Vadim Gremyachev
Vadim Gremyachev
@nsmcan, although this change seems unfortunately impacted to broken auth (for federated signin with ADFS), related issues reported here: - #308 - #333
Greetings, assuming file url represents a sharing link, consider to utilize `ClientContext` instead of `GraphClient` client and `get_file_by_guest_url` method to return a file: ```python ctx = ClientContext(test_site_url).with_access_token(acquire_token) file = ctx.web.get_file_by_guest_url(file_url).execute_query()...
Greetings! Thank you for catching and reporting this issue. It looks like [this PR](https://github.com/vgrem/office365-rest-python-client/pull/965) is addressing it.
Greetings, according to trace log, it seems it fails on acquiring a security token, revealing some additional details might help to pin-point the root cause: - is [federated account ](https://docs.microsoft.com/en-us/office365/troubleshoot/authentication/account-issues-for-federated-users)...
Greetings, > Or do I need to iterate over all intermediate folders (from root) and create them if they don't exist? appears to be the only option, let's keep this...
Greetings! Thank you for catching it, it appears variables themselves are misnamed here: self.High actually stores the Low value, and self.Low stores the High value. Thanks, it will be addresed...
Greetings, can't spot anything suspicious here, `chunk_uploaded` expects 1 mandatory argument starting from version 2.5.2. and `print_upload_progress` signature appears to be correct. Perhaps you are utilizing older version?
Greetings! Yes, this should be supported starting from version 2.6.0 (release notes: [GitHub](https://github.com/vgrem/office365-rest-python-client/releases/tag/2.6.0)). Here's a minimal example: ```python from office365.azure_env import AzureEnvironment from office365.sharepoint.client_context import ClientContext ctx = ClientContext( site_url,...
Hi @AndrewDicks, [this thread](https://learn.microsoft.com/en-us/answers/questions/5527284/request-to-sharepoint-sign-in-endpoint-wa-wsignin1) seems reveal more details regarding this matter, namely: Microsoft 365 rolled in [Secure by Default Settings Changes](https://admin.microsoft.com/Adminportal/Home?#/MessageCenter/:/messages/MC1097272) which _require admin consent for third-party apps accessing files...
Indeed, it appears SharePoint Online's SAML authentication method have stopped working due to a planned deprecation, was reported also in [this thread ](https://learn.microsoft.com/en-us/answers/questions/5527284/request-to-sharepoint-sign-in-endpoint-wa-wsignin1)