-
Notifications
You must be signed in to change notification settings - Fork 203
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Feature Request] deprecate data
out of kwargs
and make SSHCertificate functionality public.
#755
Comments
data
out of kwargs
and make it publicdata
out of kwargs
and make SSHCertificate functionality public.
Consider it another way: Since MSAL.NET has made getting SSH certificate a public interface via 3 years ago, when Azure CLI was migrated to MSAL, we had the assumption that If MSAL exposed |
To summarize, Azure CLI is not blocked by the proposal above, and now the PR in Azure CLI has been merged. I would suggest close this feature request as Won't-fix. We can revisit the topic of exposing the SSH Cert feature (when/if other apps also needs it), but its official api will unlikely be a generic |
@localden - We need to triage this tomorrow. |
I am not aware of a single 3p customer using this. Only 1-2 internal teams use this for very specific sceanrios, i.e. provision Linux VMs. As such I do not think it qualifies for a fully fledged API. I am sure there is server telemetry for this. In hindsight, it was a mistake to create an explicit public API in MSAL.NET without a good E2E scenario & docs & motivation. |
Fully agreed. Also, in the case of SSH Certificate, there is only one internal team using it, and that is the Azure CLI team. The current undocumented API was designed for that, will continue to work, and I don't think it is worth becoming a documented public API. |
This is being tracked as a feature in ADO. |
MSAL client type
Public, Confidential
Problem Statement
data
has been used for a long time for getting SSH certificates, but it is still not publicly documented and is part ofkwargs
:microsoft-authentication-library-for-python/msal/application.py
Line 2106 in bb6d872
microsoft-authentication-library-for-python/msal/application.py
Line 1560 in bb6d872
Azure CLI currently passes
kwargs
received byget_token()
directly to MSAL. Since SDK is adding more keyword arguments, such asenable_cae
(Azure/azure-sdk-for-python#37358), this will cause failure asenable_cae
is not recognized by MSAL.Azure CLI is considering making
data
an official keyword argument ofget_token()
so that only known arguments (scopes
,claims_challenge
,data
) are passed to MSAL andkwargs
received byget_token()
is no longer directly passed to MSAL.Proposed solution
Move
data
out ofkwargs
and make it a public keyword argument.The text was updated successfully, but these errors were encountered: