0

I'm struggling with CI-CD on Azure DevOps, we had a workflow in which we were able to use Databricks CLI command "databricks repos update" to update our repo in Databricks workspace, but we were using a user personal access token for that, now we want to change it to a service principal token using the "databricks configure --aad-token" command... but now we are getting the following error:

{ 'error_code': 'PERMISSION_DENIED',
'message': 'Invalid Git provider credentials. Go to User Settings > Git '
'Integration to ensure that:\n'
'1. You have entered a username with your Git provider '
'credentials.\n'
'2. You have selected the correct Git provider with your '
'credentials.\n'
'3. Your personal access token or app password has the correct '
'repo access.\n'
'4. Your personal access token has not expired.\n'
'5. If you have SSO enabled with your Git provider, be sure to '
'authorize your token.'}

I tried to use Terraform "databricks_git_credential" resource but I still need a PAT for that:

resource "databricks_git_credential" "ado" {
  git_username          = "myuser"
  git_provider          = "azureDevOpsServices"
  personal_access_token = "sometoken"
}

How can I achieve this? We don't want to use personal access tokens, neither from Databricks nor from Azure DevOps.

jvb
  • 1
  • 1

0 Answers0