-
Notifications
You must be signed in to change notification settings - Fork 4.8k
[source-mssql] Azure Entra authentication #61547
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
@vpipkt is attempting to deploy a commit to the Airbyte Growth Team on Vercel. A member of the Team first needs to authorize it. |
👋 Welcome to Airbyte!Thank you for your contribution from vpipkt/airbyte! We're excited to have you in the Airbyte community. Helpful Resources
PR Slash CommandsAs needed or by request, Airbyte Maintainers can execute the following slash commands on your PR:
If you have any questions, feel free to ask in the PR comments or join our Slack community. Tips for Working with CI
|
I re-ran the unit tests locally and I had some similar but not exactly overlapping failures. On re-run I see all tests passing. Any other contributors on this have experience with flaky tests? |
/run-connector-tests
|
Hi @vpipkt do you mind posting a screenshot or something to show the new auth is working? Then I have no problem to merge this change |
Based on my build of the latest commit ![]() |
/run-connector-tests
|
/run-connector-tests
|
@burakku I'm seeing a unit test failure. Ran it twice and got a different failure each time. I suspect it is unrelated to the change in this PR. Can you advise on whether you'd like me to go ahead and merge this or wait until we can get the tests to pass. |
@cgardens ditto.. i noticed some flaky failures also #61547 (comment) |
@burakku thank you so much |
What
Allow Azure Entra authentication to SQL Server databases in this
Fix #20866
How
simply add the appropriate azure identity library for the JDBC driver version
Review guide
User Impact
enables Azure Entra (AD) authentication for MSSQL. Should be no negative side effects.
Can this PR be safely reverted and rolled back?