Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Release 1.23.1025.1 #3834

Merged
merged 37 commits into from
Oct 25, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
37 commits
Select commit Hold shift + click to select a range
e44c2bc
Adds Auth Context support for conditional access policies
NikCharlebois Oct 19, 2023
41c6ef8
Update CHANGELOG.md
NikCharlebois Oct 19, 2023
62c313b
Merge pull request #3816 from NikCharlebois/AADConditionalAccessPolic…
NikCharlebois Oct 19, 2023
a6d17fd
Updated Resources and Cmdlet documentation pages
NikCharleboisPFE Oct 19, 2023
06b33db
Fixes #3712
NikCharlebois Oct 19, 2023
9be4392
Update Microsoft365DSC.TeamsComplianceRecordingPolicy.Tests.ps1
NikCharlebois Oct 19, 2023
4e6d1f0
Merge pull request #3817 from NikCharlebois/FIXES-#3721
NikCharlebois Oct 19, 2023
5617565
dd SCSecurityFilter resources
pkernevez Oct 16, 2023
735366e
Do not use FilterName parameter for export, it requires more non just…
pkernevez Oct 19, 2023
b52c4dc
Updated Dependencies
NikCharlebois Oct 20, 2023
c810cd4
fixed typo in authentication-and-permissions.md
debghs Oct 20, 2023
d3cc28a
Merge pull request #3821 from NikCharlebois/Updating-Dependencies
NikCharlebois Oct 20, 2023
ba1bf74
Initial
NikCharlebois Oct 20, 2023
619ca1b
Merge remote-tracking branch 'upstream/dev' into AADAuthenticationCon…
NikCharlebois Oct 20, 2023
237db1f
Fixes
NikCharlebois Oct 20, 2023
bf076fa
Fix build
pkernevez Oct 20, 2023
c614091
Update Microsoft365.psm1
NikCharlebois Oct 20, 2023
33846b5
Merge pull request #3823 from NikCharlebois/AADAuthenticationContextC…
NikCharlebois Oct 20, 2023
74735a9
Updated Resources and Cmdlet documentation pages
NikCharleboisPFE Oct 20, 2023
5abc6dc
Initial Release
NikCharlebois Oct 20, 2023
579f62a
Update MSFT_AADAttributeSet.psm1
NikCharlebois Oct 20, 2023
121f655
Merge pull request #3824 from NikCharlebois/AADAttributeSet
NikCharlebois Oct 20, 2023
7d7ed62
Updated Resources and Cmdlet documentation pages
NikCharleboisPFE Oct 20, 2023
e89109d
Merge pull request #3822 from debghs/debghs-patch-1
NikCharlebois Oct 24, 2023
fddff91
Merge pull request #3819 from pkernevez/add-support-for-CS-SecurityFi…
NikCharlebois Oct 24, 2023
80e2013
Updated Resources and Cmdlet documentation pages
NikCharleboisPFE Oct 24, 2023
b913ec6
AADSocialIdentityProvider New Resource
NikCharlebois Oct 24, 2023
f26c654
Update CHANGELOG.md
NikCharlebois Oct 24, 2023
e7f2435
Merge pull request #3829 from NikCharlebois/AADIdentityProvider
NikCharlebois Oct 24, 2023
a58b818
Updated Resources and Cmdlet documentation pages
NikCharleboisPFE Oct 24, 2023
f0a9625
fix: typo
debghs Oct 25, 2023
d3f51fa
Fixes #3830
NikCharlebois Oct 25, 2023
d0efc22
Merge pull request #3831 from debghs/t
NikCharlebois Oct 25, 2023
390b9b9
Merge pull request #3832 from NikCharlebois/Fix3787
NikCharlebois Oct 25, 2023
264eaea
Release 1.23.1025.1
NikCharlebois Oct 25, 2023
762bb40
Merge pull request #3833 from NikCharlebois/Release-1.23.1025.1
NikCharlebois Oct 25, 2023
90f7ce5
Merge branch 'master' into Dev
NikCharlebois Oct 25, 2023
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
24 changes: 24 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,26 @@
# Change log for Microsoft365DSC

# 1.23.1025.1

* AADApplication
* Changes to how permissions drifts are logged.
FIXES [#3830](https://github.com/microsoft/Microsoft365DSC/issues/3830)
* AADAttributeSet
* Initial Release.
* AADAuthenticationContext
* Initial Release.
* AADConditionalAccessPolicy
* Adds support for Authentication Context.
FIXES [#3813](https://github.com/microsoft/Microsoft365DSC/issues/3813)
* AADSocialIdentityProvider
* Initial release.
* TeamsComplianceRecordingPolicy
* Fixes an issue where the Compliance Application ID wasn't properly retrieved.
FIXES [#3712](https://github.com/microsoft/Microsoft365DSC/issues/3712)
* DEPENDENCIES
* Updated Microsoft.Graph dependencies to version 2.8.0.
* Updated MicrosoftTeams dependency to version 5.7.1.

# 1.23.1018.1

* AADAuthenticationMethodPolicyAuthenticator
Expand All @@ -21,6 +42,9 @@
FIXES [#3777](https://github.com/microsoft/Microsoft365DSC/issues/3777)
* MISC
* Fixes fancy quotes in complex objects for extraction.
* SCSecurityFilter
* Initial release
FIXES: [#3796](https://github.com/microsoft/Microsoft365DSC/issues/3796)

# 1.23.1011.1

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -752,15 +752,14 @@ function Test-TargetResource
if ($CurrentValues.Permissions.Length -gt 0 -and $null -ne $CurrentValues.Permissions.Name)
{
$permissionsDiff = Compare-Object -ReferenceObject ($CurrentValues.Permissions.Name) -DifferenceObject ($Permissions.Name)
$driftedParams = @{}
if ($null -ne $permissionsDiff)
{
Write-Verbose -Message "Permissions differ: $($permissionsDiff | Out-String)"
Write-Verbose -Message "Test-TargetResource returned $false"
$EventMessage = "Permissions for Azure AD Application {$DisplayName} were not in the desired state.`r`n" + `
"They should contain {$($Permissions.Name)} but instead contained {$($CurrentValues.Permissions.Name)}"
Add-M365DSCEvent -Message $EventMessage -EntryType 'Warning' `
-EventID 1 -Source $($MyInvocation.MyCommand.Source)
return $false
$EventValue = "<CurrentValue>$($CurrentValues.Permissions.Name)</CurrentValue>"
$EventValue += "<DesiredValue>$($Permissions.Name)</DesiredValue>"
$driftedParams.Add('Permissions', $EventValue)
}
else
{
Expand All @@ -773,11 +772,10 @@ function Test-TargetResource
{
Write-Verbose -Message 'No Permissions exist for the current Azure AD App, but permissions were specified for desired state'
Write-Verbose -Message "Test-TargetResource returned $false"
$EventMessage = "Permissions for Azure AD Application {$DisplayName} were not in the desired state.`r`n" + `
"They should contain {$($Permissions.Name)} but instead contained {`$null}"
Add-M365DSCEvent -Message $EventMessage -EntryType 'Warning' `
-EventID 1 -Source $($MyInvocation.MyCommand.Source)
return $false

$EventValue = "<CurrentValue>`$null</CurrentValue>"
$EventValue += "<DesiredValue>$($Permissions.Name)</DesiredValue>"
$driftedParams.Add('Permissions', $EventValue)
}
else
{
Expand All @@ -800,7 +798,8 @@ function Test-TargetResource
$TestResult = Test-M365DSCParameterState -CurrentValues $CurrentValues `
-Source $($MyInvocation.MyCommand.Source) `
-DesiredValues $PSBoundParameters `
-ValuesToCheck $ValuesToCheck.Keys
-ValuesToCheck $ValuesToCheck.Keys `
-IncludedDrifts $driftedParams

Write-Verbose -Message "Test-TargetResource returned $TestResult"

Expand Down
Loading