Releases: manicminer/hamilton
Releases · manicminer/hamilton
v0.36.1
v0.36.0
- Support for administrative units (#124)
- Support for delegated permission grants (#126)
- Conditional Access Policies: support for
devices
anddeviceStates
in policyconditions
(#125) - Conditional Access Policies: add type aliases and constants for enum values (#125)
v0.35.0
-
Auth package refactoring (#123)
- Remove the
auth.Api
type and instead useenvironments.Api
directly - Use the resource URI instead of the friendly name for Azure CLI auth tokens
- Remove the
-
Add the
AuxiliaryTokens()
method to theauth.Authorizer
interface to support obtaining tokens for additional tenants (#123) -
Expand support in
auth.AutorestAuthorizerWrapper
to support anyautorest.Authorizer
(#123)autorest.BearerAuthorizer
andautorest.MultiTenantBearerAuthorizer
are fully supported with access tokens, refresh tokens and expiry- Other authorizers can supply access tokens only
-
Support auxiliary tenants with client secret and client certificate authorizers (#123)
-
Implement the
autorest.Authorizer
interface withauth.CachedAuthorizer
(which wraps all supported Authorizers) (#123)- This allows authorizers to be used with https://github.com/Azure/go-autorest, with multi-tenant support, with the exception of
auth.MsiAuthorizer
- This allows authorizers to be used with https://github.com/Azure/go-autorest, with multi-tenant support, with the exception of
-
Export environment configs for more management plane APIs (#123)
- Resource Manager
- Batch Management
- Data Lake
- Gallery
- KeyVault
- Operational Insights
- OSS RDBMS
- Service Bus
- Service Management (Azure Classic)
- SQL Database
- Storage
- Synapse
-
Refactor and tidy up tests for the
msgraph
package (#123) -
Say goodbye to Azure Germany 🇩🇪 (#123)
- The signatures for
auth.NewClientCertificateAuthorizer
,auth.NewClientSecretAuthorizer
andauth.NewAzureCliAuthorizer
have changed to accommodate passing additional tenant IDs for multi-tenant authorization (#123)
v0.34.0
v0.33.0
- Support for specifying the client ID when using managed identity authentication (#115)
- Mitigation for breaking API changes around the
@odata.id
field (#114)- If
@odata.id
is returned in the formobjectType('GUID')
(i.e. not a valid URI), then attempt to reconstruct a URI - This currently hardcodes the
graph.microsoft.com
host in the generated URI but this does not appear to be a problem for other clouds - This field is exported in all structs that reference it, so it's possible to override this if necessary
- If
- Support for running
msgraph
tests in national clouds (#114)
- The signatures for the
auth.NewMsiAuthorizer()
andauth.NewMsiConfig()
functions have changed to accommodate the client ID (#115)
v0.32.0
- Support for setting OData-related HTTP headers
- Implement a new way to pass the entire
odata.Query
object as part of request inputs - Update all existing clients to pass
odata.Query
in full- The existing method of passing a
url.Values
map still works, maintains compatibility and can be used for passing non-odata related query parameters
- The existing method of passing a
- Support setting OData-related HTTP headers including
OData-Version
/OData-MaxVersion
, odata-json parameters on theAccept
header, and theConsistencyLevel
header which isn't strictly in the odata 'standard' but heavily related - Set the
odata.metadata
parameter tofull
when retrieving directory objects to ensure the@odata.id
field is returned- This dramatically increases the payload volume so we don't default it everywhere
- Implement a new way to pass the entire
- Support for assigning and retrieving a user's manager (#111)
- Add application ID for "Azure VPN" to environments package (#113)
v0.31.0
v0.31.0
- Add support for Entitlement Management (beta-only API) (#93)
- Bug fix: handle inconsistent 400 error when listing sign-in reports with an OData filter (#108)
- Bug fix: work around an API consistency issue when creating service principals for new applications that have not fully replicated (#109)
v0.30.0
- Support for the appRolesAssignedTo endpoint (#107)
- Bug fix:
odata.OData{}
- theCount
field is now a*int
(#105)
v0.29.0
- Applications: add consistency check for roles/scopes that may be in the process of being disabled, when updating an application (#102)
- Applications: support for uploading application logos via the
ApplicationsClient{}.UploadLogo()
method(#103) - Directory Roles: add the
DirectoryROlesClient{}.GetByTemplateId()
method for retrieving roles by their template ID (#101) User
model: support EmployeeOrgData (#99)