You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Fix exception-contract and cache-key regressions vs #882
Blocker 1 — Exception contract:
RuntimeError from msal-key-attestation (DLL load, attestation call) now
gets caught and wrapped as MsiV2Error at both the provider call site in
msi_v2.py and the outer boundary in managed_identity.py. Only
MsiV2Error (or its subclasses) can escape to the caller.
Blocker 2 — Stable attestation cache key:
The provider callback signature is expanded from (endpoint, key_handle,
client_id) to (endpoint, key_handle, client_id, cache_key). MSAL now
passes the stable per-boot key name as cache_key, which
get_attestation_jwt() uses for its MAA token cache instead of falling
back to the less cache-friendly numeric handle.
Tests: 59 passed (44 core + 15 attestation), including new tests for
RuntimeError wrapping and cache_key forwarding.
Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
0 commit comments