Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update dependency msal to v1.31.1 #7

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Jun 20, 2024

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
msal (changelog) 1.18.0 -> 1.31.1 age adoption passing confidence

Release Notes

AzureAD/microsoft-authentication-library-for-python (msal)

v1.31.1

Compare Source

  • Bugfix: The Managed Identity detection logic on Arc (#​731) had a bug #​762, now fixed in PR #​763 

Full Changelog: AzureAD/microsoft-authentication-library-for-python@1.31.0...1.31.1

v1.31.0

Compare Source

What's Changed

Full Changelog: AzureAD/microsoft-authentication-library-for-python@1.30.0...1.31.0

v1.30.0

Compare Source

What's Changed

Full Changelog: AzureAD/microsoft-authentication-library-for-python@1.29.0...1.30.0

v1.29.0: MSAL Python 1.29.0

Compare Source

What's Changed

  • New feature: Supports Managed Identity for Azure VM, App Service (including Azure Functions, Azure Automation), Service Fabric, Azure Machine Learning, Arc, etc.. Comes with a sample, its configuration via ENV VAR, and its API documentation. (#​58, #​480, #​634, #​674)
  • New feature: Support reading ConfidentialClientApplication's cert from a pfx file (#​684, #​699)
  • New feature: TokenCache class has a new search() method which will return a generator of tokens. The old find() method still exists and returns a list, but MSAL 1.27+ will not call find() anymore. (#​693, #​644)
  • Change: Re-enable the username password flow to go through broker, if available. (#​712)

New Contributors

Full Changelog: AzureAD/microsoft-authentication-library-for-python@1.28.1...1.29.0

v1.28.1: MSAL Python 1.28.1

Compare Source

  • Change: pip install msal[broker] will now pick up the latest PyMsalRuntime 0.16.x which contains a bugfix for being run as administrator. This release fixes #​707.

v1.28.0: MSAL Python 1.28.0

Compare Source

  • New feature: PublicClientApplication and ConfidentialClientApplication have a new oidc_authority parameter that can be used to specify authority of any generic OpenID Connect authority, typically the customized domain for CIAM. (#​676, #​678)
  • Dropping Python 2.7

v1.27.0: MSAL Python 1.27.0

Compare Source

What's Changed

Release Notes:

  • New feature: remove_tokens_for_client() will remove tokens acquired by acquire_token_for_client() (#​640, #​650, #​666)
  • Performance: Throughput of token-cache-hit happy path is roughly 2x faster (#​644)
  • Adjustment: MSAL no longer attempts to validate an ID token's time (#​656, #​657)
  • Adjustment: Bump upstream broker dependency to 0.14.x
  • Improvement: Better chance to remove accounts from broker (#​651)
  • Improvement: Cleaner console output when the http local server is visited in https protocol (#​546)
  • Improvement: Reduce a bare except clause (#​667)

Note:

  • The previous preview features in previous 1.27.0b2 requires more beta testing, so they did NOT make it to 1.27.0. If you want to beta test 1.27.0b2, follow its own instruction.
  • MSAL Python 1.27 is the last version that still runs on Python 2.7

New Contributors

Full Changelog: AzureAD/microsoft-authentication-library-for-python@1.26.0...1.27.0

v1.26.0: MSAL Python 1.26.0

Compare Source

  • Do not auto-detect region if app developer does not opt-in to region (#​629, #​630)
  • Support Proof-of-Possession (PoP) for Public Client based on broker (#​511)

v1.25.0: MSAL Python 1.25.0

Compare Source

  • Deprecation: allow_broker will be replaced by enable_broker_on_windows (#​613)
  • Bugfix: Device Code Flow (and Username Password Flow) and its subsequent silent request will automatically bypass broker and succeed. (#​569)
  • Enhancement: acquire_token_interactive() supports running inside Docker
  • Observability: Successful token response will contain a new token_source field to indicate where the token was obtained from: identity_provider, cache or broker. (#​610)

v1.24.1: MSAL Python 1.24.1

Compare Source

Includes minor adjustments on handling acquire_token_interactive(). The scope of the issue being addressed was limited to a short-lived sign-in attempt. The potential misuse vector complexity was high, therefore it is unlikely to be reproduced in standard usage scenarios; however, out of abundance of caution, this fix is shipped to align ourselves with Microsoft's policy of secure-by-default.

v1.24.0: MSAL Python 1.24.0

Compare Source

  • Enhancement: There may be a new msal_telemetry key available in MSAL's acquire token response, currently observed when broker is enabled. Its content and format are opaque to caller. This telemetry blob allows participating apps to collect them via telemetry, and it may help future troubleshooting. (#​575)
  • Enhancement: A new enable_pii_log parameter is added into ClientApplication constructor. When enabled, the broker component may include PII (Personal Identifiable Information) in logs. This may help troubleshooting. (#​568, #​590)

v1.23.0: MSAL Python 1.23.0

Compare Source

Improvements:

  • acquire_token_for_client() will automatically look up tokens from cache (#​577). (But all other acquire_token_...() methods still require an explicit acquire_token_silent() in order to utilize token cache.)

v1.22.0: MSAL Python 1.22.0

Compare Source

New feature:

  • Support CIAM authorities in the form of "tenant.ciamlogin.com/*" (#​520)

Known issue:
The following issues were discovered after this version's release: #​563

v1.21.0: MSAL Python 1.21.0

Compare Source

The API in this new version remains the same as the previous version.

Enhancements:

  • Support getting an ssh certificate via broker (#​515)
  • Support B2C's usage pattern of using client id as a scope (#​505, #​530)
  • MSAL's token cache helper can now be used to store tokens returned by App Service's Managed Identity (#​519)
  • Switch to a new set of regional endpoints (#​513)
  • Test matrix covers Python 3.11 (#​512)

Known issue:
The following issues were discovered after this version's release: #​563

v1.20.0: MSAL Python 1.20.0

Compare Source

New feature:

If your app uses MSAL's acquire_token_interactive(), you can now opt in to use broker on Windows platform to achieve Single-Sign-On (SSO) and also obtain more secure tokens, all without switching the log-in experience to a browser. See details in this online doc, and try it out from this sample. (#​451, #​415)

For example, after utilizing this new feature, a command-line (CLI) app's login experience would look like this:
Azure CLI new login

Known issue:

The following issues were discovered after this version's release: #​563

v1.19.0: MSAL Python 1.19.0

Compare Source

  • New feature: A new ClientApplication(..., instance_discovery=False) parameter to turn off MSAL's Instance Discovery behavior. See more details in its full documentation. Also, ADFS authority will no longer trigger Instance Discovery. (#​496)
  • Enhancement: Use provided authority port when building the tenant discovery endpoint (#​484)
  • Bugfix: Fix a regression in regional endpoint which affects MSAL Python 1.14+ (#​485)
  • Enhancement: Tolerate home_account_id to be None

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot force-pushed the renovate/msal-1.x-lockfile branch from 1d16eaf to c1a316d Compare June 22, 2024 04:28
@renovate renovate bot changed the title Update dependency msal to v1.28.1 Update dependency msal to v1.29.0 Jun 22, 2024
@renovate renovate bot force-pushed the renovate/msal-1.x-lockfile branch from c1a316d to 6d19dcc Compare July 17, 2024 05:37
@renovate renovate bot changed the title Update dependency msal to v1.29.0 Update dependency msal to v1.30.0 Jul 17, 2024
@renovate renovate bot force-pushed the renovate/msal-1.x-lockfile branch from 6d19dcc to 4075318 Compare September 6, 2024 22:52
@renovate renovate bot changed the title Update dependency msal to v1.30.0 Update dependency msal to v1.31.0 Sep 6, 2024
@renovate renovate bot force-pushed the renovate/msal-1.x-lockfile branch from 4075318 to 9aac2d5 Compare November 18, 2024 10:48
@renovate renovate bot changed the title Update dependency msal to v1.31.0 Update dependency msal to v1.31.1 Nov 18, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants