Sourced from azure-core's\nreleases.
\n\n\nazure-core_1.30.2
\n1.30.2 (2024-06-06)
\nFeatures Added
\n\n
\n- Tracing:
\nDistributedTracingPolicy
will now set an\nattribute,http.request.resend_count
, on HTTP spans for\nresent requests to indicate the resend attempt number. #35069Bugs Fixed
\n\n
\n- Raise correct exception if transport is used while already closed #35559
\nOther Changes
\n\n
\n- HTTP tracing spans will now include an
\nerror.type
\nattribute if an error status code is returned. #34619- Minimum required Python version is now 3.8
\n
d0fcdff
\nUpdate changelog (#35929)70db3d9
\nMore explicit error message if transport is already closed (#35559)ccd0bc2
\n[corehttp] Linting updates (#35840)719362c
\nFix pylint error (#35818)b919725
\n[Core] Pylint Next Fixes (#35765)406d463
\n[Core] Add new attribute to resent HTTP request spans (#35069)9cd3267
\nMove azure-core to 3.8+ (#35622)a61a8e2
\n[CI] Test updates for central sanitizers (#35385)7734b1c
\n[Core] Update API ref link in README (#35503)bba0c81
\n[Core][Corehttp] Fix stream tests (#35433)Sourced from azure-core's\nreleases.
\n\n\nazure-core_1.30.2
\n1.30.2 (2024-06-06)
\nFeatures Added
\n\n
\n- Tracing:
\nDistributedTracingPolicy
will now set an\nattribute,http.request.resend_count
, on HTTP spans for\nresent requests to indicate the resend attempt number. #35069Bugs Fixed
\n\n
\n- Raise correct exception if transport is used while already closed #35559
\nOther Changes
\n\n
\n- HTTP tracing spans will now include an
\nerror.type
\nattribute if an error status code is returned. #34619- Minimum required Python version is now 3.8
\n
d0fcdff
\nUpdate changelog (#35929)70db3d9
\nMore explicit error message if transport is already closed (#35559)ccd0bc2
\n[corehttp] Linting updates (#35840)719362c
\nFix pylint error (#35818)b919725
\n[Core] Pylint Next Fixes (#35765)406d463
\n[Core] Add new attribute to resent HTTP request spans (#35069)9cd3267
\nMove azure-core to 3.8+ (#35622)a61a8e2
\n[CI] Test updates for central sanitizers (#35385)7734b1c
\n[Core] Update API ref link in README (#35503)bba0c81
\n[Core][Corehttp] Fix stream tests (#35433)Sourced from authlib's\nreleases.
\n\n\nVersion 1.3.1
\nPrevent
\nOctKey
to import ssh and PEM strings.
Sourced from authlib's\nchangelog.
\n\n\nVersion 1.3.1
\nReleased on June 4, 2024
\n\n
\n- Prevent
\nOctKey
to import ssh and PEM strings.
df226ab
\nchore: release 1.3.13bea812
\nfix: prevent OctKey to import ssh/rsa/pem keysSourced from authlib's\nreleases.
\n\n\nVersion 1.3.1
\nPrevent
\nOctKey
to import ssh and PEM strings.
Sourced from authlib's\nchangelog.
\n\n\nVersion 1.3.1
\nReleased on June 4, 2024
\n\n
\n- Prevent
\nOctKey
to import ssh and PEM strings.
df226ab
\nchore: release 1.3.13bea812
\nfix: prevent OctKey to import ssh/rsa/pem keysSourced from Azure.Identity's\nreleases.
\n\n\nAzure.Identity_1.11.4
\n1.11.4 (2024-06-10)
\nBugs Fixed
\n\n
\n- Managed identity bug fixes
\n
2856f9a
\nchangelog update7267469
\nUpdate azure-sdk-build-tools Repository Resource Refs in Yaml files (#43311)2db9a0f
\nAzureArcManagedIdentitySource fixSourced from Microsoft.Identity.Client's\nreleases.
\n\n\n4.61.3
\nBug Fixes
\n\n
\n- Exclude the use of WSTrust for ROPC flow except for AAD authorities.\nSee [Issue #4791](AzureAD/microsoft-authentication-library-for-dotnet#4791)
\n4.61.2
\nBug Fixes
\n\n
\n- Fixed a regression in MSAL 4.61.1 where Proof of Possession (POP)\nextensibility API was made available for all the confidential client\nscenarios caused runtime exception for users using higher level SDKs\nwith explicit dependency on MSAL. See 4789
\n- Measurement of duration in milliseconds is now consistent across all\nplatforms. See 4784
\n4.61.1
\nNew Features
\n\n
\n- Enabled Proof of Possession (POP) extensibility API for all\nconfidential client requests, enhancing security measures for\nconfidential clients. See 4757
\n- Introduced a public API that identifies and returns the current\nAzure environment for Managed Identity. See 4751
\n- Deprecated the WithClientAssertion(string) method. Developers are\nencouraged to use the overload with Func\ninstead, which ensures the return of a non-expired assertion,\npotentially including a Federated Credential. See 4775
\n- Adding support for Non-GUID Client IDs with AuthorityType.Generic\nSee #4686
\nBug Fixes
\n\n
\n- Improved logic to handle ADFS tokens that include a manually added\ntid claim, preventing exceptions. See 4608
\n- Improved build-time validation to ensure that applications using the\nWithBroker(true) method will fail at build time if the application\ntargets net6-windows and uses an old broker API. This change prevents\nruntime failures and facilitates early detection of issues. See 4768
\n- Fixed token acquisition failure in broker based flow when authority\nis common. See 4696
\n
Sourced from Microsoft.Identity.Client's\nchangelog.
\n\n\n4.61.3
\nBug Fixes
\n\n
\n- Exclude the use of WSTrust for ROPC flow except for AAD authorities.\nSee [Issue #4791](AzureAD/microsoft-authentication-library-for-dotnet#4791)
\n4.61.2
\nBug Fixes
\n\n
\n- Fixed a regression in MSAL 4.61.1 where the Proof of Possession\n(POP) extensibility API, when made available for all confidential client\nscenarios, caused a runtime exception for users of higher-level SDKs\nthat have an explicit dependency on MSAL. See [Issue #4789](AzureAD/microsoft-authentication-library-for-dotnet#4789).
\n- Ensured that the measurement of duration in milliseconds is now\nconsistent across all platforms. See [Issue #4784](AzureAD/microsoft-authentication-library-for-dotnet#4784).
\n4.61.1
\nNew Features
\n\n
\n- Enabled Proof of Possession (POP) extensibility API for all\nconfidential client requests, enhancing security measures for\nconfidential clients. See 4757
\n- Introduced a public API that identifies and returns the current\nAzure environment for Managed Identity. See 4751
\n- Deprecated the WithClientAssertion(string) method. Developers are\nencouraged to use the overload with Func\ninstead, which ensures the return of a non-expired assertion,\npotentially including a Federated Credential. See 4775
\n- Adding support for Non-GUID Client IDs with AuthorityType.Generic\nSee #4686
\nBug Fixes
\n\n
\n- Improved logic to handle ADFS tokens that include a manually added\ntid claim, preventing exceptions. See 4608
\n- Improved build-time validation to ensure that applications using the\nWithBroker(true) method will fail at build time if the application\ntargets net6-windows and uses an old broker API. This change prevents\nruntime failures and facilitates early detection of issues. See 4768
\n- Fixed token acquisition failure in broker based flow when authority\nis common. See 4696
\n
08675d0
\nUpdate CHANGELOG.md (#4800)88df640
\nFix for #4791\n- don't use WSTrust for ROPC except for AAD authorities (#4794)3f5f9df
\nUpdate8a6fe48
\nUpdate AzureArcManagedIdentitySource.cs61a89f7
\nUpdate extfddb2c4
\nUpdate as discussedd2201cf
\nChangelog for 4.61.2 (#4795)449251d
\nRequired feature update5c6f22f
\nFix TypeLoadException (#4792)239d9d6
\nMeasureDurationResult incorrect when running in linux (#4785)Sourced from Azure.Identity's\nreleases.
\n\n\nAzure.Identity_1.11.4
\n1.11.4 (2024-06-10)
\nBugs Fixed
\n\n
\n- Managed identity bug fixes
\n
2856f9a
\nchangelog update7267469
\nUpdate azure-sdk-build-tools Repository Resource Refs in Yaml files (#43311)2db9a0f
\nAzureArcManagedIdentitySource fixSourced from Microsoft.Identity.Client's\nreleases.
\n\n\n4.61.3
\nBug Fixes
\n\n
\n- Exclude the use of WSTrust for ROPC flow except for AAD authorities.\nSee [Issue #4791](AzureAD/microsoft-authentication-library-for-dotnet#4791)
\n4.61.2
\nBug Fixes
\n\n
\n- Fixed a regression in MSAL 4.61.1 where Proof of Possession (POP)\nextensibility API was made available for all the confidential client\nscenarios caused runtime exception for users using higher level SDKs\nwith explicit dependency on MSAL. See 4789
\n- Measurement of duration in milliseconds is now consistent across all\nplatforms. See 4784
\n4.61.1
\nNew Features
\n\n
\n- Enabled Proof of Possession (POP) extensibility API for all\nconfidential client requests, enhancing security measures for\nconfidential clients. See 4757
\n- Introduced a public API that identifies and returns the current\nAzure environment for Managed Identity. See 4751
\n- Deprecated the WithClientAssertion(string) method. Developers are\nencouraged to use the overload with Func\ninstead, which ensures the return of a non-expired assertion,\npotentially including a Federated Credential. See 4775
\n- Adding support for Non-GUID Client IDs with AuthorityType.Generic\nSee #4686
\nBug Fixes
\n\n
\n- Improved logic to handle ADFS tokens that include a manually added\ntid claim, preventing exceptions. See 4608
\n- Improved build-time validation to ensure that applications using the\nWithBroker(true) method will fail at build time if the application\ntargets net6-windows and uses an old broker API. This change prevents\nruntime failures and facilitates early detection of issues. See 4768
\n- Fixed token acquisition failure in broker based flow when authority\nis common. See 4696
\n
Sourced from Microsoft.Identity.Client's\nchangelog.
\n\n\n4.61.3
\nBug Fixes
\n\n
\n- Exclude the use of WSTrust for ROPC flow except for AAD authorities.\nSee [Issue #4791](AzureAD/microsoft-authentication-library-for-dotnet#4791)
\n4.61.2
\nBug Fixes
\n\n
\n- Fixed a regression in MSAL 4.61.1 where the Proof of Possession\n(POP) extensibility API, when made available for all confidential client\nscenarios, caused a runtime exception for users of higher-level SDKs\nthat have an explicit dependency on MSAL. See [Issue #4789](AzureAD/microsoft-authentication-library-for-dotnet#4789).
\n- Ensured that the measurement of duration in milliseconds is now\nconsistent across all platforms. See [Issue #4784](AzureAD/microsoft-authentication-library-for-dotnet#4784).
\n4.61.1
\nNew Features
\n\n
\n- Enabled Proof of Possession (POP) extensibility API for all\nconfidential client requests, enhancing security measures for\nconfidential clients. See 4757
\n- Introduced a public API that identifies and returns the current\nAzure environment for Managed Identity. See 4751
\n- Deprecated the WithClientAssertion(string) method. Developers are\nencouraged to use the overload with Func\ninstead, which ensures the return of a non-expired assertion,\npotentially including a Federated Credential. See 4775
\n- Adding support for Non-GUID Client IDs with AuthorityType.Generic\nSee #4686
\nBug Fixes
\n\n
\n- Improved logic to handle ADFS tokens that include a manually added\ntid claim, preventing exceptions. See 4608
\n- Improved build-time validation to ensure that applications using the\nWithBroker(true) method will fail at build time if the application\ntargets net6-windows and uses an old broker API. This change prevents\nruntime failures and facilitates early detection of issues. See 4768
\n- Fixed token acquisition failure in broker based flow when authority\nis common. See 4696
\n
08675d0
\nUpdate CHANGELOG.md (#4800)88df640
\nFix for #4791\n- don't use WSTrust for ROPC except for AAD authorities (#4794)3f5f9df
\nUpdate8a6fe48
\nUpdate AzureArcManagedIdentitySource.cs61a89f7
\nUpdate extfddb2c4
\nUpdate as discussedd2201cf
\nChangelog for 4.61.2 (#4795)449251d
\nRequired feature update5c6f22f
\nFix TypeLoadException (#4792)239d9d6
\nMeasureDurationResult incorrect when running in linux (#4785)