Google.Apis.Core breaking changes
nuget10 curated breaking changes across major versions of Google.Apis.Core. Use this as a migration checklist before bumping dependencies.
- v1.68.0 \u2192 v1.69.0breaking
#2879 Use recommended retries for token and IAM sign blob endpoints
- v1.68.0 \u2192 v1.69.0breaking
#2913 Support GOOGLE_CLOUD_UNIVERSE_DOMAIN environment variable Dependencies:
- v1.68.0 \u2192 v1.69.0breaking
#2730 Remove unused dependency Microsoft.AspNetCore.Authorization from Google.Apis.Auth.AspNetCore3 BREAKING CHANGE: Projects using Google.Apis.Auth.AspNetCore3 that transitively depend on Microsoft.AspNetCore.Authorization may be broken. They only need to add an implicit dependency themselves. We consider the risk of this change breaking users lower than the risk of disrupting all users with a new major version so we've decided to release this breaking change on a minor version of the library.
- v1.68.0 \u2192 v1.69.0breaking
#2916 Add warning note about user provided credential configurations
- v1.56.0 \u2192 v1.57.0breaking
[#2086] Makes `LocalServerCodeReceiver` partially extendable.
- v1.46.0 \u2192 v1.47.0breaking
#1581 All credential types support the setting of quota project (`x-goog-user-project`).
- v1.46.0 \u2192 v1.47.0breaking
#1581 Semantically breaking change: Fails if the `x-goog-user-project` header is set through interceptors.
- v1.46.0 \u2192 v1.47.0breaking
This is unlikely to actually break anyone since the `x-goog-user-project` is not being currently used by Google APIs, so it's unlikely being set by client code. Bug fixes:
- v1.46.0 \u2192 v1.47.0breaking
#1592 fixes #1574. Adds the signing key ID to the header of a service account key signed JWT.
- v1.46.0 \u2192 v1.47.0breaking
#1592 When generating a JWT to access a REST API, sets the audience to https://service_name instead of the full requested URL. New features:
Get this data programmatically \u2014 free, no authentication.
curl https://depscope.dev/api/breaking/nuget/Google.Apis.Core