You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
jeremymeng opened this issue
Apr 6, 2023
· 2 comments
Assignees
Labels
ClientThis issue points to a problem in the data-plane of the library.EngSysThis issue is impacting the engineering system.StorageStorage Service (Queues, Blobs, Files)
The text was updated successfully, but these errors were encountered:
jeremymeng
added
EngSys
This issue is impacting the engineering system.
Client
This issue points to a problem in the data-plane of the library.
Storage
Storage Service (Queues, Blobs, Files)
labels
Apr 6, 2023
[Hub Generated] Review request for Microsoft.ContainerService/aks to add version preview/2023-08-02-preview (Azure#25891)
* Adds base for updating Microsoft.ContainerService/aks from version preview/2023-07-02-preview to version 2023-08-02-preview
* Updates readme
* Updates API version in new specs and examples
* update (Azure#25469)
* Fix the IstioComponents structure (Azure#25492)
* add netorkPolicy "none" (Azure#25511)
* add netorkPolicy "none" value and description
* add "none" enum value to networkPolicy
* add addon autoscaling api (Azure#25479)
* Update trusted access put and delete to async operation (Azure#25537)
* Update trusted access put and delete to async operation
* Update example
* Update header
* Swagger changes for adding autoscalerprofile flags for daemonset/multipleexpander (Azure#25487)
* Adding json changes
* adding "daemonsets" to the custom-words
* Editing "Expander" to "expander"
* Removing daemonset custom word from this pr. look at: Azure/azure-rest-api-specs#25533
* Add AzureServiceMesh example (Azure#25560)
* Add AzureServiceMesh example
* Fix AKV resource id format
* enrich ASM examples (Azure#25598)
---------
Co-authored-by: deveshdama <[email protected]>
Co-authored-by: robogatikov <[email protected]>
Co-authored-by: Chih-Sheng Huang <[email protected]>
Co-authored-by: Tongyao Si <[email protected]>
Co-authored-by: Youn Jae Kim <[email protected]>
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Labels
ClientThis issue points to a problem in the data-plane of the library.EngSysThis issue is impacting the engineering system.StorageStorage Service (Queues, Blobs, Files)
Linkified results from aggregate-report run https://dev.azure.com/azure-sdk/public/_build/results?buildId=2683780&view=results (MS INTERNAL). They are all from a signed identifier ID and seems like a false positive.
<SignedIdentifier><Id>MTIzNDU2Nzg5MDEyMzQ1Njc4OTAxMjM0NTY3ODkwMTI=</Id><AccessPolicy><Permission>raup</Permission></AccessPolicy></SignedIdentifier>
Tool: Credential Scanner: Rule: CSCAN-AZURE0060 (Azure Storage Account Shared Access Signature). https://aka.ms/credscan
A potential secret was detected in 'recording_setaccesspolicy.js':(CSCAN-AZURE0060 Azure Storage Account Shared Access Signature) Validate file contains secrets, remove, roll credential, and use approved store. For additional information on secret remediation see https://aka.ms/credscan.
Tool: Credential Scanner: Rule: CSCAN-AZURE0060 (Azure Storage Account Shared Access Signature). https://aka.ms/credscan
A potential secret was detected in 'recording_setaccesspolicy.js':(CSCAN-AZURE0060 Azure Storage Account Shared Access Signature) Validate file contains secrets, remove, roll credential, and use approved store. For additional information on secret remediation see https://aka.ms/credscan.
Tool: Credential Scanner: Rule: CSCAN-AZURE0060 (Azure Storage Account Shared Access Signature). https://aka.ms/credscan
A potential secret was detected in 'recording_setaccesspolicy_and_getaccesspolicy_with_empty_signedidentifier.js':(CSCAN-AZURE0060 Azure Storage Account Shared Access Signature) Validate file contains secrets, remove, roll credential, and use approved store. For additional information on secret remediation see https://aka.ms/credscan.
Tool: Credential Scanner: Rule: CSCAN-AZURE0060 (Azure Storage Account Shared Access Signature). https://aka.ms/credscan
A potential secret was detected in 'recording_setaccesspolicy_and_getaccesspolicy_with_empty_signedidentifier.js':(CSCAN-AZURE0060 Azure Storage Account Shared Access Signature) Validate file contains secrets, remove, roll credential, and use approved store. For additional information on secret remediation see https://aka.ms/credscan.
Tool: Credential Scanner: Rule: CSCAN-AZURE0060 (Azure Storage Account Shared Access Signature). https://aka.ms/credscan
A potential secret was detected in 'recording_setaccesspolicy_negative.json':(CSCAN-AZURE0060 Azure Storage Account Shared Access Signature) Validate file contains secrets, remove, roll credential, and use approved store. For additional information on secret remediation see https://aka.ms/credscan.
Tool: Credential Scanner: Rule: CSCAN-AZURE0060 (Azure Storage Account Shared Access Signature). https://aka.ms/credscan
A potential secret was detected in 'recording_setaccesspolicy_negative.js':(CSCAN-AZURE0060 Azure Storage Account Shared Access Signature) Validate file contains secrets, remove, roll credential, and use approved store. For additional information on secret remediation see https://aka.ms/credscan.
Tool: Credential Scanner: Rule: CSCAN-AZURE0060 (Azure Storage Account Shared Access Signature). https://aka.ms/credscan
A potential secret was detected in 'recording_setaccesspolicy.js':(CSCAN-AZURE0060 Azure Storage Account Shared Access Signature) Validate file contains secrets, remove, roll credential, and use approved store. For additional information on secret remediation see https://aka.ms/credscan.
Tool: Credential Scanner: Rule: CSCAN-AZURE0060 (Azure Storage Account Shared Access Signature). https://aka.ms/credscan
A potential secret was detected in 'recording_setaccesspolicy.js':(CSCAN-AZURE0060 Azure Storage Account Shared Access Signature) Validate file contains secrets, remove, roll credential, and use approved store. For additional information on secret remediation see https://aka.ms/credscan.
Tool: Credential Scanner: Rule: CSCAN-AZURE0060 (Azure Storage Account Shared Access Signature). https://aka.ms/credscan
A potential secret was detected in 'recording_setaccesspolicy_should_work_when_permissions_expiry_and_start_undefined.js':(CSCAN-AZURE0060 Azure Storage Account Shared Access Signature) Validate file contains secrets, remove, roll credential, and use approved store. For additional information on secret remediation see https://aka.ms/credscan.
Tool: Credential Scanner: Rule: CSCAN-AZURE0060 (Azure Storage Account Shared Access Signature). https://aka.ms/credscan
A potential secret was detected in 'recording_setaccesspolicy_should_work_when_permissions_expiry_and_start_undefined.js':(CSCAN-AZURE0060 Azure Storage Account Shared Access Signature) Validate file contains secrets, remove, roll credential, and use approved store. For additional information on secret remediation see https://aka.ms/credscan.
Tool: Credential Scanner: Rule: CSCAN-AZURE0060 (Azure Storage Account Shared Access Signature). https://aka.ms/credscan
A potential secret was detected in 'recording_setaccesspolicy_should_work_when_permissions_expiry_and_start_undefined.js':(CSCAN-AZURE0060 Azure Storage Account Shared Access Signature) Validate file contains secrets, remove, roll credential, and use approved store. For additional information on secret remediation see https://aka.ms/credscan.
Tool: Credential Scanner: Rule: CSCAN-AZURE0060 (Azure Storage Account Shared Access Signature). https://aka.ms/credscan
A potential secret was detected in 'recording_setaccesspolicy_should_work_when_permissions_expiry_and_start_undefined.js':(CSCAN-AZURE0060 Azure Storage Account Shared Access Signature) Validate file contains secrets, remove, roll credential, and use approved store. For additional information on secret remediation see https://aka.ms/credscan.
Active results: 12
The text was updated successfully, but these errors were encountered: