Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore: bump github.com/AzureAD/microsoft-authentication-library-for-go from 0.9.0 to 1.0.0 in /examples/msal-go #873

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Apr 27, 2023

Bumps github.com/AzureAD/microsoft-authentication-library-for-go from 0.9.0 to 1.0.0.

Release notes

Sourced from github.com/AzureAD/microsoft-authentication-library-for-go's releases.

MSAL Go 1.0.0

  • Better diagnostics message (#304, #403)
  • Prevent persistent cache data races (#402)
  • Switch to new regional endpoints (#361, #408)
Changelog

Sourced from github.com/AzureAD/microsoft-authentication-library-for-go's changelog.

Microsoft Identity SDK Versioning and Servicing FAQ

We have adopted the semantic versioning flow that is industry standard for OSS projects. It gives the maximum amount of control on what risk you take with what versions. If you know how semantic versioning works with node.js, java, and ruby none of this will be new.

Semantic Versioning and API stability promises

Microsoft Identity libraries are independent open source libraries that are used by partners both internal and external to Microsoft. As with the rest of Microsoft, we have moved to a rapid iteration model where bugs are fixed daily and new versions are produced as required. To communicate these frequent changes to external partners and customers, we use semantic versioning for all our public Microsoft Identity SDK libraries. This follows the practices of other open source libraries on the internet. This allows us to support our downstream partners which will lock on certain versions for stability purposes, as well as providing for the distribution over NuGet, CocoaPods, and Maven.

The semantics are: MAJOR.MINOR.PATCH (example 1.1.5)

We will update our code distributions to use the latest PATCH semantic version number in order to make sure our customers and partners get the latest bug fixes. Downstream partner needs to pull the latest PATCH version. Most partners should try lock on the latest MINOR version number in their builds and accept any updates in the PATCH number.

Examples: Using Cocapods, the following in the podfile will take the latest ADALiOS build that is > 1.1 but not 1.2.

pod 'ADALiOS', '~> 1.1'

Using NuGet, this ensures all 1.1.0 to 1.1.x updates are included when building your code, but not 1.2.

<dependency
id="ADALfordotNet"
version="[1.1,1.2)"
/>
Version Description Example
x.x.x PATCH version number. Incrementing these numbers is for bug fixes and updates but do not introduce new features. This is used for close partners who build on our platform release (ex. Azure AD Fabric, Office, etc.),In addition, Cocoapods, NuGet, and Maven use this number to deliver the latest release to customers.,This will update frequently (sometimes within the same day),There is no new features, and no regressions or API surface changes. Code will continue to work unless affected by a particular code fix. ADAL for iOS 1.0.10,(this was a fix for the Storyboard display that was fixed for a specific Office team)
x.x MINOR version numbers. Incrementing these second numbers are for new feature additions that do not impact existing features or introduce regressions. They are purely additive, but may require testing to ensure nothing is impacted.,All x.x.x bug fixes will also roll up in to this number.,There is no regressions or API surface changes. Code will continue to work unless affected by a particular code fix or needs this new feature. ADAL for iOS 1.1.0,(this added WPJ capability to ADAL, and rolled all the updates from 1.0.0 to 1.0.12)
x MAJOR version numbers. This should be considered a new, supported version of Microsoft Identity SDK and begins the Azure two year support cycle anew. Major new features are introduced and API changes can occur.,This should only be used after a large amount of testing and used only if those features are needed.,We will continue to service MAJOR version numbers with bug fixes up to the two year support cycle. ADAL for iOS 1.0,(our first official release of ADAL)

Serviceability

When we release a new MINOR version, the previous MINOR version is abandoned.

When we release a new MAJOR version, we will continue to apply bug fixes to the existing features in the previous MAJOR version for up to the 2 year support cycle for Azure. Example: We release ADALiOS 2.0 in the future which supports unified Auth for AAD and MSA. Later, we then have a fix in Conditional Access for ADALiOS. Since that feature exists both in ADALiOS 1.1 and ADALiOS 2.0, we will fix both. It will roll up in a PATCH number for each. Customers that are still locked down on ADALiOS 1.1 will receive the benefit of this fix.

Microsoft Identity SDKs and Azure Active Directory

Microsoft Identity SDKs major versions will maintain backwards compatibility with Azure Active Directory web services through the support period. This means that the API surface area defined in a MAJOR version will continue to work for 2 years after release.

We will respond to bugs quickly from our partners and customers submitted through GitHub and through our private alias (tellaad@microsoft.com) for security issues and update the PATCH version number. We will also submit a change summary for each PATCH number. Occasionally, there will be security bugs or breaking bugs from our partners that will require an immediate fix and a publish of an update to all partners and customers. When this occurs, we will do an emergency roll up to a PATCH version number and update all our distribution methods to the latest.

Commits
  • 4d3329f Merge pull request #412 from AzureAD/release-1.0.0
  • 8e66327 separate assignment from return
  • 62816fd Bump version number
  • 6a16f64 Fix tests broken by #403 (#410)
  • 2d23419 Removing r.login.microsoftonline.com (#408)
  • 4c397f8 Prevent persistent cache data races (#402)
  • 8801762 Revert "Change r.login.microsoftonline.com to login.microsoft.com"
  • 5e54e5e Change r.login.microsoftonline.com to login.microsoft.com
  • 565332c Adding some better diagnostics for len(scopes) == 0 (#403)
  • See full diff in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

@dependabot dependabot bot requested a review from aramase as a code owner April 27, 2023 17:52
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Apr 27, 2023
@dependabot dependabot bot force-pushed the dependabot/go_modules/examples/msal-go/github.com/AzureAD/microsoft-authentication-library-for-go-1.0.0 branch from 8e236bd to 99e57df Compare April 27, 2023 20:03
@aramase
Copy link
Member

aramase commented Apr 28, 2023

@dependabot rebase

Bumps [github.com/AzureAD/microsoft-authentication-library-for-go](https://github.com/AzureAD/microsoft-authentication-library-for-go) from 0.9.0 to 1.0.0.
- [Release notes](https://github.com/AzureAD/microsoft-authentication-library-for-go/releases)
- [Changelog](https://github.com/AzureAD/microsoft-authentication-library-for-go/blob/dev/RELEASES.md)
- [Commits](AzureAD/microsoft-authentication-library-for-go@v0.9.0...v1.0.0)

---
updated-dependencies:
- dependency-name: github.com/AzureAD/microsoft-authentication-library-for-go
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot force-pushed the dependabot/go_modules/examples/msal-go/github.com/AzureAD/microsoft-authentication-library-for-go-1.0.0 branch from 99e57df to da2c8d2 Compare April 28, 2023 19:37
@aramase
Copy link
Member

aramase commented Apr 28, 2023

/azp run Azure Workload Identity CI

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

@aramase aramase enabled auto-merge (squash) April 28, 2023 19:50
@aramase aramase merged commit f9f59b8 into main Apr 28, 2023
22 checks passed
@aramase aramase deleted the dependabot/go_modules/examples/msal-go/github.com/AzureAD/microsoft-authentication-library-for-go-1.0.0 branch April 28, 2023 21:28
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file go Pull requests that update Go code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant