Skip to content

MSAL Python 1.24.0 #592

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 33 commits into from
Sep 12, 2023
Merged

MSAL Python 1.24.0 #592

merged 33 commits into from
Sep 12, 2023

Conversation

rayluo
Copy link
Collaborator

@rayluo rayluo commented Sep 8, 2023

rayluo and others added 30 commits July 22, 2023 10:27
Remove wam_telemetry, for now
Use a neutral name to hopefully avoid false alarm
Surface msal telemetry as a long opaque string. It was already shipped as 1.24.0b1 and adopted by Azure CLI 2.51. Now merging it back to dev, so that it will be in next stable release.
Fix typo in test names (warnning → warning)
Add enable_pii_log and wire it up with MsalRuntime
Turns out we do not really need a full-blown Timeable class

Refactor to use pytest and pytest-benchmark

Calibrate ratios

Adjust detection calculation

Experimenting different reference workload

Add more iterations to quick test cases

Tune reference and each test case to be in tenth of second

Go with fewer loop in hoping for more stable time

Relax threshold to 20%

One more run

Use 40% threshold

Use larger threshold 0.4 * 3

Refactor to potentially use PyPerf

Automatically choose the right number and repeat

Remove local regression detection, for now
Experimenting not using GPO

Use vanilla git command to publish

Do not run benchmark in matrix

Skip chatty test case discovery during benchmark
Guarding against perf regression for acquire_token_for_client()
This way, it will remain visible even if it is rendered on web.

The choice of curly brackets is influenced by URL Template RFC 6570.
@rayluo rayluo force-pushed the release-1.24.0 branch 6 times, most recently from e277f12 to f894fb7 Compare September 11, 2023 20:14
Copy link
Contributor

@pvaneck pvaneck left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ran this through the Python Azure-Identity SDK tests, and no issues. 👍

@rayluo rayluo marked this pull request as ready for review September 12, 2023 16:34
@rayluo rayluo merged commit edb6c0b into main Sep 12, 2023
@rayluo rayluo deleted the release-1.24.0 branch September 12, 2023 16:46
Comment on lines +219 to +220
The thumbprint is available in your app's registration in Azure Portal.
Alternatively, you can `calculate the thumbprint <https://github.com/Azure/azure-sdk-for-python/blob/07d10639d7e47f4852eaeb74aef5d569db499d6e/sdk/identity/azure-identity/azure/identity/_credentials/certificate.py#L94-L97>`_.
Copy link
Contributor

@jiasli jiasli Jul 23, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link
Collaborator Author

@rayluo rayluo Jul 23, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for your investigation!

Back then, we did not mean to "rely on a downstream library's code"; we just repurpose a code snippet which happens to be inside a downstream library.

Feel free to create a PR for the fix, preferably based on openssl command lines.

By the way, recent versions of MSAL started to support .pfx format and automatically calculate the thumbprint.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

By the way, recent versions of MSAL started to support .pfx format and automatically calculate the thumbprint.

Maybe MSAL can also automatically calculate the thumbprint of a PEM certificate?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants