Skip to content

Commit 3c83072

Browse files
authored
Merge branch 'main' into copilot/fix-824
2 parents f31ad5c + f90dd96 commit 3c83072

File tree

67 files changed

+1543
-784
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

67 files changed

+1543
-784
lines changed
Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
kind: added
2+
body: Add support for Azure Developer CLI authentication via use_dev_cli provider configuration option and POWER_PLATFORM_USE_DEV_CLI environment variable
3+
custom:
4+
Issue: 828
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
kind: fixed
2+
body: Fixed unsafe type assertions in provider data handling that could cause panics and misleading error messages
3+
time: 2025-06-05T15:12:06.705294178Z
4+
custom:
5+
Issue: "841"
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
kind: fixed
2+
body: Fixed reflection and type safety issues in provider code. Replaced unsafe reflection usage in API client, improved error handling with Go 1.13+ patterns, and added validation for conversion functions to prevent runtime panics.
3+
time: 2025-06-10T07:07:44.862725115Z
4+
custom:
5+
Issue: "842"

.devcontainer/features/local_provider_dev/install.sh

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,4 +49,8 @@ rm $(go env GOROOT)/bin/golangci-lint
4949

5050
# Turn off telemetry for az cli
5151
# https://github.com/Azure/azure-cli?tab=readme-ov-file#telemetry-configuration
52-
az config set core.collect_telemetry=false
52+
az config set core.collect_telemetry=false
53+
54+
curl -fsSL https://aka.ms/install-azd.sh | bash
55+
# Turn off telemetry for azd
56+
export AZURE_DEV_COLLECT_TELEMETRY=no

.github/workflows/check_changie_comment_on_pr.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ jobs:
2424
pull-requests: read # Only need to read PR info, not write
2525
steps:
2626
- name: Harden the runner (Audit all outbound calls)
27-
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
27+
uses: step-security/harden-runner@002fdce3c6a235733a90a27c80493a3241e56863 # v2.12.1
2828
with:
2929
egress-policy: audit
3030

@@ -76,7 +76,7 @@ jobs:
7676
pull-requests: write # Required for comment deletion
7777
steps:
7878
- name: Harden the runner (Audit all outbound calls)
79-
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
79+
uses: step-security/harden-runner@002fdce3c6a235733a90a27c80493a3241e56863 # v2.12.1
8080
with:
8181
egress-policy: audit
8282

.github/workflows/golangci-lint.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ jobs:
1818
pull-requests: read # Required for reviewing PRs
1919
steps:
2020
- name: Harden the runner (Audit all outbound calls)
21-
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
21+
uses: step-security/harden-runner@002fdce3c6a235733a90a27c80493a3241e56863 # v2.12.1
2222
with:
2323
egress-policy: audit
2424

.github/workflows/metrics.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ jobs:
1818
pull-requests: read
1919
steps:
2020
- name: Harden the runner (Audit all outbound calls)
21-
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
21+
uses: step-security/harden-runner@002fdce3c6a235733a90a27c80493a3241e56863 # v2.12.1
2222
with:
2323
egress-policy: audit
2424

.github/workflows/release.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ jobs:
1818
contents: write # Required for creating releases
1919
steps:
2020
- name: Harden Runner
21-
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
21+
uses: step-security/harden-runner@002fdce3c6a235733a90a27c80493a3241e56863 # v2.12.1
2222
with:
2323
egress-policy: audit
2424

.github/workflows/release_prep.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ jobs:
1212

1313
steps:
1414
- name: Harden the runner (Audit all outbound calls)
15-
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
15+
uses: step-security/harden-runner@002fdce3c6a235733a90a27c80493a3241e56863 # v2.12.1
1616
with:
1717
egress-policy: audit
1818
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2

.github/workflows/run_tests.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ jobs:
2727
acceptance_tests: ${{ steps.set_acceptance_tests.outputs.acceptance_tests }}
2828
steps:
2929
- name: Harden the runner (Audit all outbound calls)
30-
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
30+
uses: step-security/harden-runner@002fdce3c6a235733a90a27c80493a3241e56863 # v2.12.1
3131
with:
3232
egress-policy: audit
3333

@@ -45,7 +45,7 @@ jobs:
4545
steps:
4646

4747
- name: Harden Runner
48-
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
48+
uses: step-security/harden-runner@002fdce3c6a235733a90a27c80493a3241e56863 # v2.12.1
4949
with:
5050
egress-policy: audit
5151

@@ -77,7 +77,7 @@ jobs:
7777
steps:
7878

7979
- name: Harden Runner
80-
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
80+
uses: step-security/harden-runner@002fdce3c6a235733a90a27c80493a3241e56863 # v2.12.1
8181
with:
8282
egress-policy: audit
8383

@@ -110,7 +110,7 @@ jobs:
110110
steps:
111111

112112
- name: Harden Runner
113-
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
113+
uses: step-security/harden-runner@002fdce3c6a235733a90a27c80493a3241e56863 # v2.12.1
114114
with:
115115
egress-policy: audit
116116

0 commit comments

Comments
 (0)