snowdensb / microsoft-teams-apps-company-communicator

Company Communicator app template
MIT License
0 stars 0 forks source link

Update dependency Azure.Identity to v1.10.2 - autoclosed #87

Closed mend-for-github-com[bot] closed 8 months ago

mend-for-github-com[bot] commented 10 months ago

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
Azure.Identity (source) 1.3.0 -> 1.10.2 age adoption passing confidence

By merging this PR, the below issues will be automatically resolved and closed:

Severity CVSS Score CVE GitHub Issue
High 8.8 CVE-2023-36414 #-1

Release Notes

Azure/azure-sdk-for-net (Azure.Identity) ### [`v1.10.2`](https://togithub.com/Azure/azure-sdk-for-net/releases/tag/Azure.Identity_1.10.2) ##### 1.10.2 (2023-10-10) ##### Bugs Fixed - Bug fixes for development time credentials. ### [`v1.10.1`](https://togithub.com/Azure/azure-sdk-for-net/releases/tag/Azure.Identity_1.10.1) #### 1.10.1 (2023-09-12) ##### Bugs Fixed - `ManagedIdentityCredential` will fall through to the next credential in the chain in the case that Docker Desktop returns a 403 response when attempting to access the IMDS endpoint. [#​38218](https://togithub.com/Azure/azure-sdk-for-net/issues/38218) - Fixed an issue where interactive credentials would still prompt on the first GetToken request even when the cache is populated and an AuthenticationRecord is provided. [#​38431](https://togithub.com/Azure/azure-sdk-for-net/issues/38431) ### [`v1.10.0`](https://togithub.com/Azure/azure-sdk-for-net/releases/tag/Azure.Identity_1.10.0) #### 1.10.0 (2023-08-14) ##### Features Added - Added `BrowserCustomization` property to `InteractiveBrowserCredential` to enable web view customization for interactive authentication. ##### Bugs Fixed - ManagedIdentityCredential will no longer attempt to parse invalid json payloads on responses from the managed identity endpoint. - Fixed an issue where AzurePowerShellCredential fails to parse the token response from Azure PowerShell. [#​22638](https://togithub.com/Azure/azure-sdk-for-net/issues/22638) ### [`v1.9.0`](https://togithub.com/Azure/azure-sdk-for-net/releases/tag/Azure.Identity_1.9.0) #### 1.9.0 (2023-05-09) ##### Breaking Changes - Changed visibility of all environment variable based properties on `EnvironmentCredentialOptions` to internal. These options are again only configurable via environment variables. ### [`v1.8.2`](https://togithub.com/Azure/azure-sdk-for-net/releases/tag/Azure.Identity_1.8.2) #### 1.8.2 (2023-02-08) ##### Bugs Fixed - Fixed error message parsing in `AzurePowerShellCredential` which would misinterpret AAD errors with the need to install PowerShell. [#​31998](https://togithub.com/Azure/azure-sdk-for-net/issues/31998) - Fix regional endpoint validation error when using `ManagedIdentityCredential`. \[[#​32498](https://togithub.com/Azure/azure-sdk-for-net/issues/32498)])([https://github.com/Azure/azure-sdk-for-net/issues/32498](https://togithub.com/Azure/azure-sdk-for-net/issues/32498)) ### [`v1.8.1`](https://togithub.com/Azure/azure-sdk-for-net/releases/tag/Azure.Identity_1.8.1) #### 1.8.1 (2023-01-13) ##### Bugs Fixed - Fixed an issue when using `ManagedIdentityCredential` in combination with authorities other than Azure public cloud that resulted in a incorrect instance metadata validation error. [#​32498](https://togithub.com/Azure/azure-sdk-for-net/issues/32498) ### [`v1.8.0`](https://togithub.com/Azure/azure-sdk-for-net/releases/tag/Azure.Identity_1.8.0) #### 1.8.0 (2022-11-08) ##### Bugs Fixed - Fixed error message parsing in `AzureCliCredential` which would misinterpret AAD errors with the need to login with `az login`. [#​26894](https://togithub.com/Azure/azure-sdk-for-net/issues/26894), [#​29109](https://togithub.com/Azure/azure-sdk-for-net/issues/29109) - `ManagedIdentityCredential` will no longer fail when a response received from the endpoint is invalid JSON. It now treats this scenario as if the credential is unavailable. [#​30467](https://togithub.com/Azure/azure-sdk-for-net/issues/30467), [#​32061](https://togithub.com/Azure/azure-sdk-for-net/issues/32061) ### [`v1.7.0`](https://togithub.com/Azure/azure-sdk-for-net/releases/tag/Azure.Identity_1.7.0) #### 1.7.0 (2022-09-19) ##### Features Added - Added `AdditionallyAllowedTenants` to the following credential options to force explicit opt-in behavior for multi-tenant authentication: - `AuthorizationCodeCredentialOptions` - `AzureCliCredentialOptions` - `AzurePowerShellCredentialOptions` - `ClientAssertionCredentialOptions` - `ClientCertificateCredentialOptions` - `ClientSecretCredentialOptions` - `DefaultAzureCredentialOptions` - `OnBehalfOfCredentialOptions` - `UsernamePasswordCredentialOptions` - `VisualStudioCodeCredentialOptions` - `VisualStudioCredentialOptions` - Added `TenantId` to `DefaultAzureCredentialOptions` to avoid having to set `InteractiveBrowserTenantId`, `SharedTokenCacheTenantId`, `VisualStudioCodeTenantId`, and `VisualStudioTenantId` individually. ##### Bugs Fixed - Fixed overly restrictive scope validation to allow the '\_' character, for common scopes such as `user_impersonation` [#​30647](https://togithub.com/Azure/azure-sdk-for-net/issues/30647) ##### Breaking Changes - Credential types supporting multi-tenant authentication will now throw `AuthenticationFailedException` if the requested tenant ID doesn't match the credential's tenant ID, and is not included in the `AdditionallyAllowedTenants` option. Applications must now explicitly add additional tenants to the `AdditionallyAllowedTenants` list, or add '\*' to list, to enable acquiring tokens from tenants other than the originally specified tenant ID. See [BREAKING_CHANGES.md](https://togithub.com/Azure/azure-sdk-for-net/blob/main/sdk/identity/Azure.Identity/BREAKING_CHANGES.md#170). - `ManagedIdentityCredential` token caching added in 1.7.0-beta.1 has been removed from this release and will be added back in 1.8.0-beta.1 ### [`v1.6.1`](https://togithub.com/Azure/azure-sdk-for-net/releases/tag/Azure.Identity_1.6.1) #### 1.6.1 (2022-08-08) ##### Bugs Fixed - Fixed `AZURE_REGIONAL_AUTHORITY_NAME` support in `ClientCertificateCredential` [#​29112](https://togithub.com/Azure/azure-sdk-for-net/issues/29112) - Fixed regression in `SharedTokenCacheCredential` default behavior [#​28029](https://togithub.com/Azure/azure-sdk-for-net/issues/28029) - Fixed legacy PowerShell discovery failures [#​28030](https://togithub.com/Azure/azure-sdk-for-net/issues/28030) (A community contribution, courtesy of *[nerddtvg](https://togithub.com/nerddtvg)*) ##### Other Changes - Documentation improvements to `TokenCacheRefreshArgs` and `EnvironmentCredential` (Community contributions, courtesy of *[pmaytak](https://togithub.com/pmaytak)* and *[goenning](https://togithub.com/goenning)*) ##### Acknowledgments Thank you to our developer community members who helped to make Azure Identity better with their contributions to this release: - *[nerddtvg](https://togithub.com/nerddtvg)* - *[pmaytak](https://togithub.com/pmaytak)* - *[goenning](https://togithub.com/goenning)* ### [`v1.6.0`](https://togithub.com/Azure/azure-sdk-for-net/releases/tag/Azure.Identity_1.6.0) #### 1.6.0 (2022-04-05) ##### Features Added - Added a new property under the `Diagnostics` options available on `TokenCredentialOptions` and all sub-types. If set to `true`, we try to log the account identifiers by parsing the received access token. The account identifiers we try to log are the: - Application or Client Identifier - User Principal Name - Tenant Identifier - Object Identifier of the authenticated user or app - `ManagedIdentityCredential` now attempts to use the newest "2019-08-01" api version for App Service Managed Identity sources. The newer API version will be used if the `IDENTITY_ENDPOINT` and `IDENTITY_HEADER` environment variables are set. ##### Bugs Fixed - Fixed an issue where the x5c header is not sent for `OnBehalfOfCredential` when the `SendCertificateChain` option is set. [#​27679](https://togithub.com/Azure/azure-sdk-for-net/issues/27679) ### [`v1.5.0`](https://togithub.com/Azure/azure-sdk-for-net/releases/tag/Azure.Identity_1.5.0) #### 1.5.0 (2021-10-14) ##### Breaking Changes from 1.5.0-beta.4 - The `AllowMultiTenantAuthentication` option has been removed and the default behavior is now as if it were true. The multi-tenant discovery feature can be totally disabled by either setting an `AppContext` switch named "Azure.Identity.DisableTenantDiscovery" to `true` or by setting the environment variable "AZURE_IDENTITY_DISABLE_MULTITENANTAUTH" to "true". - Removed the `IsPIILoggingEnabled` property from `TokenCredentialOptions`, similar functionality is planned to be added to `TokenCredentialOptions.Diagnostics` in a later release. - Removed `RegionalAuthority` from `ClientCertificateCredentialOptions` and `ClientSecretCredentialOptions`, along with the `RegionalAuthority` type. This feature will stay in preview, and these APIs will be added back in `1.6.0-beta.1`. - Renamed struct `TokenCacheDetails` to `TokenCacheData`. - Renamed class `TokenCacheNotificationDetails` to `TokenCacheRefreshArgs`. - Updated `CacheBytes` property on `TokenCacheData` to be readonly and a required constructor parameter. ##### Bugs Fixed - Fixed issue with `AuthorizationCodeCredential` not specifying correct redirectUrl (Issue [#​24183](https://togithub.com/Azure/azure-sdk-for-net/issues/24183)) ##### Other Changes - Updated error messages to include links to the Azure.Identity troubleshooting guide. ### [`v1.4.1`](https://togithub.com/Azure/azure-sdk-for-net/releases/tag/Azure.Identity_1.4.1) #### 1.4.1 (2021-08-04) ##### Fixes and improvements - Fixed issue resulting in duplicate event source names when executing in Azure Functions ### [`v1.4.0`](https://togithub.com/Azure/azure-sdk-for-net/releases/tag/Azure.Identity_1.4.0) #### 1.4.0 (2021-05-12) ##### New Features - By default, the MSAL Public Client Client Capabilities are populated with "CP1" to enable support for [Continuous Access Evaluation (CAE)](https://docs.microsoft.com/azure/active-directory/develop/app-resilience-continuous-access-evaluation). This indicates to AAD that your application is CAE ready and can handle the CAE claim challenge. This capability can be disabled, if necessary, by either setting an `AppContext` switch named "Azure.Identity.DisableCP1" to `true` or by setting the environment variable; "AZURE_IDENTITY_DISABLE_CP1" to "true". Note: AppContext switches can also be configured via configuration like below: ```xml ``` ##### Fixes and improvements - The Microsoft Authentication Library (MSAL) dependency versions have been updated to the latest - Microsoft.Identity.Client version 4.30.1, Microsoft.Identity.Client.Extensions.Msal version 2.18.4.