-
-
Notifications
You must be signed in to change notification settings - Fork 42
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
v2.2.0 #179
Merged
Merged
v2.2.0 #179
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #179 +/- ##
==========================================
+ Coverage 96.91% 97.55% +0.64%
==========================================
Files 96 104 +8
Lines 4706 5737 +1031
==========================================
+ Hits 4561 5597 +1036
+ Misses 145 140 -5
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
New Features
A new argument for retrieving audit data and creating commits based on the user UPN and action has been added. By just including
--audit
when running a backup, IntuneCD will check the Intune audit log for who made the change, set the UPN as the git user and commit the change in that users name. Additionally, if you want to get audit data further back than the default 24h, an env key can be set to the number of days you'd like to grab,AUDIT_DAYS_BACK
.Payloads that supports audit checks are:
Example commit message:
Scope Tags is now backed up with the name instead of ID and compared using the name when updating minimising the risk of conflicts between tenants.
Backup, update and remove custom compliance scripts for Linux and Windows
Backup, update and remove compliance polices for Linux
Fixes
Other updates
Notes
Be aware that this update will cause commits in your repo as the scope tags on payloads will change from the ID to the name instead.
If you are planning to use
--audit
and do not want that the last user from the audit log is committing changed to documentation and other files not included in the audit run, make sure to configure your git user and email after IntuneCD has run the backup. Also remove--global
from thegit config
to make sure it's set locally for the repo.closes #178
closes #177
closes #180