-
Notifications
You must be signed in to change notification settings - Fork 338
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
azure_keyvault_secret
lookup might be broken
#1777
Comments
I facing the same problem EDIT: |
FYI, I ended up to this issue because having two versions of You can easily check if that is the case in your environment with command |
So, what are the problematic downstream dependencies then which need to be updated? Didn't have a change yet to test again but will do again soonish. |
I also hit this problem, and I think there's something wrong with how I'm using a service principle, not MSI, and yet the lookup insists on using MSI authentication.
I was able to solve this problem by specifying |
@pat-s Do your problems still exist? Whether the test has installed |
I'll have a look soon and will report back what I found. Thanks already to everyone participating here so far. |
facing this issue with msi at this point in time... is this something intermittent as I remember the same error last week but later vanished but now again facing the same issue!!! |
@Ratanavery @misterpoulet Judging from your error and my process of reproducing the problem, it is not a bug。 You need to add access policy to your MSI VM. You can refer to connect (https://learn.microsoft.com/en-us/azure/key-vault/general/assign-access-policy?tabs=azure-portal), thank you.
|
SUMMARY
lookup('azure.azcollection.azure_keyvault_secret'
doesn't seem to work, no matter the auth method.ISSUE TYPE
COMPONENT NAME
ANSIBLE VERSION
COLLECTION VERSION
CONFIGURATION
OS / ENVIRONMENT
STEPS TO REPRODUCE
Tried to authenticate via
az login
, via explicit credentials (client_id
,secret
, tenant_id`) or env vars. All fail. Each of them with slighltly different methodsYes, I can query secrets in the respective key vault and the credentials are correct.
I am Key vault admin and the credentials are used in other automation workflows.
EXPECTED RESULTS
Authentication works and secrets are returned.
ACTUAL RESULTS
The text was updated successfully, but these errors were encountered: