From 9d3f0b7833d5342bd3e70cab5884cc5510bceb38 Mon Sep 17 00:00:00 2001 From: Jared Holgate Date: Wed, 8 Jan 2025 09:42:52 +0000 Subject: [PATCH] priroitise azure pipelines creds --- internal/provider/provider.go | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/internal/provider/provider.go b/internal/provider/provider.go index 6c3199cdb..84ddb61b8 100644 --- a/internal/provider/provider.go +++ b/internal/provider/provider.go @@ -775,19 +775,19 @@ func buildChainedTokenCredential(model providerData, options azidentity.DefaultA var creds []azcore.TokenCredential if model.UseOIDC.ValueBool() || model.UseAKSWorkloadIdentity.ValueBool() { - log.Printf("[DEBUG] oidc credential or AKS Workload Identity enabled") - if cred, err := buildOidcCredential(model, options); err == nil { - creds = append(creds, cred) - } else { - log.Printf("[DEBUG] failed to initialize oidc credential: %v", err) - } - log.Printf("[DEBUG] azure pipelines credential enabled") if cred, err := buildAzurePipelinesCredential(model, options); err == nil { creds = append(creds, cred) } else { log.Printf("[DEBUG] failed to initialize azure pipelines credential: %v", err) } + + log.Printf("[DEBUG] oidc credential or AKS Workload Identity enabled") + if cred, err := buildOidcCredential(model, options); err == nil { + creds = append(creds, cred) + } else { + log.Printf("[DEBUG] failed to initialize oidc credential: %v", err) + } } if cred, err := buildClientSecretCredential(model, options); err == nil {