@azure/identity 3.2.0-alpha.20230425.4 → 3.2.0-alpha.20230509.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of @azure/identity might be problematic. Click here for more details.

package/README.md CHANGED
@@ -68,9 +68,9 @@ While we recommend using managed identity or service principal authentication in
68
68
 
69
69
  Developers coding outside of an IDE can also use the [Azure Developer CLI][azure_developer_cli] to authenticate. Applications using the `DefaultAzureCredential` or the `AzureDeveloperCliCredential` can then use this account to authenticate calls in their application when running locally.
70
70
 
71
- To authenticate with the [Azure Developer CLI][azure_developer_cli], users can run the command `azd login`. For users running on a system with a default web browser, the Azure Developer CLI will launch the browser to authenticate the user.
71
+ To authenticate with the [Azure Developer CLI][azure_developer_cli], users can run the command `azd auth login`. For users running on a system with a default web browser, the Azure Developer CLI will launch the browser to authenticate the user.
72
72
 
73
- For systems without a default web browser, the `azd login --use-device-code` command will use the device code authentication flow.
73
+ For systems without a default web browser, the `azd auth login --use-device-code` command will use the device code authentication flow.
74
74
 
75
75
  #### Authenticate via the Azure CLI
76
76
 
@@ -133,7 +133,7 @@ If used from Node.js, the `DefaultAzureCredential` will attempt to authenticate
133
133
  1. **Environment** - The `DefaultAzureCredential` will read account information specified via [environment variables](#environment-variables) and use it to authenticate.
134
134
  1. **Workload Identity** - If the application is deployed to Azure Kubernetes Service with Managed Identity enabled, `DefaultAzureCredential` will authenticate with it.
135
135
  1. **Managed Identity** - If the application is deployed to an Azure host with Managed Identity enabled, the `DefaultAzureCredential` will authenticate with that account.
136
- 1. **Azure Developer CLI** - If the developer has authenticated an account via the Azure Developer CLI `azd login` command, the `DefaultAzureCredential` will authenticate with that account.
136
+ 1. **Azure Developer CLI** - If the developer has authenticated an account via the Azure Developer CLI `azd auth login` command, the `DefaultAzureCredential` will authenticate with that account.
137
137
  1. **Azure CLI** - If the developer has authenticated an account via the Azure CLI `az login` command, the `DefaultAzureCredential` will authenticate with that account.
138
138
  1. **Azure PowerShell** - If the developer has authenticated using the Azure PowerShell module `Connect-AzAccount` command, the `DefaultAzureCredential` will authenticate with that account.
139
139
 
package/dist/index.js CHANGED
@@ -257,7 +257,7 @@ function credentialLogger(title, log = logger$n) {
257
257
  /**
258
258
  * Current version of the `@azure/identity` package.
259
259
  */
260
- const SDK_VERSION = `3.2.0-beta.2`;
260
+ const SDK_VERSION = `3.2.0`;
261
261
  /**
262
262
  * The default client ID for authentication
263
263
  * @internal
@@ -2074,7 +2074,7 @@ function tokenExchangeMsi() {
2074
2074
  async getToken(configuration, getTokenOptions = {}) {
2075
2075
  const { scopes, clientId } = configuration;
2076
2076
  const identityClientTokenCredentialOptions = {};
2077
- const workloadIdentityCredential = new WorkloadIdentityCredential(Object.assign(Object.assign({ clientId, tenantId: process.env.AZURE_TENANT_ID, tokenFilePath: process.env.AZURE_FEDERATED_TOKEN_FILE }, identityClientTokenCredentialOptions), { disableAuthorityValidationAndInstanceDiscovery: true }));
2077
+ const workloadIdentityCredential = new WorkloadIdentityCredential(Object.assign(Object.assign({ clientId, tenantId: process.env.AZURE_TENANT_ID, tokenFilePath: process.env.AZURE_FEDERATED_TOKEN_FILE }, identityClientTokenCredentialOptions), { disableInstanceDiscovery: true }));
2078
2078
  const token = await workloadIdentityCredential.getToken(scopes, getTokenOptions);
2079
2079
  return token;
2080
2080
  },
@@ -3592,17 +3592,17 @@ class DefaultWorkloadIdentityCredential extends WorkloadIdentityCredential {
3592
3592
  }
3593
3593
  class DefaultAzureDeveloperCliCredential extends AzureDeveloperCliCredential {
3594
3594
  constructor(options) {
3595
- super(Object.assign({ processTimeoutInMs: options === null || options === void 0 ? void 0 : options.credentialProcessTimeoutInMs }, options));
3595
+ super(Object.assign({ processTimeoutInMs: options === null || options === void 0 ? void 0 : options.processTimeoutInMs }, options));
3596
3596
  }
3597
3597
  }
3598
3598
  class DefaultAzureCliCredential extends AzureCliCredential {
3599
3599
  constructor(options) {
3600
- super(Object.assign({ processTimeoutInMs: options === null || options === void 0 ? void 0 : options.credentialProcessTimeoutInMs }, options));
3600
+ super(Object.assign({ processTimeoutInMs: options === null || options === void 0 ? void 0 : options.processTimeoutInMs }, options));
3601
3601
  }
3602
3602
  }
3603
3603
  class DefaultAzurePowershellCredential extends AzurePowerShellCredential {
3604
3604
  constructor(options) {
3605
- super(Object.assign({ processTimeoutInMs: options === null || options === void 0 ? void 0 : options.credentialProcessTimeoutInMs }, options));
3605
+ super(Object.assign({ processTimeoutInMs: options === null || options === void 0 ? void 0 : options.processTimeoutInMs }, options));
3606
3606
  }
3607
3607
  }
3608
3608
  const defaultCredentials = [