-
There already is an option to use the path to an .pfx file as input to the This is particularly useful in Azure DevOps when using a Variable Group that connects to an Azure Key Vault and exposes the certificate (as base64 encoded) in a variable. With this new switch, it would allow us to pass in that variable directly without converting it to a local .pfx first (which gets converted back to base64 immediately by CLI anyways). What do you think? Side note: I don't see why it is required to pass in the '--thumbprint' for that certificate (both with --certificateFile en --certificateBase64Encoded). I don't see it being used anywhere in the code of CLI (but I might not have looked good enough). |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 5 replies
-
Thanks for the feedback and this is very helpful. I like the suggestion of us supporting other formats for the certificate. Right now, we have a contributor working on adding support for retrieving them directly from the Windows cert store. Adding support for KeyVault would be another good step, especially in combination with managed identity which would allow you to have 0 credentials anywhere in the pipeline. Would you mind creating an issue with a feature request to add support for As for the thumbprint, we need to retrieve the token using cert via ADAL: Line 329 in ac891a4 |
Beta Was this translation helpful? Give feedback.
-
I'll create the feature request for certificateBase64Encoded! I don't really need Key Vault support as that is already baked into Azure DevOps pipelines: you can create a Variable Group, connect it to a Key Vault and your secrets and certificates turn into pipeline variables. The certificates come in base64Encoded format, that's why I'd like CLI to take that as an input. I do get it from an Azure Cloud Shell perspective in combo with Managed Identities, as you'd be able to leverage the managed identity to connect to Key Vault and fetch the secret/certificate that way. It could potentially require more parameters tho: the Key Vault, which secret or certificate, etc. |
Beta Was this translation helpful? Give feedback.
I'll create the feature request for certificateBase64Encoded! I don't really need Key Vault support as that is already baked into Azure DevOps pipelines: you can create a Variable Group, connect it to a Key Vault and your secrets and certificates turn into pipeline variables. The certificates come in base64Encoded format, that's why I'd like CLI to take that as an input.
I do get it from an Azure Cloud Shell perspective in combo with Managed Identities, as you'd be able to leverage the managed identity to connect to Key Vault and fetch the secret/certificate that way. It could potentially require more parameters tho: the Key Vault, which secret or certificate, etc.
Not something I can see…