Skip to content

Conversation

@damonbarry
Copy link
Member

We create a temporary storage account for use by an Azure Function in the scheduled and manual end-to-end tests. Per best practices, we want to create it with shared key access disabled. This change updates the Azure CLI command that creates the storage account.

@damonbarry damonbarry requested a review from nlcamp June 17, 2024 21:24
arsing
arsing previously approved these changes Jun 17, 2024
@damonbarry
Copy link
Member Author

damonbarry commented Jun 18, 2024

Disabling shared key access on the storage account breaks the Azure Functions app we deploy to host a DPS custom allocation policy.

There is apparently a way to run the Azure Functions app with storage keys disabled (using an identity), but it seems to require a labrynth of settings and workarounds. It may take some time to get this all sorted out.

@damonbarry damonbarry dismissed arsing’s stale review June 18, 2024 18:46

I've added lots of code since this approval, and there's more work to do

@damonbarry damonbarry marked this pull request as draft June 18, 2024 18:47
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants