Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
65 commits
Select commit Hold shift + click to select a range
8bedd14
add enrty for ml extension hotfix release (#8401)
pdhotems Jan 7, 2025
308d211
{CI} add azdev scan (Medium Confidence) task (#8386)
evelyn-ys Jan 8, 2025
d157fbe
[containerapp] Add new commands for httprouteconfig (#8302)
Tratcher Jan 8, 2025
a4d59c7
Updating api version and changing namespace commands to scheduler (#8…
RyanLettieri Jan 8, 2025
2b7e318
[Release] Update index.json for extension [ durabletask ]
azclibot Jan 8, 2025
744f874
[Spring] Detect failed Update App operation during polling (#8349)
domainname Jan 8, 2025
bebcb68
[Release] Update index.json for extension [ spring ]
azclibot Jan 8, 2025
1488170
[Containerapp] `az containerapp create/update`: Fix --bind/--unbind w…
Greedygre Jan 8, 2025
205a6b1
[load] support multi-region load | advanced url tests | dashboard rep…
mbhardwaj-msft Jan 9, 2025
8f8d9ff
[Release] Update index.json for extension [ load ]
azclibot Jan 9, 2025
77116f4
{CI} Refine error guidance for azdev scan (medium confidence) task (#…
evelyn-ys Jan 9, 2025
6157ea5
[Playwright] Add CLI support for Playwright testing extension (#8389)
ShreyaAnand Jan 9, 2025
022c377
[Release] Update index.json for extension [ playwright-cli-extension ]
azclibot Jan 9, 2025
d3e0d51
[Eventgrid] Remove old commands which have been covered in main CLI (…
evelyn-ys Jan 10, 2025
5499b0c
[Release] Update index.json for extension [ eventgrid ]
azclibot Jan 10, 2025
73e7c70
{CI} Sync resourceManagement.yml according To ADO Wiki Page - Service…
azclibot Jan 10, 2025
b3c5507
{CI} Auto create release tag. (#8392)
wangzelin007 Jan 10, 2025
9f68094
Update SQL Assessment Console App Package Download URL. (#8385)
suvilasa Jan 10, 2025
97ff93e
[Release] Update index.json for extension [ datamigration-1.0.0b3 ]
azclibot Jan 10, 2025
0001e2a
[Container app] az containerapp env java-component: Support new confi…
Descatles Jan 13, 2025
266ee45
Change live tests to recorded tests for maintenance extension (#8403)
SethuramS Jan 13, 2025
f20b92f
[load] limit the scope of run_az_cmd import (#8412)
mbhardwaj-msft Jan 13, 2025
3b61c6a
[Release] Update index.json for extension [ load-1.4.1 ]
azclibot Jan 13, 2025
0c80c4b
Switch to stable API 2024-09-20 (#8343)
chrisribe Jan 14, 2025
94bb351
[Release] Update index.json for extension [ healthcareapis-1.0.1 ]
azclibot Jan 14, 2025
f3adbc9
[confcom] updating genpolicy version (#8407)
SethHollandsworth Jan 14, 2025
5e4e7a4
[Release] Update index.json for extension [ confcom ]
azclibot Jan 14, 2025
f5008af
{Storage-Preview} `az storage blob access/directory/move`: Remove dep…
calvinhzy Jan 15, 2025
92250cc
[Release] Update index.json for extension [ storage-preview-1.0.0b5 ]
azclibot Jan 15, 2025
49b53f8
[load] update min required cli core version (#8413)
mbhardwaj-msft Jan 15, 2025
cc92ccb
[Release] Update index.json for extension [ load-1.4.2 ]
azclibot Jan 15, 2025
13031bc
[Quantum] Remove resource estimator references (29126) (#8388)
warren-jones Jan 16, 2025
71b3eee
fix deserialize issue in amg notif channel test (#8408)
Jeralan Jan 16, 2025
68daf62
[Release] Update index.json for extension [ amg-2.5.5 ]
azclibot Jan 16, 2025
693f5f2
Address python warnings from comment blocks in resource-graph extensi…
yangmsft Jan 16, 2025
242851d
[Release] Update index.json for extension [ resource-graph-2.1.1 ]
azclibot Jan 16, 2025
7457a36
Add commands for NSP Logging configuration - Microsoft.Network (#8137)
karthik-gumpu Jan 16, 2025
416af7b
[Release] Update index.json for extension [ nsp-1.0.0b3 ]
azclibot Jan 16, 2025
381efc4
{vm-repair} Overhaul VM Repair examples (#8294)
Sandido Jan 17, 2025
a7eed35
[Release] Update index.json for extension [ vm-repair-2.0.2 ]
azclibot Jan 17, 2025
7f9035b
build: apic-extension 1.2.0b1 release (#8411)
frankqianms Jan 17, 2025
2335315
[Release] Update index.json for extension [ apic-extension-1.2.0b1 ]
azclibot Jan 17, 2025
70983a7
[containerapp] Add new options for labels mode (#8324)
Tratcher Jan 17, 2025
ede61b7
az ml 2.34.0 relase (#8427)
achauhan-scc Jan 21, 2025
01d4390
[DataFactory]Support new features in ADF 1.0.3 (#8426)
Jingshu918 Jan 22, 2025
b843913
[Release] Update index.json for extension [ datafactory-1.0.3 ]
azclibot Jan 22, 2025
5fcf3f1
release 1.1.0 (#8430)
vilit1 Jan 22, 2025
d6552fa
az k8s-extension create | Attempt to register a Resource Provider tha…
dupuyjs Jan 22, 2025
4643b70
{AKS} Update test case `test_aks_create_and_update_with_http_proxy_co…
FumingZhang Jan 22, 2025
e2c0dea
[Release] Update index.json for extension [ k8s-extension-1.6.3 ]
azclibot Jan 22, 2025
9721127
[Containerapp]: az containerapp arc: Enable setup custom core dns for…
LaylaLiu-gmail Jan 22, 2025
40c5b3f
2024-09-01-preview update (#8335)
jamesfan1 Jan 23, 2025
5396660
[Release] Update index.json for extension [ nginx-2.0.0b7 ]
azclibot Jan 23, 2025
ff48ca5
add git hook notice (#8436)
AllyW Jan 24, 2025
628bf37
[Containerapp] Release version `1.1.0b2` (#8435)
Greedygre Jan 24, 2025
7c2f589
[Release] Update index.json for extension [ containerapp ]
azclibot Jan 24, 2025
d098679
[CosmosDB] API Version 2024-12-01-preview (#8323)
pjohari-ms Jan 24, 2025
24b3e35
Durabletask shorthand fixes and readme fixes (#8414)
RyanLettieri Jan 26, 2025
14f09d3
2024-11-01-preview (#8442)
jamesfan1 Jan 28, 2025
d08d01d
[Release] Update index.json for extension [ nginx-2.0.0b8 ]
azclibot Jan 28, 2025
0fb0740
NeworkCloud : Azure cli extension updates for Networkcloud Api 2024-1…
priyamshet Jan 28, 2025
5658616
[Release] Update index.json for extension [ networkcloud-3.0.0b1 ]
azclibot Jan 28, 2025
f0157c7
[devcenter] Fix examples and show-logs-by-operation command output (#…
am-lim Jan 29, 2025
5ff3b9a
[Release] Update index.json for extension [ devcenter-6.2.1 ]
azclibot Jan 29, 2025
d734ea6
Merge from upstream
am-lim Jan 30, 2025
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
12 changes: 12 additions & 0 deletions .github/policies/resourceManagement.yml
Original file line number Diff line number Diff line change
Expand Up @@ -713,6 +713,18 @@ configuration:
- bberera
replyTemplate: Thanks for the feedback! We are routing this to the appropriate team for follow-up. cc ${mentionees}.
assignMentionees: False
- if:
- hasLabel:
label: Service Attention
- hasLabel:
label: CodeSigning
then:
- mentionUsers:
mentionees:
- Jaxelr
- DawnWang17
replyTemplate: Thanks for the feedback! We are routing this to the appropriate team for follow-up. cc ${mentionees}.
assignMentionees: False
- if:
- hasLabel:
label: Service Attention
Expand Down
10 changes: 10 additions & 0 deletions .github/template/git-hooks-note.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
The git hooks are available for **azure-cli** and **azure-cli-extensions** repos. They could help you run required checks before creating the PR.

Please sync the latest code with latest dev branch (for **azure-cli**) or main branch (for **azure-cli-extensions**).
After that please run the following commands to enable git hooks:

```bash
pip install azdev --upgrade
azdev setup -c <your azure-cli repo path> -r <your azure-cli-extensions repo path>

```
35 changes: 35 additions & 0 deletions .github/workflows/CreateReleaseTag.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
name: Create Release Tag

on:
push:
branches:
- main
paths:
- 'src/index.json'

jobs:
create-release:
runs-on: windows-latest
permissions:
contents: write

steps:
- uses: actions/checkout@v4
with:
fetch-depth: 2

- name: Set up Python
uses: actions/setup-python@v5
with:
python-version: '3.x'

- name: Install dependencies
run: |
python -m pip install --upgrade pip
pip install requests

- name: Create Release Tag
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
run: |
python scripts/automation/create_release_tag.py
28 changes: 28 additions & 0 deletions .github/workflows/GitHookNotice.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,28 @@
name: Git Hook Notice
on:
pull_request_target:
types: [opened]
branches:
- main

permissions: {}

jobs:
git-hook-notice:
runs-on: ubuntu-latest
permissions:
pull-requests: write
name: Introduce git hook in developer env
steps:
- name: Checkout git hook notice message
uses: actions/checkout@v4
with:
sparse-checkout: |
.github/template/git-hooks-note.md
- name: Comment on pull request
uses: mshick/add-pr-comment@v2
with:
repo-token: ${{ secrets.GITHUB_TOKEN }}
message-id: gitHookNoticeComment
message-path: |
.github/template/git-hooks-note.md
41 changes: 36 additions & 5 deletions azure-pipelines.yml
Original file line number Diff line number Diff line change
Expand Up @@ -164,8 +164,8 @@ jobs:
ADO_PULL_REQUEST_LATEST_COMMIT: HEAD
ADO_PULL_REQUEST_TARGET_BRANCH: $(System.PullRequest.TargetBranch)

- job: AzdevScanModifiedExtensions
displayName: "azdev scan on Modified Extensions"
- job: AzdevScanModifiedExtensionsHigh
displayName: "azdev scan ( High Confidence ) on Modified Extensions"
condition: and(succeeded(), eq(variables['Build.Reason'], 'PullRequest'))
pool:
name: 'pool-ubuntu-2004'
Expand All @@ -182,16 +182,47 @@ jobs:
git fetch origin --depth=1 $(System.PullRequest.TargetBranch)
declare -A secret_files
for FILE in `git diff --name-only --diff-filter=AM origin/$(System.PullRequest.TargetBranch)` ; do
detected=$(azdev scan -f $FILE | python -c "import sys, json; print(json.load(sys.stdin)['secrets_detected'])")
detected=$(azdev scan -f $FILE --continue-on-failure| python -c "import sys, json; print(json.load(sys.stdin)['secrets_detected'])")
if [ $detected == 'True' ]; then
echo "Secrets detected from "$FILE", Please remove or replace it. You can run 'azdev scan'/'azdev mask' locally to fix." 1>&2
printf "\033[0;31mSecrets detected from %s, Please remove or replace it. You can run 'azdev scan'/'azdev mask' locally to fix.\033[0m\n" "$FILE"
secret_files+=$FILE
fi
done
if [ "${#secret_files[@]}" -gt 0 ]; then
exit 1
fi
displayName: "azdev scan on Modified Extensions"
displayName: "azdev scan ( High Confidence ) on Modified Extensions"

- job: AzdevScanProModifiedExtensionsMedium
displayName: "azdev scan ( Medium Confidence ) on Modified Extensions"
dependsOn: AzdevScanModifiedExtensionsHigh
condition: and(succeeded(), eq(variables['Build.Reason'], 'PullRequest'))
continueOnError: true
pool:
name: 'pool-ubuntu-2004'
steps:
- task: UsePythonVersion@0
displayName: 'Use Python 3.11'
inputs:
versionSpec: 3.11
- template: .azure-pipelines/templates/azdev_setup.yml
- bash: |
#!/usr/bin/env bash
set -ev
source ./env/bin/activate
git fetch origin --depth=1 $(System.PullRequest.TargetBranch)
declare -A secret_files
for FILE in `git diff --name-only --diff-filter=AM origin/$(System.PullRequest.TargetBranch)` ; do
detected=$(azdev scan --confidence-level MEDIUM -f $FILE --continue-on-failure| python -c "import sys, json; print(json.load(sys.stdin)['secrets_detected'])")
if [ $detected == 'True' ]; then
printf "\033[0;31mSecrets detected from %s, Please remove or replace it. You can run 'azdev scan --confidence-level MEDIUM'/'azdev mask --confidence-level MEDIUM' locally to fix.\033[0m\n" "$FILE"
secret_files+=$FILE
fi
done
if [ "${#secret_files[@]}" -gt 0 ]; then
exit 1
fi
displayName: "azdev scan ( Medium Confidence ) on Modified Extensions"

#- job: IndexRefDocVerify
# displayName: "Verify Ref Docs"
Expand Down
6 changes: 6 additions & 0 deletions linter_exclusions.yml
Original file line number Diff line number Diff line change
Expand Up @@ -401,6 +401,12 @@ containerapp github-action add:
service_principal_tenant_id:
rule_exclusions:
- option_length_too_long
containerapp label-history show:
rule_exclusions:
- missing_command_test_coverage
containerapp label-history list:
rule_exclusions:
- missing_command_test_coverage
costmanagement export create:
parameters:
definition_dataset_configuration:
Expand Down
1 change: 1 addition & 0 deletions policy.json
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
{"issuerParameters": {"certificateTransparency": null, "name": "Self"}, "keyProperties": {"curve": null, "exportable": true, "keySize": 2048, "keyType": "RSA", "reuseKey": true}, "lifetimeActions": [{"action": {"actionType": "AutoRenew"}, "trigger": {"daysBeforeExpiry": 90}}], "secretProperties": {"contentType": "application/x-pkcs12"}, "x509CertificateProperties": {"keyUsage": ["cRLSign", "dataEncipherment", "digitalSignature", "keyEncipherment", "keyAgreement", "keyCertSign"], "subject": "CN=CLIGetDefaultPolicy", "validityInMonths": 12}}
Loading
Loading