37:20.2493911Z "displayName": "72f988bf-86f1-41af-91ab-2d7cd011db47\\166e71d4-3590-4a4c-9bb8-cc51e2cd3e5e", 2024-07-01T18:37:20.2531786Z "emailAddress": "", 2024-07-01T18:37:20.2533404Z "id": "3c15128d-adc3-6659-a6e0-99ea01e6e33d", 2024-07-01T18:37:20.2824824Z "publicAlias": "3c15128d-adc3-6659-a6e0-99ea01e6e33d", 2024-07-01T18:37:20.2827748Z "revision": 453058499, 2024-07-01T18:37:20.2853044Z "timeStamp": "2024-05-10T17:34:59.6933333+00:00" 2024-07-01T18:37:20.2862802Z } 2024-07-01T18:37:21.4984701Z azure:identity:info EnvironmentCredential => Found the following environment variables: 2024-07-01T18:37:21.5025826Z azure:identity:info WorkloadIdentityCredential => Found the following environment variables: 2024-07-01T18:37:21.5047809Z azure:core-client:warning The baseUri option for SDK Clients has been deprecated, please use endpoint instead. 2024-07-01T18:37:21.5051820Z azure:core-client:warning The baseUri option for SDK Clients has been deprecated, please use endpoint instead. 2024-07-01T18:37:21.5053068Z azure:identity:info WorkloadIdentityCredential => WorkloadIdentityCredential: is unavailable. tenantId, clientId, and federatedTokenFilePath are required parameters. 2024-07-01T18:37:21.5053729Z In DefaultAzureCredential and ManagedIdentityCredential, these can be provided as environment variables - 2024-07-01T18:37:21.5054104Z "AZURE_TENANT_ID", 2024-07-01T18:37:21.5054399Z "AZURE_CLIENT_ID", 2024-07-01T18:37:21.5054859Z "AZURE_FEDERATED_TOKEN_FILE". See the troubleshooting guide for more information: https://aka.ms/azsdk/js/identity/workloadidentitycredential/troubleshoot 2024-07-01T18:37:21.5055712Z azure:identity:info ManagedIdentityCredential - Azure Arc MSI => ManagedIdentityCredential - Azure Arc MSI: The environment variables needed are: IMDS_ENDPOINT and IDENTITY_ENDPOINT 2024-07-01T18:37:21.5056645Z azure:identity:info ManagedIdentityCredential - Fabric MSI => ManagedIdentityCredential - Fabric MSI: Unavailable. The environment variables needed are: IDENTITY_ENDPOINT, IDENTITY_HEADER and IDENTITY_SERVER_THUMBPRINT 2024-07-01T18:37:21.5057586Z azure:identity:info ManagedIdentityCredential - AppServiceMSI 2019 => ManagedIdentityCredential - AppServiceMSI 2019: Unavailable. The environment variables needed are: IDENTITY_ENDPOINT and IDENTITY_HEADER. 2024-07-01T18:37:21.5058463Z azure:identity:info ManagedIdentityCredential - AppServiceMSI 2017 => ManagedIdentityCredential - AppServiceMSI 2017: Unavailable. The environment variables needed are: MSI_ENDPOINT and MSI_SECRET. 2024-07-01T18:37:21.5059292Z azure:identity:info ManagedIdentityCredential - CloudShellMSI => ManagedIdentityCredential - CloudShellMSI: Unavailable. The environment variable MSI_ENDPOINT is needed. 2024-07-01T18:37:21.5060277Z azure:identity:info ManagedIdentityCredential - Token Exchange => ManagedIdentityCredential - Token Exchange: Unavailable. The environment variables needed are: AZURE_CLIENT_ID (or the client ID sent through the parameters), AZURE_TENANT_ID and AZURE_FEDERATED_TOKEN_FILE 2024-07-01T18:37:21.5061141Z azure:identity:info ManagedIdentityCredential - IMDS => ManagedIdentityCredential - IMDS: Pinging the Azure IMDS endpoint 2024-07-01T18:37:23.4653745Z azure:core-rest-pipeline retryPolicy:info Retry 0: Attempting to send request c170f528-2f09-44bc-b769-eefc43137956 2024-07-01T18:37:23.4661038Z azure:core-rest-pipeline:info Request: { 2024-07-01T18:37:23.4661448Z "url": "http://169.254.169.254/metadata/identity/oauth2/token", 2024-07-01T18:37:23.4662062Z "headers": { 2024-07-01T18:37:23.4662400Z "accept": "application/json", 2024-07-01T18:37:23.4662833Z "accept-encoding": "gzip,deflate", 2024-07-01T18:37:23.4663411Z "user-agent": "azsdk-js-identity/4.3.0-beta.3 core-rest-pipeline/1.16.1 Node/18.20.3 OS/(x64-Windows_NT-10.0.20348)", 2024-07-01T18:37:23.4665121Z "x-ms-client-request-id": "c170f528-2f09-44bc-b769-eefc43137956" 2024-07-01T18:37:23.4665497Z }, 2024-07-01T18:37:23.4665808Z "method": "GET", 2024-07-01T18:37:23.4666096Z "timeout": 1000, 2024-07-01T18:37:23.4666385Z "disableKeepAlive": false, 2024-07-01T18:37:23.4666709Z "withCredentials": false, 2024-07-01T18:37:23.4667009Z "tracingOptions": { 2024-07-01T18:37:23.4667326Z "tracingContext": { 2024-07-01T18:37:23.4667622Z "_contextMap": {} 2024-07-01T18:37:23.4667919Z } 2024-07-01T18:37:23.4668190Z }, 2024-07-01T18:37:23.4668660Z "requestId": "c170f528-2f09-44bc-b769-eefc43137956", 2024-07-01T18:37:23.4669091Z "allowInsecureConnection": true, 2024-07-01T18:37:23.4669453Z "enableBrowserStreams": false 2024-07-01T18:37:23.4669778Z } 2024-07-01T18:37:23.4787444Z azure:core-rest-pipeline:info Response status code: 400 2024-07-01T18:37:23.4788062Z azure:core-rest-pipeline:info Headers: { 2024-07-01T18:37:23.4788604Z "content-type": "application/json; charset=utf-8", 2024-07-01T18:37:23.4791543Z "server": "IMDS/150.870.65.1305", 2024-07-01T18:37:23.4792129Z "x-ms-request-id": "7e77850e-a6a5-436b-844f-36fb2da56311", 2024-07-01T18:37:23.4792535Z "date": "Mon, 01 Jul 2024 18:37:23 GMT", 2024-07-01T18:37:23.4792943Z "content-length": "88" 2024-07-01T18:37:23.4793264Z } 2024-07-01T18:37:23.4793929Z azure:core-rest-pipeline retryPolicy:info Retry 0: Received a response from request c170f528-2f09-44bc-b769-eefc43137956 2024-07-01T18:37:23.4795939Z azure:core-rest-pipeline retryPolicy:info Retry 0: Maximum retries reached. Returning the last received response, or throwing the last received error. 2024-07-01T18:37:23.4796906Z azure:identity:info ManagedIdentityCredential - IMDS => ManagedIdentityCredential - IMDS: The Azure IMDS endpoint is available 2024-07-01T18:37:23.6873417Z azure:identity:info ManagedIdentityCredential => SetAppTokenProvider invoked with parameters- {"correlationId":"noCorrelationId","tenantId":"managed_identity","scopes":["499b84ac-1321-427f-aa17-267ca6975798/.default"]} 2024-07-01T18:37:23.6876125Z azure:identity:info ManagedIdentityCredential => authenticateManagedIdentity invoked with scopes- ["499b84ac-1321-427f-aa17-267ca6975798/.default"] and getTokenOptions - {"correlationId":"noCorrelationId","tenantId":"managed_identity","scopes":["499b84ac-1321-427f-aa17-267ca6975798/.default"]} 2024-07-01T18:37:23.6877201Z azure:identity:info ManagedIdentityCredential - IMDS => ManagedIdentityCredential - IMDS: Using the default Azure IMDS endpoint http://169.254.169.254. 2024-07-01T18:37:23.6884253Z azure:identity:info IdentityClient: sending token request to [http://169.254.169.254/metadata/identity/oauth2/token?resource=499b84ac-1321-427f-aa17-267ca6975798&api-version=2018-02-01] 2024-07-01T18:37:23.6886708Z azure:core-rest-pipeline retryPolicy:info Retry 0: Attempting to send request 1724dbef-7619-448f-b494-95a576f8f405 2024-07-01T18:37:23.6894772Z azure:core-rest-pipeline:info Request: { 2024-07-01T18:37:23.6895405Z "url": "http://169.254.169.254/metadata/identity/oauth2/token?resource=REDACTED&api-version=2018-02-01", 2024-07-01T18:37:23.6895856Z "headers": { 2024-07-01T18:37:23.6896201Z "accept": "application/json", 2024-07-01T18:37:23.6896515Z "metadata": "REDACTED", 2024-07-01T18:37:23.6896981Z "accept-encoding": "gzip,deflate", 2024-07-01T18:37:23.6897595Z "user-agent": "azsdk-js-identity/4.3.0-beta.3 core-rest-pipeline/1.16.1 Node/18.20.3 OS/(x64-Windows_NT-10.0.20348)", 2024-07-01T18:37:23.6898226Z "x-ms-client-request-id": "1724dbef-7619-448f-b494-95a576f8f405" 2024-07-01T18:37:23.6898782Z }, 2024-07-01T18:37:23.6899052Z "method": "GET", 2024-07-01T18:37:23.6899321Z "timeout": 0, 2024-07-01T18:37:23.6899584Z "disableKeepAlive": false, 2024-07-01T18:37:23.6899886Z "withCredentials": false, 2024-07-01T18:37:23.6900360Z "requestId": "1724dbef-7619-448f-b494-95a576f8f405", 2024-07-01T18:37:23.6900703Z "allowInsecureConnection": true, 2024-07-01T18:37:23.6901188Z "enableBrowserStreams": false 2024-07-01T18:37:23.6901455Z } 2024-07-01T18:37:23.7462931Z azure:core-rest-pipeline:info Response status code: 200 2024-07-01T18:37:23.7465973Z azure:core-rest-pipeline:info Headers: { 2024-07-01T18:37:23.7466545Z "content-type": "application/json; charset=utf-8", 2024-07-01T18:37:23.7468229Z "server": "IMDS/150.870.65.1305", 2024-07-01T18:37:23.7468842Z "x-ms-request-id": "4f1bb65b-cfce-4c22-a738-e29402989541", 2024-07-01T18:37:23.7469278Z "date": "Mon, 01 Jul 2024 18:37:23 GMT", 2024-07-01T18:37:23.7471732Z "content-length": "1532" 2024-07-01T18:37:23.7472106Z } 2024-07-01T18:37:23.7472756Z azure:core-rest-pipeline retryPolicy:info Retry 0: Received a response from request 1724dbef-7619-448f-b494-95a576f8f405 2024-07-01T18:37:23.7477461Z azure:core-rest-pipeline retryPolicy:info Retry 0: Processing 2 retry strategies. 2024-07-01T18:37:23.7478115Z azure:core-rest-pipeline retryPolicy:info Retry 0: Processing retry strategy throttlingRetryStrategy. 2024-07-01T18:37:23.7478732Z azure:core-rest-pipeline retryPolicy:info Retry 0: Skipped. 2024-07-01T18:37:23.7479392Z azure:core-rest-pipeline retryPolicy:info Retry 0: Processing retry strategy exponentialRetryStrategy. 2024-07-01T18:37:23.7479995Z azure:core-rest-pipeline retryPolicy:info Retry 0: Skipped. 2024-07-01T18:37:23.7480568Z azure:core-rest-pipeline retryPolicy:info None of the retry strategies could work with the received response. Returning it. 2024-07-01T18:37:23.7481464Z azure:identity:info IdentityClient: [http://169.254.169.254/metadata/identity/oauth2/token?resource=499b84ac-1321-427f-aa17-267ca6975798&api-version=2018-02-01] token acquired, expires on 1719945443000 2024-07-01T18:37:23.7482086Z azure:identity:info ManagedIdentityCredential => SetAppTokenProvider will save the token in cache 2024-07-01T18:37:23.7493332Z azure:identity:info ManagedIdentityCredential => getToken() => SUCCESS. Scopes: 499b84ac-1321-427f-aa17-267ca6975798/.default. 2024-07-01T18:37:23.7494165Z azure:identity:info ManagedIdentityCredential => getToken() => SUCCESS. Scopes: 499b84ac-1321-427f-aa17-267ca6975798/.default. 2024-07-01T18:37:23.7494983Z azure:identity:info ChainedTokenCredential => getToken() => Result for ManagedIdentityCredential: SUCCESS. Scopes: 499b84ac-1321-427f-aa17-267ca6975798/.default. 2024-07-01T18:37:23.7515108Z INFO Publishing 'redacted.redacted v1.2024.701003'... 2024-07-01T18:37:24.2696395Z ERROR {"$id":"1","innerException":null,"message":"The requested operation is not allowed.","typeName":"Microsoft.TeamFoundation.Framework.Server.InvalidAccessException, Microsoft.TeamFoundation.Framework.Server","typeKey":"InvalidAccessException","errorCode":0,"eventId":3000} Client ID In regards to your previous comments...
True, but for someone who just wants to publish an extension, having to know internal implementation details such as which auth library vsce is using and how to control that implementation doesn't seem like a good user experience. None of this is currently documented in the vsce README/CLI help or the Publishing Extensions page, and the current error message only says "The requested operation is not allowed".
Manual. From these logs and from your mention of the idToken variable, it seems like I can get around this by writing idToken to a file, and then passing in that file as |
Spent some more time looking at this and indeed the issue is a combination of the authentication order, and the fact that there is a managed identity associated with the agent pool. If there is no managed identity associated with the agent pool things work out of the box. If you do have a managed identity associated with the agent pool the recommended workaround is to use the following code:
By "clearing" the two environment variables we ensure that the I am also looking at updating |
I have pushed a pre-release version of Could you please try the following code and let me know if it's working as expected:
If everything goes as expected we will publish a stable version of |
This worked, thanks! I will also try the pre-release version and report back :) |
This also worked! We removed the AZURE_CLIENT_ID workaround and were still able to publish. |
FYI. I was unable to get this to work unless I did not zero out the AZURE_TENANT_ID environment variable. I had to comment out the $env:AZURE_TENANT_ID line and it worked after tha. Not sure if it is related or not, but the AzurePowerShell Task (which I am using) was recently updated to stop using AzureRM modules and to use Az modules instead. Could be related. Is there a timeline for when the pre-release changes that you have will be deployed to production? Can't wait! And, thank you for working on this. |
I've tried version 2.30.0, and it works for me. Thank you all. I really appreciate it. |
We have published vsce version |
@lszomoru , I just tried this out to publish something today. But, unfortunately, I ran into a weird error that I'm not sure what is going on. It looks like this Issue was closed down so I'll open a new issue for what I'm seeing. Thanks for your help! |
Super excited to see vsce support Entra auth!
I was trying it today but ran into the following error:
The publish command is
vsce publish --azure-credential --packagePath $(Pipeline.Workspace)\drop_build_main\redacted.vsix
The service principal does have the right permissions on the marketplace publisher.
The text was updated successfully, but these errors were encountered: