Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow x-vss-e2eid response header to be logged in AzurePipelinesCredential for diagnostics. #6001

Merged
merged 9 commits into from
Sep 21, 2024

Conversation

ahsonkhan
Copy link
Member

For any responses coming from the OIDC endpoint as part of getting the token from AzurePipelinesCredential, we allow logging the x-vss-e2eid response header so that the service team can use that info for diagnostics and troubleshooting.

Fixes #5992

The value of the activityid and x-vss-e2eid are identical, so it doesn't seem necessary to log both. Also, even though we aren't enabling the header to be logged globally, it is worth noting that activityid seems to be used by other management plan services, unlike x-vss-e2eid which seems to only be used by Azure Pipelines and the azure devops cli/extension.

@manolerazvan, @geekzter, @kboom - please take a look and confirm this header is useful (and safe) to log along with any other headers that you'd find useful for the SDK customers to provide when filing issues.

@ahsonkhan ahsonkhan self-assigned this Sep 18, 2024
@ahsonkhan
Copy link
Member Author

/azp run cpp - identity

Copy link

Azure Pipelines successfully started running 1 pipeline(s).

@Azure Azure deleted a comment from azure-pipelines bot Sep 20, 2024
@ahsonkhan
Copy link
Member Author

/azp run cpp - identity

Copy link

Azure Pipelines successfully started running 1 pipeline(s).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Development

Successfully merging this pull request may close these issues.

Allow certain response headers coming from AzurePipelinesCredential to be logged
3 participants