-
Notifications
You must be signed in to change notification settings - Fork 345
Comparing changes
Open a pull request
base repository: googleapis/google-auth-library-python
base: v2.43.0
head repository: googleapis/google-auth-library-python
compare: v2.44.0
- 16 commits
- 48 files changed
- 12 contributors
Commits on Nov 10, 2025
-
Configuration menu - View commit details
-
Copy full SHA for 5c372a9 - Browse repository at this point
Copy the full SHA 5c372a9View commit details
Commits on Nov 11, 2025
-
Configuration menu - View commit details
-
Copy full SHA for 4edf585 - Browse repository at this point
Copy the full SHA 4edf585View commit details -
doc: Custom Credential Suppliers for AWS and Okta. (#1830)
Documenting Custom Credential Suppliers for: 1. Aws Workload. 2. Okta Workload. The readme updates for these have already been made: [Link](https://github.com/googleapis/google-auth-library-python/pull/1496/files) --------- Co-authored-by: Chalmer Lowe <[email protected]> Co-authored-by: Daniel Sanche <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for b55aa11 - Browse repository at this point
Copy the full SHA b55aa11View commit details -
feat: Add shlex to correctly parse executable commands with spaces (#…
…1855) The `subprocess.run` command was using `.split()` which does not handle quoted paths with spaces correctly. This would cause a `FileNotFoundError` when the path to the executable contained spaces. This change replaces `.split()` with `shlex.split()` to correctly parse the command string. A test case has been added to verify the fix and prevent regressions. This was reported in b/237606033 Co-authored-by: Daniel Sanche <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for cf6fc3c - Browse repository at this point
Copy the full SHA cf6fc3cView commit details -
feat: Implement token revocation in STS client and add revoke() metho… (
#1849) …d to ExternalAccountAuthorizedUser credentials * Add support for OAuth 2.0 token revocation to the STS client, aligning with the specification in RFC7009. * A new revoke_token method is introduced, which makes a POST request to a revocation endpoint. The underlying request handler has also been updated to correctly process successful but empty HTTP responses, as specified by the standard for revocation. * Building on the STS client's new capabilities, this change exposes a public revoke() method on the ExternalAccountAuthorizedUser credentials class. * This method encapsulates the logic for revoking the refresh token by calling the underlying STS client's revoke_token function. It simplifies the process for client applications, like gcloud, to revoke these specific credentials without needing to interact directly with the STS client. * Unit tests are included to verify successful revocation and to ensure appropriate errors are raised if required fields (like revoke_url) are missing. --------- Co-authored-by: Daniel Sanche <[email protected]> Co-authored-by: nbayati <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for d563898 - Browse repository at this point
Copy the full SHA d563898View commit details
Commits on Nov 19, 2025
-
Configuration menu - View commit details
-
Copy full SHA for 5b96011 - Browse repository at this point
Copy the full SHA 5b96011View commit details -
feat: MDS connections use mTLS (#1856)
Use mTLS/HTTPS when connecting to MDS **Feature Gating** The `GCE_METADATA_MTLS_MODE` environment variable is introduced, which can be set to strict, none, or default. The `should_use_mds_mtls` function determines whether to use mTLS based on the environment variable and the existence of the certificate files in well-known location ((https://docs.cloud.google.com/compute/docs/metadata/overview#https-mds-certificates). **Description of changes** A custom `MdsMtlsAdapter` is implemented to handle the SSL context for mTLS. MdsMtlsAdapter loads MDS mTLS certificates from well-known location. MdsMtlsAdapter is mounted into the provided request.Session. **Behavior** If mode == none: Continue to use HTTP. If mode == default: Use HTTPS if certificates exist. If HTTPS/mTLS fails, falls back to HTTP. If mode == strict: Use HTTPS always, even if certificates don't exist (will result in error). **Integrating with existing code** compute_engine/_metadata.py: - The metadata server URL construction is now dynamic, supporting both http and https schemes based on whether mTLS is enabled. - ping and get functions are updated to use mTLS when it's enabled.
Configuration menu - View commit details
-
Copy full SHA for 0387bb9 - Browse repository at this point
Copy the full SHA 0387bb9View commit details
Commits on Nov 25, 2025
-
Configuration menu - View commit details
-
Copy full SHA for daabaa7 - Browse repository at this point
Copy the full SHA daabaa7View commit details -
feat: add ecdsa p-384 support (#1872)
GDC (Google Distributed Cloud) needs to support ECDSA-P384 keys for compliance. This change creates an EsSigner and EsVerifier class that is capable of supporting both ECDSA-P256 and ECDSA-P384 keys for backwards compatibility. The EsSigner and EsVerifier classes are plumbed through to the GDC service accounts and are used to both sign and verify JWTs. This implementation was successfully tested against a GDC instance using both ECDSA-P256 and ECDSA-P384 keys. --------- Co-authored-by: Daniel Sanche <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 39c381a - Browse repository at this point
Copy the full SHA 39c381aView commit details
Commits on Dec 1, 2025
-
Configuration menu - View commit details
-
Copy full SHA for 2c374d3 - Browse repository at this point
Copy the full SHA 2c374d3View commit details -
fix(auth): Delegate workload cert and key default lookup to helper fu…
…nction (#1877) get_client_ssl_credentials had a bug that defaulted the cert path to CERTIFICATE_CONFIGURATION_DEFAULT_PATH if not explicitly specified. The correct behavior should be to delegate the lookup logic to "_get_workload_cert_and_key" which also takes into account the cert config path set by the env var GOOGLE_API_CERTIFICATE_CONFIG. --------- Co-authored-by: Daniel Sanche <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for b0993c7 - Browse repository at this point
Copy the full SHA b0993c7View commit details
Commits on Dec 4, 2025
-
chore(tests): allow expired secret in system tests (#1883)
Allow system tests to pass, even if the secret is found to be expired Long term, we should re-think these tests. But this will unblock work in this repo Context: https://github.com/googleapis/google-auth-library-python/issues/1882
Configuration menu - View commit details
-
Copy full SHA for 3e8a566 - Browse repository at this point
Copy the full SHA 3e8a566View commit details -
fix(auth): Add temporary patch to workload cert logic to accomodate C…
…loud Run mis-configuration (#1880) This patch adds a fallback logic to look for Cloud Run cert/keys in the well-known location if the cert config contains the exact incorrect cert/key paths AND the incorrect cert/key paths point to non-existent files. Note: This patch will be reverted sometime in Jan 2026, after Cloud Run environment is updated with the correct cert configs. The revert will be tracked by #1881
Configuration menu - View commit details
-
Copy full SHA for 78de790 - Browse repository at this point
Copy the full SHA 78de790View commit details
Commits on Dec 9, 2025
-
fix(auth): Use public refresh method for source credentials in Impers…
…onatedCredentials (#1884) This PR addresses a bug in ImpersonatedCredentials that causes a issues when the source_credential is of a type that does not implement the private _refresh_token method (for example, a custom credential type).
Configuration menu - View commit details
-
Copy full SHA for e0c3296 - Browse repository at this point
Copy the full SHA e0c3296View commit details
Commits on Dec 12, 2025
-
feat: support Python 3.14 (#1822)
Co-authored-by: Anthonios Partheniou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 0f7097e - Browse repository at this point
Copy the full SHA 0f7097eView commit details
Commits on Dec 15, 2025
-
chore: librarian release pull request: 20251212T161150Z (#1888)
PR created by the Librarian CLI to initialize a release. Merging this PR will auto trigger a release. Librarian Version: v0.7.0 Language Image: us-central1-docker.pkg.dev/cloud-sdk-librarian-prod/images-prod/python-librarian-generator:latest <details><summary>google-auth: 2.44.0</summary> ## [2.44.0](v2.43.0...v2.44.0) (2025-12-12) ### Features * MDS connections use mTLS (#1856) ([0387bb9](0387bb95)) * support Python 3.14 (#1822) ([0f7097e](0f7097e7)) * add ecdsa p-384 support (#1872) ([39c381a](39c381a5)) * Add shlex to correctly parse executable commands with spaces (#1855) ([cf6fc3c](cf6fc3cc)) * Implement token revocation in STS client and add revoke() metho… (#1849) ([d563898](d5638986)) ### Bug Fixes * Add temporary patch to workload cert logic to accomodate Cloud Run mis-configuration (#1880) ([78de790](78de7907)) * Delegate workload cert and key default lookup to helper function (#1877) ([b0993c7](b0993c7e)) * Use public refresh method for source credentials in ImpersonatedCredentials (#1884) ([e0c3296](e0c3296f)) </details>
Configuration menu - View commit details
-
Copy full SHA for 262eb9e - Browse repository at this point
Copy the full SHA 262eb9eView commit details
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff v2.43.0...v2.44.0