-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Managed Identity based authentication for the azure-pipelines scaler #4072
Comments
Hi, |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed in 7 days if no further activity occurs. Thank you for your contributions. |
Closing this issue for now because of the above. Feel free to re-open in the future once this is supported. |
Support for Managed Identities on Azure DevOps is now in public preview |
Amazing! |
Awesome, would love to see that feature soon. |
@JorTurFer What do you think? Are you still using ADO at Lidl? |
Yes we do, and we have had a problem with an expired PAT this week xD |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed in 7 days if no further activity occurs. Thank you for your contributions. |
+1 to this, just ran into having to replace the PAT by editing the secret in the cluster, which isn't the end of the world - that said, it'd be nice to just not have to worry about it at all. I know the DevOps API is weird with auth, though I think I was able to get my Function App to authenticate with the DevOps API using a managed identity, so I'd think something similar should be possible. https://medium.com/@relente/using-system-managed-identity-to-invoke-azure-devops-rest-api-7833bc988705 |
+1 For this feature. Would love to get rid of PATs at all ouf our clients for Self Hosted agent scenarios on AKS/Container Apps |
This feature has been already merged and shipped as part of v2.13, so I close the issue |
Proposal
Would it be possible to add support or a handler for the scaler to use a managed identity (when running on Azure) to either request a PAT token and use it transparently or to use the Bearer authentication for that. This would make having the PAT token storage(and associated rotation/management) optional, and make the usage a bit more seamless.
Use-Case
For Self-Hosted agents in AKS for example we need to generate a PAT token and store that (preferably in a secure way) and manage the expiration and possible leakage of the said token. for registering the scaler in the Node Pool.
Is this a feature you are interested in implementing yourself?
No
Anything else?
No response
The text was updated successfully, but these errors were encountered: