Fixes issue using AAD credentials with EventHubs. #6835
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
I've discovered what I think is an error in the scope value that the EventHubs client is passing to token providers when it requests a token. This incorrect value affects AAD-based credential types such as
ClientSecretCredential
andManagedIdentityCredential
. I didn't test the later but I'm pretty confident it'll stop any AAD based credential from working with EventHubs - so I think we probably need to ship an update to the EventHubs library.I verified that the capitalization of
Azure
was the issue in the scope value by creating a man-in-the-middle token provider which substituted the scopes when fetching a token to compensate for the error. If you want a repro here you go:I also removed the (what I think) is a redundant backslash).