Skip to content

Commit e2a0e96

Browse files
Microsoft Graph DevX ToolingMicrosoft Graph DevX Tooling
authored andcommitted
Merge branch 'dev' of https://github.com/microsoftgraph/msgraph-sdk-powershell into 2505-new-mgentitlementmanagementaccesspackageassignmentpolicy-returns-http-code-404-response-no-http-resource-was-found-that-matches-the-request-uri
2 parents 0a74911 + 71d4cb9 commit e2a0e96

File tree

2 files changed

+4
-1
lines changed

2 files changed

+4
-1
lines changed

src/Identity.Governance/Identity.Governance.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ require:
1818
``` yaml
1919
directive:
2020
#Prevent cmdlets with the below operation Ids from being generated to allow for aliasing as a result of breaking changes in 2.18.0 and 2.17.0. The affected operation Ids starts from connectedOrganization_DeleteExternalSponsorGraphBPreRef$
21-
- remove-path-by-operation: ^identityGovernance_(Get|Create|Update|Set|Delete)EntitlementManagement$|^identityGovernance\.entitlementManagement(_.*AccessPackageResourceRoleScope|\.accessPackageResourceRoleScope.*|\.accessPackageAssignmentPolicy\..*|\.accessPackageAssignmentRequest\..*|\.accessPackageAssignmentResourceRole\..*|\.accessPackageAssignment\..*|\.accessPackageCatalog\..*|\.accessPackageResourceRequest\..*|\.accessPackageResource\..*|\.accessPackage\..*)|^identityGovernance\.accessReview\.definition\.instance\.decision\.instance(\.|_).*|^identityGovernance\.accessReview\.definition\.instance\.stage\.decision\..*$|^privilegedAccess.roleAssignmentRequest.(resource|roleDefinition).*$|^privilegedAccess.roleAssignment.(resource|roleDefinition).*$|^privilegedAccess.roleDefinition.(resource|roleSetting).*$|^privilegedAccess.roleSetting.(resource|roleDefinition).*$|^identityGovernance_.*LifecycleWorkflow|^identityGovernance\.lifecycleWorkflow\.deletedItem\.(workflow|run|userProcessingResult)\..*|^identityGovernance\.lifecycleWorkflow\.workflow\.run\.userProcessingResult\.taskProcessingResult.*|^identityGovernance\.lifecycleWorkflow\.workflow\.userProcessingResult\.taskProcessingResult.*|^identityGovernance_.*RoleManagementAlert$|^identityGovernance\.roleManagementAlert_refresh$|^identityGovernance\.entitlementManagement\.resourceRoleScope_.*Scope$|^identityGovernance.entitlementManagement.connectedOrganization_DeleteExternalSponsorGraphBPreRef$|^identityGovernance.entitlementManagement.connectedOrganization_DeleteInternalSponsorGraphBPreRef$|^identityGovernance.entitlementManagement.accessPackage_CreateAssignmentPolicy$
21+
- remove-path-by-operation: ^identityGovernance_(Get|Create|Update|Set|Delete)EntitlementManagement$|^identityGovernance\.entitlementManagement(_.*AccessPackageResourceRoleScope|\.accessPackageResourceRoleScope.*|\.accessPackageAssignmentPolicy\..*|\.accessPackageAssignmentRequest\..*|\.accessPackageAssignmentResourceRole\..*|\.accessPackageAssignment\..*|\.accessPackageCatalog\..*|\.accessPackageResourceRequest\..*|\.accessPackageResource\..*|\.accessPackage\..*)|^identityGovernance\.accessReview\.definition\.instance\.decision\.instance(\.|_).*|^identityGovernance\.accessReview\.definition\.instance\.stage\.decision\..*$|^privilegedAccess.roleAssignmentRequest.(resource|roleDefinition).*$|^privilegedAccess.roleAssignment.(resource|roleDefinition).*$|^privilegedAccess.roleDefinition.(resource|roleSetting).*$|^privilegedAccess.roleSetting.(resource|roleDefinition).*$|^identityGovernance_.*LifecycleWorkflow|^identityGovernance\.lifecycleWorkflow\.deletedItem\.(workflow|run|userProcessingResult)\..*|^identityGovernance\.lifecycleWorkflow\.workflow\.run\.userProcessingResult\.taskProcessingResult.*|^identityGovernance\.lifecycleWorkflow\.workflow\.userProcessingResult\.taskProcessingResult.*|^identityGovernance_.*RoleManagementAlert$|^identityGovernance\.roleManagementAlert_refresh$|^identityGovernance\.entitlementManagement\.resourceRoleScope_.*Scope$|^identityGovernance.entitlementManagement.connectedOrganization_DeleteExternalSponsorGraphBPreRef$|^identityGovernance.entitlementManagement.connectedOrganization_DeleteInternalSponsorGraphBPreRef$|^identityGovernance.privilegedAccess.group_DeleteAssignmentSchedule$|^identityGovernance.privilegedAccess.group_UpdateAssignmentSchedule$|^identityGovernance.entitlementManagement.accessPackage_CreateAssignmentPolicy$
2222
# Remove cmdlets
2323
- where:
2424
verb: Get|Remove|Set

src/Identity.SignIns/Identity.SignIns.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,4 +47,7 @@ directive:
4747
subject: ^IdentityConditionalAccessAuthenticationStrength.*$
4848
variant: ^List$|Get$|GetViaIdentity$|Update$|UpdateExpanded$|UpdateViaIdentity$|UpdateViaIdentityExpanded$|Create$|CreateExpanded$|Delete$|DeleteViaIdentity$|Usage$|UsageViaIdentity$|Find$|FindViaIdentity$
4949
remove: true
50+
# Removes the response content since the Patch operation returns http status code 204
51+
- where-operation-id: "policy_UpdateClaimsMappingPolicy"
52+
remove: $.responses["2XX"].content
5053
```

0 commit comments

Comments
 (0)