Skip to content

Conversation

@dependabot
Copy link

@dependabot dependabot bot commented on behalf of github Dec 22, 2025

Bumps google-auth from 2.3.3 to 2.45.0.

Release notes

Sourced from google-auth's releases.

google-auth 2.45.0

2.45.0 (2025-12-15)

Features

  • Adding Agent Identity bound token support and handling certificate mismatches with retries (#1890) (b32c934e)

google-auth 2.44.0

2.44.0 (2025-12-12)

Features

Bug Fixes

  • Add temporary patch to workload cert logic to accomodate Cloud Run mis-configuration (#1880) (78de7907)

  • Delegate workload cert and key default lookup to helper function (#1877) (b0993c7e)

  • Use public refresh method for source credentials in ImpersonatedCredentials (#1884) (e0c3296f)

google-auth 2.43.0

2.43.0 (2025-11-05)

Features

  • Add public wrapper for _mtls_helper.check_use_client_cert which enables mTLS if GOOGLE_API_USE_CLIENT_CERTIFICATE is not set, when the MWID/X.509 cert sources detected (#1859) (1535eccb)

  • Enable mTLS if GOOGLE_API_USE_CLIENT_CERTIFICATE is not set, if the MWID/X.509 cert sources detected (#1848) (395e405b)

  • onboard google-auth to librarian (#1838) (c503eaa5)

v2.42.1

2.42.1 (2025-10-30)

Bug Fixes

v2.42.0

... (truncated)

Changelog

Sourced from google-auth's changelog.

2.45.0 (2025-12-15)

Features

2.44.0 (2025-12-13)

Features

Bug Fixes

2.43.0 (2025-11-05)

Features

  • Add public wrapper for _mtls_helper.check_use_client_cert which enables mTLS if GOOGLE_API_USE_CLIENT_CERTIFICATE is not set, when the MWID/X.509 cert sources detected (#1859) Add public wrapper for check_use_client_cert which enables mTLS if GOOGLE_API_USE_CLIENT_CERTIFICATE is not set, when the MWID/X.509 cert sources detected. Also, fix check_use_client_cert to return boolean value. Change #1848 added the check_use_client_cert method that helps know if client cert should be used for mTLS connection. However, that was in a private class, thus, created a public wrapper of the same function so that it can be used by python Client Libraries. Also, updated check_use_client_cert to return a boolean value instead of existing string value for better readability and future scope. --------- (1535eccbff0ad8f3fd6a9775316ac8b77dca66ba)
  • Enable mTLS if GOOGLE_API_USE_CLIENT_CERTIFICATE is not set, if the MWID/X.509 cert sources detected (#1848) The Python SDK will use a hybrid approach for mTLS enablement:
  • If the GOOGLE_API_USE_CLIENT_CERTIFICATE environment variable is set (either true or false), the SDK will respect that setting. This is necessary for test scenarios and users who need to explicitly control mTLS behavior.
  • If the GOOGLE_API_USE_CLIENT_CERTIFICATE environment variable is not set, the SDK will automatically enable mTLS only if it detects Managed Workload Identity (MWID) or X.509 Workforce Identity Federation (WIF) certificate sources. In other cases where the variable is not set, mTLS

... (truncated)

Commits
  • 08fabf7 chore: librarian release pull request: 20251215T132028Z (#1891)
  • b32c934 feat: Adding Agent Identity bound token support and handling certificate mism...
  • 262eb9e chore: librarian release pull request: 20251212T161150Z (#1888)
  • 0f7097e feat: support Python 3.14 (#1822)
  • e0c3296 fix(auth): Use public refresh method for source credentials in ImpersonatedCr...
  • 78de790 fix(auth): Add temporary patch to workload cert logic to accomodate Cloud Run...
  • 3e8a566 chore(tests): allow expired secret in system tests (#1883)
  • b0993c7 fix(auth): Delegate workload cert and key default lookup to helper function (...
  • 2c374d3 chore: update secret (#1879)
  • 39c381a feat: add ecdsa p-384 support (#1872)
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [google-auth](https://github.com/googleapis/google-auth-library-python) from 2.3.3 to 2.45.0.
- [Release notes](https://github.com/googleapis/google-auth-library-python/releases)
- [Changelog](https://github.com/googleapis/google-auth-library-python/blob/main/CHANGELOG.md)
- [Commits](googleapis/google-auth-library-python@v2.3.3...v2.45.0)

---
updated-dependencies:
- dependency-name: google-auth
  dependency-version: 2.45.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file python labels Dec 22, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file python

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants