Skip to content

Getting a token via VisualStudioCodeCredential using v0.10.0 of the Azure Account Extension results in an error #20500

@wwlorey

Description

@wwlorey
  • Package Name: @azure/identity
  • Package Version: latest
  • Operating system: Windows
  • nodejs
    • version: 17.5.0
  • browser
    • name/version: N/A
  • typescript
    • version: 4.0.2
  • Is the bug related to documentation in

Describe the bug
In version 0.10.0, the Azure Account Extension for VS Code started consuming the VS Code secrets API instead of using keytar directly for caching tokens. It looks like the identity package relies on the old way the extension was using to store these tokens as demonstrated by the following error. This is sometimes thrown when users attempt to get tokens using VisualStudioCodeCredential:
image

To Reproduce
Please see the repro steps in microsoft/vscode-azure-account#443 (comment) and more info in microsoft/vscode-azure-account#443 (comment).

Expected behavior
The identity package succeeds in reading tokens cached by the Azure Account Extension.

More info
A more robust way of talking to the Azure Account Extension is through the extension API if that's an option for this package.

Metadata

Metadata

Assignees

Labels

Azure.IdentityClientThis issue points to a problem in the data-plane of the library.bugThis issue requires a change to an existing behavior in the product in order to be resolved.customer-reportedIssues that are reported by GitHub users external to the Azure organization.

Type

No type

Projects

Status

Done

Milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions