Hello community,

here is the log from the commit of package python-adal for openSUSE:Factory 
checked in at 2020-11-29 12:25:57
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/python-adal (Old)
 and      /work/SRC/openSUSE:Factory/.python-adal.new.5913 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "python-adal"

Sun Nov 29 12:25:57 2020 rev:8 rq:850507 version:1.2.5

Changes:
--------
--- /work/SRC/openSUSE:Factory/python-adal/python-adal.changes  2020-06-26 
21:44:51.901719995 +0200
+++ /work/SRC/openSUSE:Factory/.python-adal.new.5913/python-adal.changes        
2020-11-29 12:26:06.957861855 +0100
@@ -1,0 +2,9 @@
+Fri Nov 20 11:59:56 UTC 2020 - John Paul Adrian Glaubitz 
<[email protected]>
+
+- New upstream release
+  + Version 1.2.5
+  + For detailed information about changes see the
+    HISTORY.txt file provided with this package
+- Update HISTORY.txt from github releases page
+
+-------------------------------------------------------------------

Old:
----
  adal-1.2.4.tar.gz

New:
----
  adal-1.2.5.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ python-adal.spec ++++++
--- /var/tmp/diff_new_pack.OLa4CN/_old  2020-11-29 12:26:07.353862255 +0100
+++ /var/tmp/diff_new_pack.OLa4CN/_new  2020-11-29 12:26:07.357862259 +0100
@@ -18,7 +18,7 @@
 
 %{?!python_module:%define python_module() python-%{**} python3-%{**}}
 Name:           python-adal
-Version:        1.2.4
+Version:        1.2.5
 Release:        0
 Summary:        Azure Active Directory library
 License:        MIT

++++++ HISTORY.txt ++++++
--- /var/tmp/diff_new_pack.OLa4CN/_old  2020-11-29 12:26:07.385862287 +0100
+++ /var/tmp/diff_new_pack.OLa4CN/_new  2020-11-29 12:26:07.385862287 +0100
@@ -1,3 +1,8 @@
+ADAL Python 1.2.5
+
+    Bugfix to address error "InvalidScope : FaultMessage: ID3082: The request 
scope is not valid or is unsupported." when using
+    username-password flow with federated user account while your tenant is 
migrating to a different cloud. (#240)
+
 ADAL Python 1.2.4
 
     Update project metadata on PyPI (#231 )

++++++ adal-1.2.4.tar.gz -> adal-1.2.5.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/adal-1.2.4/PKG-INFO new/adal-1.2.5/PKG-INFO
--- old/adal-1.2.4/PKG-INFO     2020-06-06 01:33:43.000000000 +0200
+++ new/adal-1.2.5/PKG-INFO     2020-10-21 22:28:52.000000000 +0200
@@ -1,6 +1,6 @@
 Metadata-Version: 2.1
 Name: adal
-Version: 1.2.4
+Version: 1.2.5
 Summary: Note: This library is already replaced by MSAL Python, available 
here: https://pypi.org/project/msal/ .ADAL Python remains available here as a 
legacy. The ADAL for Python library makes it easy for python application to 
authenticate to Azure Active Directory (AAD) in order to access AAD protected 
web resources.
 Home-page: https://github.com/AzureAD/azure-activedirectory-library-for-python
 Author: Microsoft Corporation
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/adal-1.2.4/adal/__init__.py 
new/adal-1.2.5/adal/__init__.py
--- old/adal-1.2.4/adal/__init__.py     2020-06-06 01:33:22.000000000 +0200
+++ new/adal-1.2.5/adal/__init__.py     2020-10-21 22:28:29.000000000 +0200
@@ -27,7 +27,7 @@
 
 # pylint: disable=wrong-import-position
 
-__version__ = '1.2.4'
+__version__ = '1.2.5'
 
 import logging
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/adal-1.2.4/adal/token_request.py 
new/adal-1.2.5/adal/token_request.py
--- old/adal-1.2.4/adal/token_request.py        2020-06-06 01:33:22.000000000 
+0200
+++ new/adal-1.2.5/adal/token_request.py        2020-10-21 22:28:29.000000000 
+0200
@@ -190,9 +190,9 @@
 
         return self._oauth_get_token(oauth_parameters)
 
-    def _perform_wstrust_exchange(self, wstrust_endpoint, 
wstrust_endpoint_version, username, password):
+    def _perform_wstrust_exchange(self, wstrust_endpoint, 
wstrust_endpoint_version, cloud_audience_urn, username, password):
 
-        wstrust = self._create_wstrust_request(wstrust_endpoint, 
"urn:federation:MicrosoftOnline",
+        wstrust = self._create_wstrust_request(wstrust_endpoint, 
cloud_audience_urn,
                                                wstrust_endpoint_version)
         result = wstrust.acquire_token(username, password)
 
@@ -204,15 +204,16 @@
 
         return result
 
-    def _perform_username_password_for_access_token_exchange(self, 
wstrust_endpoint, wstrust_endpoint_version,
+    def _perform_username_password_for_access_token_exchange(self, 
wstrust_endpoint, wstrust_endpoint_version, cloud_audience_urn,
                                                              username, 
password):
-        wstrust_response = self._perform_wstrust_exchange(wstrust_endpoint, 
wstrust_endpoint_version,
+        wstrust_response = self._perform_wstrust_exchange(wstrust_endpoint, 
wstrust_endpoint_version, cloud_audience_urn,
                                                           username, password)
         return self._perform_wstrust_assertion_oauth_exchange(wstrust_response)
 
     def _get_token_username_password_federated(self, username, password):
         self._log.debug("Acquiring token with username password for federated 
user")
 
+        cloud_audience_urn = self._user_realm.cloud_audience_urn
         if not self._user_realm.federation_metadata_url:
             self._log.warn("Unable to retrieve federationMetadataUrl from AAD. 
"
                            "Attempting fallback to AAD supplied endpoint.")
@@ -228,7 +229,7 @@
 
             return self._perform_username_password_for_access_token_exchange(
                 self._user_realm.federation_active_auth_url,
-                wstrust_version, username, password)
+                wstrust_version, cloud_audience_urn, username, password)
         else:
             mex_endpoint = self._user_realm.federation_metadata_url
             self._log.debug(
@@ -253,6 +254,7 @@
                     raise AdalError('AAD did not return a WSTrust endpoint. 
Unable to proceed.')
 
             return 
self._perform_username_password_for_access_token_exchange(wstrust_endpoint, 
wstrust_version,
+                                                                             
cloud_audience_urn,
                                                                              
username, password)
     @staticmethod
     def 
_parse_wstrust_version_from_federation_active_authurl(federation_active_authurl):
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/adal-1.2.4/adal/user_realm.py 
new/adal-1.2.5/adal/user_realm.py
--- old/adal-1.2.4/adal/user_realm.py   2020-06-06 01:33:22.000000000 +0200
+++ new/adal-1.2.5/adal/user_realm.py   2020-10-21 22:28:29.000000000 +0200
@@ -57,6 +57,7 @@
         self.account_type = None
         self.federation_metadata_url = None
         self.federation_active_auth_url = None
+        self.cloud_audience_urn = None
         self._user_principle = user_principle
         self._authority_url = authority_url
 
@@ -131,6 +132,7 @@
             self.federation_protocol = protocol
             self.federation_metadata_url = response['federation_metadata_url']
             self.federation_active_auth_url = 
response['federation_active_auth_url']
+            self.cloud_audience_urn = response.get('cloud_audience_urn', 
"urn:federation:MicrosoftOnline")
 
         self._log_parsed_response()
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/adal-1.2.4/adal/wstrust_request.py 
new/adal-1.2.5/adal/wstrust_request.py
--- old/adal-1.2.4/adal/wstrust_request.py      2020-06-06 01:33:22.000000000 
+0200
+++ new/adal-1.2.5/adal/wstrust_request.py      2020-10-21 22:28:29.000000000 
+0200
@@ -41,10 +41,10 @@
 
 class WSTrustRequest(object):
 
-    def __init__(self, call_context, watrust_endpoint_url, applies_to, 
wstrust_endpoint_version):
+    def __init__(self, call_context, wstrust_endpoint_url, applies_to, 
wstrust_endpoint_version):
         self._log = log.Logger('WSTrustRequest', call_context['log_context'])
         self._call_context = call_context
-        self._wstrust_endpoint_url = watrust_endpoint_url
+        self._wstrust_endpoint_url = wstrust_endpoint_url
         self._applies_to = applies_to
         self._wstrust_endpoint_version = wstrust_endpoint_version
         
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/adal-1.2.4/adal.egg-info/PKG-INFO 
new/adal-1.2.5/adal.egg-info/PKG-INFO
--- old/adal-1.2.4/adal.egg-info/PKG-INFO       2020-06-06 01:33:43.000000000 
+0200
+++ new/adal-1.2.5/adal.egg-info/PKG-INFO       2020-10-21 22:28:52.000000000 
+0200
@@ -1,6 +1,6 @@
 Metadata-Version: 2.1
 Name: adal
-Version: 1.2.4
+Version: 1.2.5
 Summary: Note: This library is already replaced by MSAL Python, available 
here: https://pypi.org/project/msal/ .ADAL Python remains available here as a 
legacy. The ADAL for Python library makes it easy for python application to 
authenticate to Azure Active Directory (AAD) in order to access AAD protected 
web resources.
 Home-page: https://github.com/AzureAD/azure-activedirectory-library-for-python
 Author: Microsoft Corporation
_______________________________________________
openSUSE Commits mailing list -- [email protected]
To unsubscribe, email [email protected]
List Netiquette: https://en.opensuse.org/openSUSE:Mailing_list_netiquette
List Archives: 
https://lists.opensuse.org/archives/list/[email protected]

Reply via email to