Open lsuarez5280 opened 4 weeks ago
Could someone on the team clarify whether this issue and its pull request will be considered? The current radio silence doesn't give me any expectation as to whether monitoring this report is worth my effort. I've been keeping the pull request in sync with the latest from main for two and a half weeks now.
If the report and fix will be considered or there are any requests for modified code or test cases (aside from merging what I hope is a pending build fix for failures on main), I'm happy to be patient about it or submit additional commits, but please at least let me know what to expect.
While I debated internally if I should do this, I'm tagging you all in the hopes anyone at all actively contributing here will have some feedback: @manolerazvan @embetten @cormacpayne @DenisNikulin5 @LeftTwixWand @starkmsu @ismayilov-ismayil @DmitriiBobreshev @kirill-ivlev @DergachevE @onetocny @aleksandrlevochkin @vmapetr
@lsuarez5280 Unfortunately it doesn't seem like many external PRs get approved or even looked at in this repo. Been doing the same for my own PR since beginning of April
Thanks @ataverascrespo. Quite a way to run an open source protect...
The following code in
azure-arm-common.ts:357-361
is dated and too prescriptive, resulting in a failure to leverage Managed Identity in Azure Container Apps hosting my Azure Pipelines agents:The current code results in the following debug output after two minutes from a pipeline using the AzureWebApp@1 task.
As an example, the following is the constructed URL for obtaining MSI tokens based on the runtime environment of one replica of my agents.
See an image capture from an example bash console session below:
I would suggest a backwards-compatible rewrite of the code to the following to leverage a more recent MSI API:
If this repository is accepting contributions, please tag me if desired and I'll submit a pull request with this information.