Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged main to shared/livetest #20918

Merged
merged 124 commits into from
Feb 14, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
124 commits
Select commit Hold shift + click to select a range
fc89a3b
Fix example 1 in Set-AzVirtualNetworkPeering.md (#20588)
Ar-Sa Jan 10, 2023
950f7d4
{EventHub} Fix #20562: Fix 'New-AzEventHubAuthorizationRuleSASToken' …
RakeshMohanMSFT Jan 10, 2023
f3f65e2
Revise common assembly doc (#20465)
isra-fel Jan 10, 2023
9a3ae62
[AKS] support AadProfile (#20596)
YanaXu Jan 10, 2023
7ff173a
[Network] New-AzNetworkWatcherPacketCapture - TotalBytesPerSession wi…
v-sapanchal Jan 11, 2023
bb60fb4
Move LoadTesting to main (#20622)
azure-powershell-bot Jan 11, 2023
e98462b
Move BillingBenefits to main (#20624)
azure-powershell-bot Jan 11, 2023
e1ff717
Update changelog as per PR#20426 (#20616)
imsiddhartha Jan 12, 2023
c5b7bf0
Fix the issue that CI will fail to when tools is updated in generatio…
wyunchi-ms Jan 12, 2023
98a1b3a
Domain name of online doc is changed from docs.microsoft.com to learn…
LucasYao93 Jan 16, 2023
1ce2d4e
Domain name of online doc is changed from docs.microsoft.com to learn…
LucasYao93 Jan 16, 2023
2e3c703
Domain name of online doc is changed from docs.microsoft.com to learn…
LucasYao93 Jan 16, 2023
c0dcab7
Enabled to set perform snat to always when PrivateRange is set to 255…
Gizachew-Eshetie Jan 16, 2023
94fd995
Rename the name to PhaseName (#20651)
wyunchi-ms Jan 16, 2023
33ad3cb
Fix format issue of Remove-AzPostgreSqlFlexibleServerDatabase ref doc…
msJinLei Jan 16, 2023
4145dd4
Fix Az.Accounts cannot be imported due to assembly not found (#20637)
isra-fel Jan 16, 2023
7c135d8
Add support for the case that psd1 and help are in the {module}.Manae…
dolauli Jan 16, 2023
ceec33e
Fixed the issue when support help and psd1 in {module}.Management fol…
dolauli Jan 16, 2023
04417f5
Update the check rules and update some exception files (#20647)
wyunchi-ms Jan 16, 2023
7dfbf1c
Mitryakh/nrp test fixes (#20612)
MikhailTryakhov Jan 17, 2023
f4012a6
Fixed typo "resouce group"→"resource group" (#20664)
hyoshioka0128 Jan 17, 2023
4f9d618
[AppService]: doc-update #12181- AppSettingsOverrides in New-AzWebApp…
Kotasudhakarreddy Jan 17, 2023
54a771d
Migrate MobileNetwork from generation to main (#20673)
azure-powershell-bot Jan 17, 2023
332c0bd
Change test coverage log to debug level (#20648)
isra-fel Jan 17, 2023
fe9757d
Added HAReplicaCount parameter to restore-AzSqlDatabase cmdlet (#20580)
rebeccaxu-ms Jan 17, 2023
c15aaf3
[Storage Dataplane] - Remove Validation Set and move to track2 SDK fo…
blueww Jan 18, 2023
dbfd3f6
Updated script to build TestFx environment as well as the document (#…
vidai-msft Jan 18, 2023
d1d0f71
{AppServices} Update AccountName parameter description (#20607)
SaurabhSharma-MSFT Jan 18, 2023
b5de2a7
add param to New-AzRestorePoint (#20645)
grizzlytheodore Jan 19, 2023
ac1f259
Move BillingBenefits to main (#20706)
azure-powershell-bot Jan 19, 2023
6961ced
BillingBenefits and LoadTesting OOB (#20629)
isra-fel Jan 20, 2023
1599bae
Domain name of online doc is changed from docs.microsoft.com to learn…
LucasYao93 Jan 20, 2023
34c86bf
Domain name of online doc is changed from docs.microsoft.com to learn…
LucasYao93 Jan 20, 2023
7c473f9
Domain name of online doc is changed from docs.microsoft.com to learn…
LucasYao93 Jan 20, 2023
5e1c5dd
Domain name of online doc is changed from docs.microsoft.com to learn…
LucasYao93 Jan 20, 2023
66fbe36
Domain name of online doc is changed from docs.microsoft.com to learn…
LucasYao93 Jan 20, 2023
4a96b1b
Domain name of online doc is changed from docs.microsoft.com to learn…
LucasYao93 Jan 20, 2023
7112437
Domain name of online doc is changed from docs.microsoft.com to learn…
LucasYao93 Jan 20, 2023
c1a97a3
Domain name of online doc is changed from docs.microsoft.com to learn…
LucasYao93 Jan 20, 2023
2c6181f
Microsoft mandatory file (#20737)
microsoft-github-policy-service[bot] Jan 26, 2023
a54d400
Fill in empty Compute parameter descriptions (#20726)
Sandido Jan 27, 2023
68218ca
Update StorageAccountType LRS values to correct _LRS format (#20727)
Sandido Jan 27, 2023
a370dcd
Remove the useless projects under tools folder (#20633)
wyunchi-ms Jan 27, 2023
ef2ee75
[CosmosDB] Modify Example 1 with the correct cmdlet (#20707)
SaurabhSharma-MSFT Jan 28, 2023
a9e9131
update Compute .Net SDK version to 59 (#20524)
Sandido Jan 28, 2023
2b5fb75
{AzurePolicy} fixes Azure/azure-powershell#20654 fix the description …
navba-MSFT Jan 28, 2023
c54c766
[SQL] umi support for auditing (#20750)
IliasKhan Jan 28, 2023
1a06246
Updated the max value for HAReplicaCount parameter (#20752)
rebeccaxu-ms Jan 28, 2023
8915c32
[AppGW] Start-AzApplicationGateway docs example (#20699)
JackStromberg Jan 28, 2023
12e4910
{Sql} Fix #20703: Fix 'Set-AzSqlServerAudit' missing WorkSpaceResourc…
RakeshMohanMSFT Jan 28, 2023
df75309
Fix the issue of wrong format of csv (#20765)
wyunchi-ms Jan 29, 2023
134b0bd
[Redis] Update `Get-AzRedisCacheLink` and `New-AzRedisCacheLink` to p…
austintolani Jan 30, 2023
9e0d50d
Add Azure Firewall SKU Upgrade Example (#20686)
bewatersmsft Jan 30, 2023
e403a7f
[DataFactory]Updated ADF .Net SDK version to 9.0.0 (#20676)
Jingshu923 Jan 30, 2023
62745f1
Typo "resouce group"→"resource group" (#20713)
hyoshioka0128 Jan 30, 2023
867ce18
[Storage] Add warning message for AllowBlobPublicAccess default behav…
yifanz0 Jan 30, 2023
b24a273
Corrected disallowed html tags from docs build report (#20643)
mikefrobbins Jan 30, 2023
810d64f
Corrected broken links from docs build report (#20642)
mikefrobbins Jan 30, 2023
23aad2b
Replace Get-InstalledModule with Get-Module -ListAvailable (#20632)
msJinLei Jan 30, 2023
459b6f6
Migrate ApplicationInsights from generation to main (#20782)
azure-powershell-bot Jan 30, 2023
4773fed
Managed database cross subscription restore (#20735)
milanbrkic-ms Jan 31, 2023
eaa4d09
Add module version to changelog (#20669)
wyunchi-ms Jan 31, 2023
c414be6
TargetExtendedLocation support for GalleryImageVersion (#20748)
grizzlytheodore Jan 31, 2023
d969f2d
Migrate StackHCI from generation to main (#20785)
azure-powershell-bot Jan 31, 2023
7750474
[Peering] Migrate to autorest and support API version 2022-10-01 (#20…
lijinpei2008 Jan 31, 2023
0ecbc3c
[AKS] support HostGroupID (#20796)
YanaXu Jan 31, 2023
664e09d
Migrate DataProtection from generation to main (#20786)
azure-powershell-bot Jan 31, 2023
0997c93
[Resources] Handle nested array changes in What-If formatter (#20689)
shenglol Jan 31, 2023
577ff8d
Migrate Compute from generation to main (#20788)
azure-powershell-bot Jan 31, 2023
4f3758a
win-arm64 support for WAM (#20797)
isra-fel Jan 31, 2023
1cc694b
[AppService]: fix #20746 New-AzWebAppCertificate -hostname indicates …
Kotasudhakarreddy Jan 31, 2023
1ee69ed
Format changelog.md (#20800)
isra-fel Jan 31, 2023
eaa5066
Migrate VoiceServices from generation to main (#20798)
azure-powershell-bot Jan 31, 2023
90495c5
Add managed instance DTC cmdlets (#20805)
krivi37 Jan 31, 2023
9cca982
Revert the UbuntuLTS image alias to use the version 16.04 instead of …
Sandido Feb 1, 2023
f8ebd0d
Fixed query issue when objectId in assignment is empty for Get-DenyAs…
BethanyZhou Feb 1, 2023
9de7b56
changed domain name of online. (#20802)
LucasYao93 Feb 1, 2023
bc01fa8
Typo "udpate"→"update" (#20810)
hyoshioka0128 Feb 1, 2023
71cf922
[Compute] Added `-SkipIdentity`, `-PathUserIdentity`, `-IsTest` to `S…
maxthedread Feb 1, 2023
41a7c38
[Az.RecoveryServices.Backup] Added support for Private Endpoints and …
hiaga Feb 1, 2023
31d2506
Move MobileNetwork to release-2023-02-07 (#20821)
azure-powershell-bot Feb 1, 2023
d2fbb74
Update the logic of get commit id in autorest generation (#20827)
wyunchi-ms Feb 2, 2023
bc78f20
Move Peering to release-2023-02-07 (#20833)
azure-powershell-bot Feb 2, 2023
fc2fa77
[AKS] fix a bug in zip on windows (#20832)
YanaXu Feb 3, 2023
1115b94
Fix the bugs for AzKeyStore (#20768)
msJinLei Feb 3, 2023
1545f52
Migrate Monitor from generation to release-2023-02-07 (#20841)
azure-powershell-bot Feb 3, 2023
e9b7a68
release-2023-02-07 (#20843)
isra-fel Feb 3, 2023
82d7d99
Merge branch 'main' into release-2023-02-07
isra-fel Feb 3, 2023
27b6922
Update Reference to latest swagger for Runbook Cmdlets (#20803)
sushil490023 Feb 6, 2023
563a918
{AzureDataShare} fixes Azure/azure-powershell#20822 fix the descripti…
navba-MSFT Feb 6, 2023
c21cc3f
{AzureSubscription} fixes Azure/azure-powershell#20812 fix the worklo…
navba-MSFT Feb 6, 2023
7cb8173
release-2023-02-07
isra-fel Feb 6, 2023
88a2cc5
Fix daily smoke test error of ThreadJob installation (#20856)
msJinLei Feb 6, 2023
93a8895
Migrate DataMigration from generation to main (#20857)
azure-powershell-bot Feb 7, 2023
c663ad8
[Az.Automanage] Az.Automanage General Available (#20860)
BethanyZhou Feb 7, 2023
d6ba47d
[Storage] Fix help file format per static analysis result (#20774)
yifanz0 Feb 7, 2023
8afc22b
Bug : classic fw private ranges reverts to default when doing get & s…
Gizachew-Eshetie Feb 7, 2023
380bb09
added support for windows 2022 server for service fabric cluster (#20…
demodh Feb 8, 2023
ebe9037
OOB release for Az.Automation (#20874)
BethanyZhou Feb 8, 2023
d4fb1f6
Removed some of the run instances for the time being
vidai-msft Feb 8, 2023
64c1955
add pipeline yml for syncing fabricbot.json aliases (#20772)
greathongtu Feb 9, 2023
939205c
[Policy Insights] Added cmdlets for policy attestations (#20696)
samarthlakhotia Feb 9, 2023
cf2cba8
[Security] Update Security module based on .NET SDK track1, using sou…
yibirnba Feb 9, 2023
7ca311e
Fix ThreadJob installation error of smoke test (#20867)
msJinLei Feb 9, 2023
e723880
Fix unexpected recommendation message (#20880)
isra-fel Feb 9, 2023
e55bf29
Update Azure.Core from 1.25.0 to 1.28.0 (#20889)
isra-fel Feb 10, 2023
d4510cc
updata some old moudle metadata json file (#20892)
greathongtu Feb 10, 2023
0587ef1
Merge remote-tracking branch 'upstream/shared/livetest' into shared/l…
vidai-msft Feb 10, 2023
5672de1
Enabled debug log and added more debug info to Aks live test
vidai-msft Feb 10, 2023
e2ed802
[DataFactory]Updated ADF .Net SDK version to 9.1.0 (#20875)
Jingshu923 Feb 10, 2023
2577567
Service Client Code generation for Redis Cache RP (#20894)
rohanand-MS Feb 10, 2023
a317e63
Change sync alias.yml (#20899)
greathongtu Feb 10, 2023
97176e9
Correct help docs for *-AzCosmosDBAccount (#20891)
BethanyZhou Feb 10, 2023
58aa75d
Sync fabricbot.json (#20831)
azure-powershell-bot Feb 13, 2023
565c798
[Az.DataMigration] Change Azure Database Migration Service in documen…
ash1625 Feb 13, 2023
e28579e
Corrected syntax for ConfirmAction (#20902)
brettmillerb Feb 13, 2023
d67d180
Update New-AzSynapseRoleAssignment.md (#20905)
meenalsri Feb 13, 2023
33f2ffe
Update Remove-AzSynapseRoleAssignment.md (#20906)
meenalsri Feb 13, 2023
7c0057c
Added note for scenario when an SPN role assignment is listed (#20907)
meenalsri Feb 13, 2023
ddf4080
Use pwsh7.2.8 temporarily till 7.2.10 is available (#20911)
BethanyZhou Feb 13, 2023
4d1b136
Fix the issue that CI doesn't check online version of help doc (#20901)
wyunchi-ms Feb 13, 2023
80470b8
Snat cmdlet fwp (#20854)
Gizachew-Eshetie Feb 14, 2023
f44cad1
OOB of Az.ConnectedKubernetes (#20904)
Nickcandy Feb 14, 2023
488facc
Merge remote-tracking branch 'upstream/main' into shared/livetest
vidai-msft Feb 14, 2023
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
The diff you're trying to view is too large. We only load the first 3000 changed files.
2 changes: 1 addition & 1 deletion .azure-pipelines/live-test.yml
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ parameters:
- name: ps_7_2_x
displayName: PowerShell 7.2.x Version
type: string
default: 7.2.9
default: 7.2.8
- name: ps_latest
displayName: PowerShell Latest Version
type: string
Expand Down
4 changes: 2 additions & 2 deletions .azure-pipelines/release-test.yml
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ parameters:
- name: ps7_2
displayName: PowerShell 7.2.x Version
type: string
default: 7.2.*
default: 7.2.8
- name: ps7_3
displayName: PowerShell 7.3.x Version
type: string
Expand Down Expand Up @@ -198,4 +198,4 @@ jobs:
agentPoolName: ${{ variables.macOsAgentPoolName }}
agentPoolVMImage: ${{ variables.macOsAgentPoolVMImage }}
psVersion: ${{ parameters.preview_ps }}
netCoreVersion: ${{ parameters.netCoreVersion_7 }}
netCoreVersion: ${{ parameters.netCoreVersion_7 }}
36 changes: 36 additions & 0 deletions .azure-pipelines/sync-aliases.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,36 @@
# Variable 'ADOToken' and 'BotAccessToken' was defined in the Variables tab
schedules:
- cron: "50 15 * * *"
displayName: 11:50 PM (UTC + 8:00) China Daily Run
branches:
include:
- main

jobs:
- job: UpdateJson
displayName: Update fabricbot.json
steps:
- pwsh: |
./tools/Github/ParseWiki2Json.ps1 -ADOToken $(ADOToken)
displayName: Update fabricbot.json file locally

- pwsh: |
git config --global user.email "[email protected]"
git config --global user.name "azure-powershell-bot"
git checkout -b "internal/sync-fabricbot-json"

git add .
git commit -m "Sync fabricbot.json"

git remote set-url origin https://azure-powershell-bot:$(BotAccessToken)@github.com/Azure/azure-powershell.git;
git push origin internal/sync-fabricbot-json --force
displayName: Git commit and push

- pwsh: |
$Title = "Sync fabricbot.json According To ADO Wiki Page"
$HeadBranch = "internal/sync-fabricbot-json"
$BaseBranch = "main"
$Description = "This PR sync taskType: scheduledAndTrigger part of fabricbot.json from table of Service-Team-Label-and-Contact-List in ADO wiki page"
./tools/Github/CreatePR.ps1 -Title $Title -HeadBranch $HeadBranch -BaseBranch $BaseBranch -BotAccessToken $(BotAccessToken) -Description $Description
displayName: Create PR to main branch

3 changes: 0 additions & 3 deletions .ci-config.json
Original file line number Diff line number Diff line change
Expand Up @@ -264,10 +264,7 @@
"tools/Gen2Master/*",
"tools/InstallationTests/*",
"tools/Installer/*",
"tools/NetCoreCsProjSync/*",
"tools/NetCorePsd1Sync/*",
"tools/ProjectTemplates/*",
"tools/RepoTasks/*",
"tools/SecurityTools/*",
"tools/Test/*",
"tools/Tools.Common.Test/*",
Expand Down
4 changes: 2 additions & 2 deletions .github/fabricbot.json
Original file line number Diff line number Diff line change
Expand Up @@ -1064,7 +1064,7 @@
],
"mentionees": [
"mojayara",
"Prasanna-Padmanabhan"
"jportugal0"
]
},
{
Expand Down Expand Up @@ -2231,7 +2231,7 @@
"Migrate"
],
"mentionees": [
"shijojoy"
"prsadhu-ms-idc"
]
},
{
Expand Down
98 changes: 98 additions & 0 deletions ChangeLog.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,101 @@
## 9.4.0 - February 2023
#### Az.Accounts 2.11.2
* Supported Web Account Manager on ARM64-based Windows systems. Fixed an issue where 'Connect-AzAccount' failed with error 'Unable to load DLL 'msalruntime_arm64''. [#20700]
* Enabled credential to be found only by applicationId while tenant was not matched when accquire token. [#20484]
* When Az.Accounts ran in parallel, the waiters were allowed to wait infinitely to avoid throw exception in automation enviroment. [#20455]

#### Az.Aks 5.3.0
* Added parameter '-AadProfile' for 'New-AzAksCluster' and 'Set-AzAksCluster'
* Added parameter '-NodeHostGroupID' for 'New-AzAksCluster' and parameter '-HostGroupID' for 'New-AzAksNodePool'

#### Az.ApplicationInsights 2.2.2
* Added parameter validation for 'Get-AzApplicationInsights' [#20697]

#### Az.Compute 5.4.0
* Added '-SkipIdentity', '-PathUserIdentity', '-IsTest' parameter to 'Set-AzVMAEMExtension'
* Added 'ConsistencyMode' parameter to 'New-AzRestorePoint'.
* Updated the storage account type value in several locations from the outdated 'StandardLRS' to the current 'Standard_LRS'.
* Filled in missing parameter descriptions across multiple parameters and improved some existing parameter descriptions.
* Updated Compute PS to use the new .Net SDK version 59.0.0. This includes an approved breaking change for a non-functional feature.
- The type of the property 'Source' of type 'Microsoft.Azure.Management.Compute.Models.GalleryDataDiskImage', 'Microsoft.Azure.Management.Compute.Models.GalleryOSDiskImage', and 'Microsoft.Azure.Management.Compute.Models.GalleryImageVersionStorageProfile' has changed from 'Microsoft.Azure.Management.Compute.Models.GalleryArtifactVersionSource' to 'Microsoft.Azure.Management.Compute.Models.GalleryDiskImageSource'.
* Updated the broken 'UbuntuLTS' image alias to use its original sku version of '16.04-LTS' instead of the nonexistent image '20.04-LTS'. This fixes an issue introduced in the version 5.3.0 release.
* Updated Set-AzVMRunCommand and Set-AzVmssRunCommand ScriptLocalPath parameter set to work with Linux and with files that have comments.
* Added '-TargetExtendedLocation' parameter to 'New-AzGalleryImageVersion' and 'Update-AzGalleryImageVersion'
* Added '-AllowDeletionOfReplicatedLocation' to 'Update-AzGalleryImageVersion'

#### Az.DataFactory 1.16.12
* Updated ADF .Net SDK version to 9.0.0

#### Az.DataProtection 1.1.0
* Added support for Immutable backup vaults
* Added Cross subscription restore flag for backup vaults
* Added Soft delete setting for backup vaults
* Fixed issue with Set-AzDataProtectionMSIPermission command
* Replaced Get-InstalledModule with Get-Module -ListAvailable
* Added New-AzDataProtectionSoftDeleteSettingObject command

#### Az.EventHub 3.2.1
* Fixed 'New-AzEventHubAuthorizationRuleSASToken' cmdlet which was returning wrong skn value

#### Az.Monitor 4.4.1
* Removed default value for time window for autoscale profile [#20660]
* 'Get-AzAutoscaleSetting'
* 'New-AzAutoscaleSetting'

#### Az.Network 5.4.0
* Fixed a bug that does not enable to set Perform SNAT to Always
* Fixed the incorrect type of '-TotalBytesPerSession' in 'New-AzNetworkWatcherPacketCapture'

#### Az.RecoveryServices 6.2.0
* Added support for enable/disable Public Network Access and PrivateEndpoints
* Added support for Immutable Vaults
* Added support for RetainRecoveryPointsAsPerPolicy in Disable-AzRecoveryServicesBackupProtection cmdlet. Now user can suspend backups and retain RPs as per policy
* Added List Recovery Point expiry time
* Added RecoveryServices, RecoveryServices.Backup, RecoveryServices.Backup.CrossRegionRestore management SDK
* Added support for non-UTC time zones with standard policy for workloadType IaasVM, MSSql, AzureFiles

#### Az.RedisCache 1.7.1
* Updated 'Get-AzRedisCacheLink' and 'New-AzRedisCacheLink' to print 'PrimaryHostName', 'GeoReplicatedPrimaryHostName', 'ServerRole', and 'LinkedRedisCacheLocation'.

#### Az.Resources 6.5.2
* Fixed query issue when objectId in assignment is empty for 'Get-DenyAssignment'
* Fixed an issue where running deployment cmdlets with '-WhatIf' throws exception when formatting results with nested array changes

#### Az.Sql 4.3.0
* Added an optional parameter 'HAReplicaCount' to 'Restore-AzSqlDatabase'
* Added new cmdlets for managed instance DTC
'Get-AzSqlInstanceDtc'
'Set-AzSqlInstanceDtc'
* Added 'TargetSubscriptionId' to 'Restore-AzSqlInstanceDatabase' in order to enable cross subscription restore
* Enabled support for UserAssignedManagedIdentity in Auditing
* Fixed WorkspaceResourceId parameter value in 'Set-AzSqlServerAudit'

#### Az.StackHCI 1.4.2
* Added Remote Support terms and conditions for HCI device types.
* Unified Resource Group support for both Azure Stack HCI and Arc for server resources.
* Enhanced error feedback and logging in the Register-AzStackHCI cmdlet.
* Bug fixes and improvements in Azure Arc for servers enablement in Register-AzStackHCI cmdlet.
* Improved parameter validations in the Register-AzStackHCI cmdlet.
* Enabled Managed System Identity (MSI) for Registration in Fairfax Cloud.
* Minor bug fixes and improvements.

#### Az.Storage 5.4.0
* Added a warning message for the upcoming breaking change when creating a Storage account
- 'New-AzStorageAccount'
* Removed the ValidateSet of StandardBlobTier parameter
- 'Copy-AzStorageBlob'
- 'Set-AzStorageBlobContent'
- 'Start-AzStorageBlobCopy'

#### Az.TrafficManager 1.2.0
* Added a new optional parameter 'AlwaysServe' for endpoints.

### Thanks to our community contributors
* Arun Sabale (@Ar-Sa), Fix example 1 in Set-AzVirtualNetworkPeering.md (#20588)
* Hiroshi Yoshioka (@hyoshioka0128)
* Fixed typo "resouce group"→"resource group" (#20664)
* Typo "resouce group"→"resource group" (#20713)

## 9.3.0 - January 2023
#### Az.Accounts
* Supported Web Account Manager (WAM) as an opt-in interactive login experience. Enable it by 'Update-AzConfig -EnableLoginByWam True'.
Expand Down
41 changes: 41 additions & 0 deletions SECURITY.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,41 @@
<!-- BEGIN MICROSOFT SECURITY.MD V0.0.8 BLOCK -->

## Security

Microsoft takes the security of our software products and services seriously, which includes all source code repositories managed through our GitHub organizations, which include [Microsoft](https://github.com/microsoft), [Azure](https://github.com/Azure), [DotNet](https://github.com/dotnet), [AspNet](https://github.com/aspnet), [Xamarin](https://github.com/xamarin), and [our GitHub organizations](https://opensource.microsoft.com/).

If you believe you have found a security vulnerability in any Microsoft-owned repository that meets [Microsoft's definition of a security vulnerability](https://aka.ms/opensource/security/definition), please report it to us as described below.

## Reporting Security Issues

**Please do not report security vulnerabilities through public GitHub issues.**

Instead, please report them to the Microsoft Security Response Center (MSRC) at [https://msrc.microsoft.com/create-report](https://aka.ms/opensource/security/create-report).

If you prefer to submit without logging in, send email to [[email protected]](mailto:[email protected]). If possible, encrypt your message with our PGP key; please download it from the [Microsoft Security Response Center PGP Key page](https://aka.ms/opensource/security/pgpkey).

You should receive a response within 24 hours. If for some reason you do not, please follow up via email to ensure we received your original message. Additional information can be found at [microsoft.com/msrc](https://aka.ms/opensource/security/msrc).

Please include the requested information listed below (as much as you can provide) to help us better understand the nature and scope of the possible issue:

* Type of issue (e.g. buffer overflow, SQL injection, cross-site scripting, etc.)
* Full paths of source file(s) related to the manifestation of the issue
* The location of the affected source code (tag/branch/commit or direct URL)
* Any special configuration required to reproduce the issue
* Step-by-step instructions to reproduce the issue
* Proof-of-concept or exploit code (if possible)
* Impact of the issue, including how an attacker might exploit the issue

This information will help us triage your report more quickly.

If you are reporting for a bug bounty, more complete reports can contribute to a higher bounty award. Please visit our [Microsoft Bug Bounty Program](https://aka.ms/opensource/security/bounty) page for more details about our active programs.

## Preferred Languages

We prefer all communications to be in English.

## Policy

Microsoft follows the principle of [Coordinated Vulnerability Disclosure](https://aka.ms/opensource/security/cvd).

<!-- END MICROSOFT SECURITY.MD BLOCK -->
1 change: 0 additions & 1 deletion build.proj
Original file line number Diff line number Diff line change
Expand Up @@ -236,7 +236,6 @@
<MakeDir Directories="$(StaticAnalysisOutputDirectory)" />

<Exec Command="$(PowerShellCoreCommandPrefix) &quot;Set-Variable -Name ProgressPreference -Value 'SilentlyContinue';. $(RepoTools)/GenerateHelp.ps1 -ValidateMarkdownHelp -GenerateMamlHelp -BuildConfig $(Configuration)&quot;" />
<Exec Command="dotnet $(RepoArtifacts)StaticAnalysis/StaticAnalysis.Netcore.dll -p $(RepoArtifacts)$(Configuration) -r $(StaticAnalysisOutputDirectory) --analyzers help -h -u -m '@(ModulesChanged)'" Condition="'$(RunStaticAnalysis)' == 'true'" />
</Target>

<!-- Everything except Publish -->
Expand Down
2 changes: 1 addition & 1 deletion documentation/announcing-az-module.md
Original file line number Diff line number Diff line change
Expand Up @@ -173,7 +173,7 @@ Az and AzureRM cannot be imported side-by-side into the same PowerShell session.
- Install Az and AzureRM side-by-side in Windows PowerShell and ensure scripts do not mix the modules

#### Install Az in PowerShell 7
You can follow the instructions in [Installing PowerShell 7 on Windows](https://docs.microsoft.com/powershell/scripting/install/installing-powershell-core-on-windows
You can follow the instructions in [Installing PowerShell 7 on Windows](https://learn.microsoft.com/powershell/scripting/install/installing-powershell-core-on-windows
) to install PowerShell 7, then use ```Install-Module Az``` in PowerShell 7 to acquire the Az module. Since Windows PowerShell and PowerShell 7 can exist side-by-side and do not share module directories, this will effectively isolate the two modules.

#### Install Az and AzureRM Side-by-Side
Expand Down
3 changes: 3 additions & 0 deletions documentation/azure-powershell-modules.md
Original file line number Diff line number Diff line change
Expand Up @@ -105,6 +105,7 @@ Marketplace Ordering | `Az.MarketplaceOrdering`
Media | `Az.Media` | [![Media]][MediaGallery]
Migrate | `Az.Migrate` | [![Migrate]][MigrateGallery]
Mixed Reality | `Az.MixedReality` | [![MixedReality]][MixedRealityGallery]
Mobile Network | `Az.MobileNetwork` | [![MobileNetwork]][MobileNetworkGallery]
Monitor | `Az.Monitor` | [![Monitor]][MonitorGallery]
Monitoring Solutions | `Az.MonitoringSolutions` | [![MonitoringSolutions]][MonitoringSolutionsGallery]
Database for MySQL | `Az.MySql` | [![MySql]][MySqlGallery]
Expand Down Expand Up @@ -257,6 +258,7 @@ Windows Iot Services | `Az.WindowsIotServices`
[Media]: https://img.shields.io/powershellgallery/v/Az.Media.svg?style=flat-square&label=Az.Media
[Migrate]: https://img.shields.io/powershellgallery/v/Az.Migrate.svg?style=flat-square&label=Az.Migrate
[MixedReality]: https://img.shields.io/powershellgallery/v/Az.MixedReality.svg?style=flat-square&label=Az.MixedReality
[MobileNetwork]: https://img.shields.io/powershellgallery/v/Az.MobileNetwork.svg?style=flat-square&label=Az.MobileNetwork
[Monitor]: https://img.shields.io/powershellgallery/v/Az.Monitor.svg?style=flat-square&label=Az.Monitor
[MonitoringSolutions]: https://img.shields.io/powershellgallery/v/Az.MonitoringSolutions.svg?style=flat-square&label=Az.MonitoringSolutions
[MySql]: https://img.shields.io/powershellgallery/v/Az.MySql.svg?style=flat-square&label=Az.MySql
Expand Down Expand Up @@ -407,6 +409,7 @@ Windows Iot Services | `Az.WindowsIotServices`
[MediaGallery]: https://www.powershellgallery.com/packages/Az.Media/
[MigrateGallery]: https://www.powershellgallery.com/packages/Az.Migrate/
[MixedRealityGallery]: https://www.powershellgallery.com/packages/Az.MixedReality/
[MobileNetworkGallery]: https://www.powershellgallery.com/packages/Az.MobileNetwork/
[MonitorGallery]: https://www.powershellgallery.com/packages/Az.Monitor/
[MonitoringSolutionsGallery]: https://www.powershellgallery.com/packages/Az.MonitoringSolutions/
[MySqlGallery]: https://www.powershellgallery.com/packages/Az.MySql/
Expand Down
7 changes: 7 additions & 0 deletions documentation/breaking-changes/upcoming-breaking-changes.md
Original file line number Diff line number Diff line change
Expand Up @@ -1205,6 +1205,13 @@
- The following properties in the output type are being deprecated : 'BackupStorageRedundancy'
- The following properties are being added to the output type : 'CurrentBackupStorageRedundancy' 'RequestedBackupStorageRedundancy'

## Az.Storage

### `New-AzStorageAccount`

- Cmdlet breaking-change will happen to all parameter set
- Default value of AllowBlobPublicAccess will be changed from True to False in a future release. When AllowBlobPublicAccess is False on a storage account, it is not permitted to configure container ACLs to allow anonymous access to blobs within the storage account.

## Az.StorageSync

### `Set-AzStorageSyncServerEndpoint`
Expand Down
Loading