# Format https://setuptools.pypa.io/en/latest/userguide/declarative_config.html [bdist_wheel] universal=0 [metadata] name = msal version = attr: msal.__version__ description = The Microsoft Authentication Library (MSAL) for Python library enables your app to access the Microsoft Cloud by supporting authentication of users with Microsoft Azure Active Directory accounts (AAD) and Microsoft Accounts (MSA) using industry standard OAuth2 and OpenID Connect. long_description = file: README.md long_description_content_type = text/markdown license = MIT author = Microsoft Corporation author_email = nugetaad@microsoft.com url = https://github.com/AzureAD/microsoft-authentication-library-for-python classifiers = Development Status :: 5 - Production/Stable Programming Language :: Python Programming Language :: Python :: 3 :: Only Programming Language :: Python :: 3 Programming Language :: Python :: 3.7 Programming Language :: Python :: 3.8 Programming Language :: Python :: 3.9 Programming Language :: Python :: 3.10 Programming Language :: Python :: 3.11 Programming Language :: Python :: 3.12 License :: OSI Approved :: MIT License Operating System :: OS Independent project_urls = Changelog = https://github.com/AzureAD/microsoft-authentication-library-for-python/releases Documentation = https://msal-python.readthedocs.io/ Questions = https://stackoverflow.com/questions/tagged/azure-ad-msal+python Feature/Bug Tracker = https://github.com/AzureAD/microsoft-authentication-library-for-python/issues [options] include_package_data = False # We used to ship LICENSE, but our __init__.py already mentions MIT packages = find: # Our test pipeline currently still covers Py37 python_requires = >=3.7 install_requires = requests>=2.0.0,<3 # MSAL does not use jwt.decode(), # therefore is insusceptible to CVE-2022-29217 so no need to bump to PyJWT 2.4+ PyJWT[crypto]>=1.0.0,<3 # load_key_and_certificates() is available since 2.5 # https://cryptography.io/en/latest/hazmat/primitives/asymmetric/serialization/#cryptography.hazmat.primitives.serialization.pkcs12.load_key_and_certificates # # And we will use the cryptography (X+3).0.0 as the upper bound, # based on their latest deprecation policy # https://cryptography.io/en/latest/api-stability/#deprecation cryptography>=2.5,<45 [options.extras_require] broker = # The broker is defined as optional dependency, # so that downstream apps can opt in. The opt-in is needed, partially because # most existing MSAL Python apps do not have the redirect_uri needed by broker. # MSAL Python uses a subset of API from PyMsalRuntime 0.13.0+, # but we still bump the lower bound to 0.13.2+ for its important bugfix (https://github.com/AzureAD/microsoft-authentication-library-for-cpp/pull/3244) pymsalruntime>=0.13.2,<0.17; python_version>='3.6' and platform_system=='Windows' [options.packages.find] exclude = tests