From b02b8e9580bf6cfcea52050bb584176b8d893adb Mon Sep 17 00:00:00 2001 From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com> Date: Tue, 27 Jul 2021 17:33:16 +0000 Subject: [PATCH 01/16] Bump dns-packet from 1.3.1 to 1.3.4 in /generator Bumps [dns-packet](https://github.com/mafintosh/dns-packet) from 1.3.1 to 1.3.4. - [Release notes](https://github.com/mafintosh/dns-packet/releases) - [Changelog](https://github.com/mafintosh/dns-packet/blob/master/CHANGELOG.md) - [Commits](https://github.com/mafintosh/dns-packet/compare/v1.3.1...v1.3.4) --- updated-dependencies: - dependency-name: dns-packet dependency-type: indirect ... Signed-off-by: dependabot[bot] --- generator/package-lock.json | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/generator/package-lock.json b/generator/package-lock.json index d408ef9e4f..6c006c9abb 100644 --- a/generator/package-lock.json +++ b/generator/package-lock.json @@ -5320,9 +5320,9 @@ "integrity": "sha1-s55/HabrCnW6nBcySzR1PEfgZU0=" }, "dns-packet": { - "version": "1.3.1", - "resolved": "https://registry.npmjs.org/dns-packet/-/dns-packet-1.3.1.tgz", - "integrity": "sha512-0UxfQkMhYAUaZI+xrNZOz/as5KgDU0M/fQ9b6SpkyLbk3GEswDi6PADJVaYJradtRVsRIlF1zLyOodbcTCDzUg==", + "version": "1.3.4", + "resolved": "https://registry.npmjs.org/dns-packet/-/dns-packet-1.3.4.tgz", + "integrity": "sha512-BQ6F4vycLXBvdrJZ6S3gZewt6rcrks9KBgM9vrhW+knGRqc8uEdT7fuCwloc7nny5xNoMJ17HGH0R/6fpo8ECA==", "requires": { "ip": "^1.1.0", "safe-buffer": "^5.0.1" From a92195a366865da1bf39742c3327023d2eb95a1f Mon Sep 17 00:00:00 2001 From: Nik Charlebois Date: Wed, 4 Aug 2021 20:51:50 -0400 Subject: [PATCH 02/16] Updated Dependencies --- CHANGELOG.md | 6 ++++++ Modules/Microsoft365DSC/Microsoft365DSC.psd1 | 4 ++-- 2 files changed, 8 insertions(+), 2 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index cd4b1a4925..9f7896dcf6 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,5 +1,11 @@ # Change log for Microsoft365DSC +# 1.21.811.1 + +* DEPENDENCIES; + * Updated AzureADPreview to version 2.0.2.138; + * Updated Microsoft.PowerApps.Administration.PowerShell to version 2.0.128; + # 1.21.804.1 * SCDLPComplianceRule diff --git a/Modules/Microsoft365DSC/Microsoft365DSC.psd1 b/Modules/Microsoft365DSC/Microsoft365DSC.psd1 index 46dda40999..e86cc48c7b 100644 --- a/Modules/Microsoft365DSC/Microsoft365DSC.psd1 +++ b/Modules/Microsoft365DSC/Microsoft365DSC.psd1 @@ -53,7 +53,7 @@ RequiredModules = @( @{ ModuleName = "AzureADPreview" - RequiredVersion = "2.0.2.136" + RequiredVersion = "2.0.2.138" }, @{ ModuleName = "DSCParser" @@ -81,7 +81,7 @@ }, @{ ModuleName = "Microsoft.PowerApps.Administration.PowerShell" - RequiredVersion = "2.0.127" + RequiredVersion = "2.0.128" }, @{ ModuleName = "MicrosoftTeams" From c3d42f74f6af6c7a6895185ec3c4867089b5e744 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Andi=20Kr=C3=BCger?= <15608729+andikrueger@users.noreply.github.com> Date: Tue, 10 Aug 2021 11:03:36 +0200 Subject: [PATCH 03/16] Fixed Typo in MSFT_EXOSafeLinksPolicy There was a typo added to MSFT_EXOSafeLinksPolicy with PR #1357. --- .../MSFT_EXOSafeLinksPolicy/MSFT_EXOSafeLinksPolicy.psm1 | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_EXOSafeLinksPolicy/MSFT_EXOSafeLinksPolicy.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_EXOSafeLinksPolicy/MSFT_EXOSafeLinksPolicy.psm1 index 0215a303eb..9162a352aa 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_EXOSafeLinksPolicy/MSFT_EXOSafeLinksPolicy.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_EXOSafeLinksPolicy/MSFT_EXOSafeLinksPolicy.psm1 @@ -470,7 +470,7 @@ function Export-TargetResource else { Write-Host "`r`n" -NoNewline - }g + } $i = 1 foreach ($SafeLinksPolicy in $SafeLinksPolicies) { From 91ad4f0c9f61e8796b5184a8b4f1733ad791331b Mon Sep 17 00:00:00 2001 From: Nik Charlebois Date: Wed, 11 Aug 2021 08:36:40 -0400 Subject: [PATCH 04/16] Couple display fixes --- CHANGELOG.md | 2 ++ .../MSFT_IntuneAppConfigurationPolicy.psm1 | 10 +++++++++- .../MSFT_IntuneAppProtectionPolicyiOS.psm1 | 5 ++++- .../MSFT_SPOOrgAssetsLibrary.psm1 | 4 ++-- .../MSFT_SPOSiteScript/MSFT_SPOSiteScript.psm1 | 2 +- 5 files changed, 18 insertions(+), 5 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index 9f7896dcf6..d18c51fd4a 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -5,6 +5,8 @@ * DEPENDENCIES; * Updated AzureADPreview to version 2.0.2.138; * Updated Microsoft.PowerApps.Administration.PowerShell to version 2.0.128; +* MISC + * Additional display alignment fixes for Export; # 1.21.804.1 diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAppConfigurationPolicy/MSFT_IntuneAppConfigurationPolicy.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAppConfigurationPolicy/MSFT_IntuneAppConfigurationPolicy.psm1 index f6a07ed1b7..3e8436c739 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAppConfigurationPolicy/MSFT_IntuneAppConfigurationPolicy.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAppConfigurationPolicy/MSFT_IntuneAppConfigurationPolicy.psm1 @@ -319,7 +319,15 @@ function Export-TargetResource } catch { - Write-Host $Global:M365DSCEmojiRedX + if ($_.Exception -like '*401*') + { + Write-Host "`r`n $($Global:M365DSCEmojiYellowCircle) The current tenant is not registered for Intune." + } + else + { + Write-Host $Global:M365DSCEmojiRedX + } + try { Write-Verbose -Message $_ diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAppProtectionPolicyiOS/MSFT_IntuneAppProtectionPolicyiOS.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAppProtectionPolicyiOS/MSFT_IntuneAppProtectionPolicyiOS.psm1 index 6aa8540142..5cc3d245ea 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAppProtectionPolicyiOS/MSFT_IntuneAppProtectionPolicyiOS.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAppProtectionPolicyiOS/MSFT_IntuneAppProtectionPolicyiOS.psm1 @@ -673,11 +673,14 @@ function Export-TargetResource } catch { - Write-Host $Global:M365DSCEmojiRedX if ($_.Exception -like '*401*') { Write-Host "`r`n $($Global:M365DSCEmojiYellowCircle) The current tenant is not registered for Intune." } + else + { + Write-Host $Global:M365DSCEmojiRedX + } try { Write-Verbose -Message $_ diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_SPOOrgAssetsLibrary/MSFT_SPOOrgAssetsLibrary.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_SPOOrgAssetsLibrary/MSFT_SPOOrgAssetsLibrary.psm1 index de28421dc7..50716195f8 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_SPOOrgAssetsLibrary/MSFT_SPOOrgAssetsLibrary.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_SPOOrgAssetsLibrary/MSFT_SPOOrgAssetsLibrary.psm1 @@ -450,7 +450,7 @@ function Export-TargetResource $i = 1 $dscContent = '' - if ($orgAssets.Length -gt 0) + if ($orgAssets.Length -eq 0) { Write-Host $Global:M365DSCEmojiGreenCheckMark } @@ -462,7 +462,7 @@ function Export-TargetResource { foreach ($orgAssetLib in $orgAssets.OrgAssetsLibraries) { - Write-Host " [$i/$($orgAssets.Length)] $LibraryUrl" -NoNewline + Write-Host " [$i/$($orgAssets.Length)] $($orgAssetLib.libraryurl.DecodedUrl)" -NoNewline $Params = @{ GlobalAdminAccount = $GlobalAdminAccount LibraryUrl = "https://$tenantName.sharepoint.com/$($orgAssetLib.libraryurl.DecodedUrl)" diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_SPOSiteScript/MSFT_SPOSiteScript.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_SPOSiteScript/MSFT_SPOSiteScript.psm1 index fc360a3cd8..8ffaf4a581 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_SPOSiteScript/MSFT_SPOSiteScript.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_SPOSiteScript/MSFT_SPOSiteScript.psm1 @@ -457,7 +457,7 @@ function Export-TargetResource } foreach ($script in $siteScripts) { - Write-Host " [$i/$($siteScripts.Length)] $($script.Title)" + Write-Host " [$i/$($siteScripts.Length)] $($script.Title)" -NoNewline $params = @{ Identity = $script.Id Title = $script.Title From d6444b74c29c0f3985f7fb55e705e2553ee8281a Mon Sep 17 00:00:00 2001 From: Daniel Laskewitz Date: Thu, 12 Aug 2021 12:53:38 +0200 Subject: [PATCH 05/16] Updated AutoAdmittedUsers param TeamsMeetingPolicy --- .../MSFT_TeamsMeetingPolicy.psm1 | 200 +++++++++--------- .../MSFT_TeamsMeetingPolicy.schema.mof | Bin 22080 -> 22314 bytes 2 files changed, 100 insertions(+), 100 deletions(-) diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_TeamsMeetingPolicy/MSFT_TeamsMeetingPolicy.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_TeamsMeetingPolicy/MSFT_TeamsMeetingPolicy.psm1 index d87330b268..7a7049b291 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_TeamsMeetingPolicy/MSFT_TeamsMeetingPolicy.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_TeamsMeetingPolicy/MSFT_TeamsMeetingPolicy.psm1 @@ -25,19 +25,19 @@ function Get-TargetResource $AllowPrivateMeetNow, [Parameter()] - [ValidateSet("Disabled", "Enabled")] + [ValidateSet('Disabled', 'Enabled')] [System.String] - $MeetingChatEnabledType = "Enabled", + $MeetingChatEnabledType = 'Enabled', [Parameter()] - [ValidateSet("Disabled", "DisabledUserOverride")] + [ValidateSet('Disabled', 'DisabledUserOverride')] [System.String] - $LiveCaptionsEnabledType = "DisabledUserOverride", + $LiveCaptionsEnabledType = 'DisabledUserOverride', [Parameter()] - [ValidateSet("OrganizerOnlyUserOverride", "EveryoneInCompanyUserOverride", "EveryoneUserOverride")] + [ValidateSet('OrganizerOnlyUserOverride', 'EveryoneInCompanyUserOverride', 'EveryoneUserOverride')] [System.String] - $DesignatedPresenterRoleMode = "EveryoneUserOverride", + $DesignatedPresenterRoleMode = 'EveryoneUserOverride', [Parameter()] [System.Boolean] @@ -48,19 +48,19 @@ function Get-TargetResource $AllowIPVideo, [Parameter()] - [ValidateSet("Enabled", "Disabled")] + [ValidateSet('Enabled', 'Disabled')] [System.String] - $AllowEngagementReport = "Disabled", + $AllowEngagementReport = 'Disabled', [Parameter()] - [ValidateSet("EnabledOutgoingIncoming", "Disabled")] + [ValidateSet('EnabledOutgoingIncoming', 'Disabled')] [System.String] - $IPAudioMode = "EnabledOutgoingIncoming", + $IPAudioMode = 'EnabledOutgoingIncoming', [Parameter()] - [ValidateSet("EnabledOutgoingIncoming", "Disabled")] + [ValidateSet('EnabledOutgoingIncoming', 'Disabled')] [System.String] - $IPVideoMode = "EnabledOutgoingIncoming", + $IPVideoMode = 'EnabledOutgoingIncoming', [Parameter()] [System.Boolean] @@ -76,7 +76,7 @@ function Get-TargetResource [Parameter()] [System.String] - [ValidateSet('EveryoneInCompany', 'Everyone', 'EveryoneInSameAndFederatedCompany', 'OrganizerOnly')] + [ValidateSet('EveryoneInCompany', 'Everyone', 'EveryoneInSameAndFederatedCompany', 'OrganizerOnly', 'InvitedUsers')] $AutoAdmittedUsers, [Parameter()] @@ -157,26 +157,26 @@ function Get-TargetResource $AllowUserToJoinExternalMeeting, [Parameter()] - [ValidateSet("Disabled", "Enabled")] + [ValidateSet('Disabled', 'Enabled')] [System.String] - $EnrollUserOverride = "Disabled", + $EnrollUserOverride = 'Disabled', [Parameter()] - [ValidateSet("Off", "Distinguish", "Attribute")] + [ValidateSet('Off', 'Distinguish', 'Attribute')] [System.String] - $RoomAttributeUserOverride = "Off", + $RoomAttributeUserOverride = 'Off', [Parameter()] - [ValidateSet("Disabled", "Enabled")] + [ValidateSet('Disabled', 'Enabled')] [System.String] - $StreamingAttendeeMode = "Enabled", + $StreamingAttendeeMode = 'Enabled', [Parameter()] [System.Boolean] $AllowBreakoutRooms, [Parameter()] - [ValidateSet("Disabled", "Enabled")] + [ValidateSet('Disabled', 'Enabled')] [System.String] $TeamsCameraFarEndPTZMode, @@ -185,9 +185,9 @@ function Get-TargetResource $AllowMeetingReactions, [Parameter()] - [ValidateSet("Present", "Absent")] + [ValidateSet('Present', 'Absent')] [System.String] - $Ensure = "Present", + $Ensure = 'Present', [Parameter(Mandatory = $true)] [System.Management.Automation.PSCredential] @@ -200,19 +200,19 @@ function Get-TargetResource -InboundParameters $PSBoundParameters #region Telemetry - $ResourceName = $MyInvocation.MyCommand.ModuleName.Replace("MSFT_", "") + $ResourceName = $MyInvocation.MyCommand.ModuleName.Replace('MSFT_', '') $data = [System.Collections.Generic.Dictionary[[String], [String]]]::new() - $data.Add("Resource", $ResourceName) - $data.Add("Method", $MyInvocation.MyCommand) - $data.Add("Principal", $GlobalAdminAccount.UserName) - $data.Add("TenantId", $TenantId) - $data.Add("ConnectionMode", $ConnectionMode) + $data.Add('Resource', $ResourceName) + $data.Add('Method', $MyInvocation.MyCommand) + $data.Add('Principal', $GlobalAdminAccount.UserName) + $data.Add('TenantId', $TenantId) + $data.Add('ConnectionMode', $ConnectionMode) Add-M365DSCTelemetryEvent -Data $data #endregion $nullReturn = $PSBoundParameters - $nullReturn.Ensure = "Absent" + $nullReturn.Ensure = 'Absent' try { $policy = Get-CsTeamsMeetingPolicy -Identity $Identity ` @@ -265,7 +265,7 @@ function Get-TargetResource AllowBreakoutRooms = $policy.AllowBreakoutRooms TeamsCameraFarEndPTZMode = $policy.TeamsCameraFarEndPTZMode AllowMeetingReactions = $policy.AllowMeetingReactions - Ensure = "Present" + Ensure = 'Present' GlobalAdminAccount = $GlobalAdminAccount } } @@ -274,7 +274,7 @@ function Get-TargetResource try { Write-Verbose -Message $_ - $tenantIdValue = "" + $tenantIdValue = '' if (-not [System.String]::IsNullOrEmpty($TenantId)) { $tenantIdValue = $TenantId @@ -321,19 +321,19 @@ function Set-TargetResource $AllowPrivateMeetNow, [Parameter()] - [ValidateSet("Disabled", "Enabled")] + [ValidateSet('Disabled', 'Enabled')] [System.String] - $MeetingChatEnabledType = "Enabled", + $MeetingChatEnabledType = 'Enabled', [Parameter()] - [ValidateSet("Disabled", "DisabledUserOverride")] + [ValidateSet('Disabled', 'DisabledUserOverride')] [System.String] - $LiveCaptionsEnabledType = "DisabledUserOverride", + $LiveCaptionsEnabledType = 'DisabledUserOverride', [Parameter()] - [ValidateSet("OrganizerOnlyUserOverride", "EveryoneInCompanyUserOverride", "EveryoneUserOverride")] + [ValidateSet('OrganizerOnlyUserOverride', 'EveryoneInCompanyUserOverride', 'EveryoneUserOverride')] [System.String] - $DesignatedPresenterRoleMode = "EveryoneUserOverride", + $DesignatedPresenterRoleMode = 'EveryoneUserOverride', [Parameter()] [System.Boolean] @@ -344,19 +344,19 @@ function Set-TargetResource $AllowIPVideo, [Parameter()] - [ValidateSet("Enabled", "Disabled")] + [ValidateSet('Enabled', 'Disabled')] [System.String] - $AllowEngagementReport = "Disabled", + $AllowEngagementReport = 'Disabled', [Parameter()] - [ValidateSet("EnabledOutgoingIncoming", "Disabled")] + [ValidateSet('EnabledOutgoingIncoming', 'Disabled')] [System.String] - $IPAudioMode = "EnabledOutgoingIncoming", + $IPAudioMode = 'EnabledOutgoingIncoming', [Parameter()] - [ValidateSet("EnabledOutgoingIncoming", "Disabled")] + [ValidateSet('EnabledOutgoingIncoming', 'Disabled')] [System.String] - $IPVideoMode = "EnabledOutgoingIncoming", + $IPVideoMode = 'EnabledOutgoingIncoming', [Parameter()] [System.Boolean] @@ -453,26 +453,26 @@ function Set-TargetResource $AllowUserToJoinExternalMeeting, [Parameter()] - [ValidateSet("Disabled", "Enabled")] + [ValidateSet('Disabled', 'Enabled')] [System.String] - $EnrollUserOverride = "Disabled", + $EnrollUserOverride = 'Disabled', [Parameter()] - [ValidateSet("Off", "Distinguish", "Attribute")] + [ValidateSet('Off', 'Distinguish', 'Attribute')] [System.String] - $RoomAttributeUserOverride = "Off", + $RoomAttributeUserOverride = 'Off', [Parameter()] - [ValidateSet("Disabled", "Enabled")] + [ValidateSet('Disabled', 'Enabled')] [System.String] - $StreamingAttendeeMode = "Enabled", + $StreamingAttendeeMode = 'Enabled', [Parameter()] [System.Boolean] $AllowBreakoutRooms, [Parameter()] - [ValidateSet("Disabled", "Enabled")] + [ValidateSet('Disabled', 'Enabled')] [System.String] $TeamsCameraFarEndPTZMode, @@ -481,23 +481,23 @@ function Set-TargetResource $AllowMeetingReactions, [Parameter()] - [ValidateSet("Present", "Absent")] + [ValidateSet('Present', 'Absent')] [System.String] - $Ensure = "Present", + $Ensure = 'Present', [Parameter(Mandatory = $true)] [System.Management.Automation.PSCredential] $GlobalAdminAccount ) - Write-Verbose -Message "Setting Teams Meeting Policy" + Write-Verbose -Message 'Setting Teams Meeting Policy' #region Telemetry - $ResourceName = $MyInvocation.MyCommand.ModuleName.Replace("MSFT_", "") + $ResourceName = $MyInvocation.MyCommand.ModuleName.Replace('MSFT_', '') $data = [System.Collections.Generic.Dictionary[[String], [String]]]::new() - $data.Add("Resource", $ResourceName) - $data.Add("Method", $MyInvocation.MyCommand) - $data.Add("Principal", $GlobalAdminAccount.UserName) + $data.Add('Resource', $ResourceName) + $data.Add('Method', $MyInvocation.MyCommand) + $data.Add('Principal', $GlobalAdminAccount.UserName) Add-M365DSCTelemetryEvent -Data $data #endregion @@ -507,8 +507,8 @@ function Set-TargetResource $CurrentValues = Get-TargetResource @PSBoundParameters $SetParameters = $PSBoundParameters - $SetParameters.Remove("Ensure") | Out-Null - $SetParameters.Remove("GlobalAdminAccount") | Out-Null + $SetParameters.Remove('Ensure') | Out-Null + $SetParameters.Remove('GlobalAdminAccount') | Out-Null if ($Ensure -eq 'Present' -and $CurrentValues.Ensure -eq 'Absent') { @@ -516,9 +516,9 @@ function Set-TargetResource # The AllowAnonymousUsersToDialOut is temporarly disabled. Therefore # we can't create or update a policy with it and it needs to be removed; - if ($SetParameters.ContainsKey("AllowAnonymousUsersToDialOut")) + if ($SetParameters.ContainsKey('AllowAnonymousUsersToDialOut')) { - $SetParameters.Remove("AllowAnonymousUsersToDialOut") | Out-Null + $SetParameters.Remove('AllowAnonymousUsersToDialOut') | Out-Null } New-CsTeamsMeetingPolicy @SetParameters } @@ -530,14 +530,14 @@ function Set-TargetResource # The AllowAnonymousUsersToDialOut is temporarly disabled. Therefore # we can't create or update a policy with it and it needs to be removed; - if ($SetParameters.ContainsKey("AllowAnonymousUsersToDialOut")) + if ($SetParameters.ContainsKey('AllowAnonymousUsersToDialOut')) { - $SetParameters.Remove("AllowAnonymousUsersToDialOut") | Out-Null + $SetParameters.Remove('AllowAnonymousUsersToDialOut') | Out-Null } if ($SetParameters.AllowCloudRecording -eq $false ) { - $SetParameters.Remove("RecordingStorageMode") - $SetParameters.Remove("AllowRecordingStorageOutsideRegion") + $SetParameters.Remove('RecordingStorageMode') + $SetParameters.Remove('AllowRecordingStorageOutsideRegion') } Set-CsTeamsMeetingPolicy @SetParameters } @@ -575,19 +575,19 @@ function Test-TargetResource $AllowPrivateMeetNow, [Parameter()] - [ValidateSet("Disabled", "Enabled")] + [ValidateSet('Disabled', 'Enabled')] [System.String] - $MeetingChatEnabledType = "Enabled", + $MeetingChatEnabledType = 'Enabled', [Parameter()] - [ValidateSet("Disabled", "DisabledUserOverride")] + [ValidateSet('Disabled', 'DisabledUserOverride')] [System.String] - $LiveCaptionsEnabledType = "DisabledUserOverride", + $LiveCaptionsEnabledType = 'DisabledUserOverride', [Parameter()] - [ValidateSet("OrganizerOnlyUserOverride", "EveryoneInCompanyUserOverride", "EveryoneUserOverride")] + [ValidateSet('OrganizerOnlyUserOverride', 'EveryoneInCompanyUserOverride', 'EveryoneUserOverride')] [System.String] - $DesignatedPresenterRoleMode = "EveryoneUserOverride", + $DesignatedPresenterRoleMode = 'EveryoneUserOverride', [Parameter()] [System.Boolean] @@ -598,19 +598,19 @@ function Test-TargetResource $AllowIPVideo, [Parameter()] - [ValidateSet("Enabled", "Disabled")] + [ValidateSet('Enabled', 'Disabled')] [System.String] - $AllowEngagementReport = "Disabled", + $AllowEngagementReport = 'Disabled', [Parameter()] - [ValidateSet("EnabledOutgoingIncoming", "Disabled")] + [ValidateSet('EnabledOutgoingIncoming', 'Disabled')] [System.String] - $IPAudioMode = "EnabledOutgoingIncoming", + $IPAudioMode = 'EnabledOutgoingIncoming', [Parameter()] - [ValidateSet("EnabledOutgoingIncoming", "Disabled")] + [ValidateSet('EnabledOutgoingIncoming', 'Disabled')] [System.String] - $IPVideoMode = "EnabledOutgoingIncoming", + $IPVideoMode = 'EnabledOutgoingIncoming', [Parameter()] [System.Boolean] @@ -707,26 +707,26 @@ function Test-TargetResource $AllowUserToJoinExternalMeeting, [Parameter()] - [ValidateSet("Disabled", "Enabled")] + [ValidateSet('Disabled', 'Enabled')] [System.String] - $EnrollUserOverride = "Disabled", + $EnrollUserOverride = 'Disabled', [Parameter()] - [ValidateSet("Off", "Distinguish", "Attribute")] + [ValidateSet('Off', 'Distinguish', 'Attribute')] [System.String] - $RoomAttributeUserOverride = "Off", + $RoomAttributeUserOverride = 'Off', [Parameter()] - [ValidateSet("Disabled", "Enabled")] + [ValidateSet('Disabled', 'Enabled')] [System.String] - $StreamingAttendeeMode = "Enabled", + $StreamingAttendeeMode = 'Enabled', [Parameter()] [System.Boolean] $AllowBreakoutRooms, [Parameter()] - [ValidateSet("Disabled", "Enabled")] + [ValidateSet('Disabled', 'Enabled')] [System.String] $TeamsCameraFarEndPTZMode, @@ -735,21 +735,21 @@ function Test-TargetResource $AllowMeetingReactions, [Parameter()] - [ValidateSet("Present", "Absent")] + [ValidateSet('Present', 'Absent')] [System.String] - $Ensure = "Present", + $Ensure = 'Present', [Parameter(Mandatory = $true)] [System.Management.Automation.PSCredential] $GlobalAdminAccount ) #region Telemetry - $ResourceName = $MyInvocation.MyCommand.ModuleName.Replace("MSFT_", "") + $ResourceName = $MyInvocation.MyCommand.ModuleName.Replace('MSFT_', '') $data = [System.Collections.Generic.Dictionary[[String], [String]]]::new() - $data.Add("Resource", $ResourceName) - $data.Add("Method", $MyInvocation.MyCommand) - $data.Add("Principal", $GlobalAdminAccount.UserName) - $data.Add("TenantId", $TenantId) + $data.Add('Resource', $ResourceName) + $data.Add('Method', $MyInvocation.MyCommand) + $data.Add('Principal', $GlobalAdminAccount.UserName) + $data.Add('TenantId', $TenantId) Add-M365DSCTelemetryEvent -Data $data #endregion @@ -764,7 +764,7 @@ function Test-TargetResource $ValuesToCheck.Remove('GlobalAdminAccount') | Out-Null # The AllowAnonymousUsersToDialOut is temporarly disabled. Therefore # we can't create or update a policy with it and it needs to be removed; - $ValuesToCheck.Remove("AllowAnonymousUsersToDialOut") | Out-Null + $ValuesToCheck.Remove('AllowAnonymousUsersToDialOut') | Out-Null $TestResult = Test-M365DSCParameterState -CurrentValues $CurrentValues ` @@ -791,13 +791,13 @@ function Export-TargetResource -InboundParameters $PSBoundParameters #region Telemetry - $ResourceName = $MyInvocation.MyCommand.ModuleName.Replace("MSFT_", "") + $ResourceName = $MyInvocation.MyCommand.ModuleName.Replace('MSFT_', '') $data = [System.Collections.Generic.Dictionary[[String], [String]]]::new() - $data.Add("Resource", $ResourceName) - $data.Add("Method", $MyInvocation.MyCommand) - $data.Add("Principal", $GlobalAdminAccount.UserName) - $data.Add("TenantId", $TenantId) - $data.Add("ConnectionMode", $ConnectionMode) + $data.Add('Resource', $ResourceName) + $data.Add('Method', $MyInvocation.MyCommand) + $data.Add('Principal', $GlobalAdminAccount.UserName) + $data.Add('TenantId', $TenantId) + $data.Add('ConnectionMode', $ConnectionMode) Add-M365DSCTelemetryEvent -Data $data #endregion @@ -836,7 +836,7 @@ function Export-TargetResource try { Write-Verbose -Message $_ - $tenantIdValue = "" + $tenantIdValue = '' if (-not [System.String]::IsNullOrEmpty($TenantId)) { $tenantIdValue = $TenantId @@ -853,7 +853,7 @@ function Export-TargetResource { Write-Verbose -Message $_ } - return "" + return '' } } diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_TeamsMeetingPolicy/MSFT_TeamsMeetingPolicy.schema.mof b/Modules/Microsoft365DSC/DSCResources/MSFT_TeamsMeetingPolicy/MSFT_TeamsMeetingPolicy.schema.mof index 31150efdbc0955eb64a260426a6de5dcf26c8166..3476e2c3b2fdd35d3b20ea99199cffed157b91ab 100644 GIT binary patch delta 186 zcmX@GhH=$8#tmf(ljkT)iF-2SF_bZ6GL$f+GNdqsG86;pB8KA0*|PSNXBlv5D=_2( zRpc;KGAIDmWB_FqfU1%8C@_>lbWPsKsW|zHg2?1JS-#0z6xt^HIkMq2KT%kE@-+n^ PqSP{mif`soGBE)F+)6M1 delta 30 mcmZ3rj`6@6#tmf(lS>5UCfg}4o6MrLZ}Jmek Date: Fri, 13 Aug 2021 02:05:37 +0000 Subject: [PATCH 06/16] Bump path-parse from 1.0.6 to 1.0.7 in /generator Bumps [path-parse](https://github.com/jbgutierrez/path-parse) from 1.0.6 to 1.0.7. - [Release notes](https://github.com/jbgutierrez/path-parse/releases) - [Commits](https://github.com/jbgutierrez/path-parse/commits/v1.0.7) --- updated-dependencies: - dependency-name: path-parse dependency-type: indirect ... Signed-off-by: dependabot[bot] --- generator/package-lock.json | 247 ++++++++---------------------------- 1 file changed, 50 insertions(+), 197 deletions(-) diff --git a/generator/package-lock.json b/generator/package-lock.json index f6ba50443f..898872440f 100644 --- a/generator/package-lock.json +++ b/generator/package-lock.json @@ -3342,7 +3342,6 @@ "colorette": "^1.2.1", "normalize-range": "^0.1.2", "num2fraction": "^1.2.2", - "postcss": "^7.0.32", "postcss-value-parser": "^4.1.0" } }, @@ -4840,10 +4839,7 @@ "css-blank-pseudo": { "version": "0.1.4", "resolved": "https://registry.npmjs.org/css-blank-pseudo/-/css-blank-pseudo-0.1.4.tgz", - "integrity": "sha512-LHz35Hr83dnFeipc7oqFDmsjHdljj3TQtxGGiNWSOsTLIAubSm4TEz8qCaKFpk7idaQ1GfWscF4E6mgpBysA1w==", - "requires": { - "postcss": "^7.0.5" - } + "integrity": "sha512-LHz35Hr83dnFeipc7oqFDmsjHdljj3TQtxGGiNWSOsTLIAubSm4TEz8qCaKFpk7idaQ1GfWscF4E6mgpBysA1w==" }, "css-color-names": { "version": "0.0.4", @@ -4855,7 +4851,6 @@ "resolved": "https://registry.npmjs.org/css-declaration-sorter/-/css-declaration-sorter-4.0.1.tgz", "integrity": "sha512-BcxQSKTSEEQUftYpBVnsH4SF05NTuBokb19/sBt6asXGKZ/6VP7PLG1CBCkFDYOnhXhPh0jMhO6xZ71oYHXHBA==", "requires": { - "postcss": "^7.0.1", "timsort": "^0.3.0" } }, @@ -4864,7 +4859,6 @@ "resolved": "https://registry.npmjs.org/css-has-pseudo/-/css-has-pseudo-0.10.0.tgz", "integrity": "sha512-Z8hnfsZu4o/kt+AuFzeGpLVhFOGO9mluyHBaA2bA8aCGTwah5sT3WV/fTHH8UNZUytOIImuGPrl/prlb4oX4qQ==", "requires": { - "postcss": "^7.0.6", "postcss-selector-parser": "^5.0.0-rc.4" }, "dependencies": { @@ -4894,7 +4888,6 @@ "cssesc": "^3.0.0", "icss-utils": "^4.1.1", "loader-utils": "^2.0.0", - "postcss": "^7.0.32", "postcss-modules-extract-imports": "^2.0.0", "postcss-modules-local-by-default": "^3.0.3", "postcss-modules-scope": "^2.2.0", @@ -4907,10 +4900,7 @@ "css-prefers-color-scheme": { "version": "3.1.1", "resolved": "https://registry.npmjs.org/css-prefers-color-scheme/-/css-prefers-color-scheme-3.1.1.tgz", - "integrity": "sha512-MTu6+tMs9S3EUqzmqLXEcgNRbNkkD/TGFvowpeoWJn5Vfq7FMgsmRQs9X5NXAURiOBmOxm/lLjsDNXDE6k9bhg==", - "requires": { - "postcss": "^7.0.5" - } + "integrity": "sha512-MTu6+tMs9S3EUqzmqLXEcgNRbNkkD/TGFvowpeoWJn5Vfq7FMgsmRQs9X5NXAURiOBmOxm/lLjsDNXDE6k9bhg==" }, "css-select": { "version": "2.1.0", @@ -4964,8 +4954,7 @@ "requires": { "cosmiconfig": "^5.0.0", "cssnano-preset-default": "^4.0.8", - "is-resolvable": "^1.0.0", - "postcss": "^7.0.0" + "is-resolvable": "^1.0.0" }, "dependencies": { "cosmiconfig": { @@ -5011,7 +5000,6 @@ "requires": { "css-declaration-sorter": "^4.0.1", "cssnano-util-raw-cache": "^4.0.1", - "postcss": "^7.0.0", "postcss-calc": "^7.0.1", "postcss-colormin": "^4.0.3", "postcss-convert-values": "^4.0.1", @@ -5054,10 +5042,7 @@ "cssnano-util-raw-cache": { "version": "4.0.1", "resolved": "https://registry.npmjs.org/cssnano-util-raw-cache/-/cssnano-util-raw-cache-4.0.1.tgz", - "integrity": "sha512-qLuYtWK2b2Dy55I8ZX3ky1Z16WYsx544Q0UWViebptpwn/xDBmog2TLg4f+DBMg1rJ6JDWtn96WHbOKDWt1WQA==", - "requires": { - "postcss": "^7.0.0" - } + "integrity": "sha512-qLuYtWK2b2Dy55I8ZX3ky1Z16WYsx544Q0UWViebptpwn/xDBmog2TLg4f+DBMg1rJ6JDWtn96WHbOKDWt1WQA==" }, "cssnano-util-same-parent": { "version": "4.0.1", @@ -7887,10 +7872,7 @@ "icss-utils": { "version": "4.1.1", "resolved": "https://registry.npmjs.org/icss-utils/-/icss-utils-4.1.1.tgz", - "integrity": "sha512-4aFq7wvWyMHKgxsH8QQtGpvbASCf+eM3wPRLI6R+MgAnTCZ6STYsRvttLvRWK0Nfif5piF394St3HeJDaljGPA==", - "requires": { - "postcss": "^7.0.14" - } + "integrity": "sha512-4aFq7wvWyMHKgxsH8QQtGpvbASCf+eM3wPRLI6R+MgAnTCZ6STYsRvttLvRWK0Nfif5piF394St3HeJDaljGPA==" }, "identity-obj-proxy": { "version": "3.0.0", @@ -10977,9 +10959,9 @@ "integrity": "sha1-QRyttXTFoUDTpLGRDUDYDMn0C0A=" }, "path-parse": { - "version": "1.0.6", - "resolved": "https://registry.npmjs.org/path-parse/-/path-parse-1.0.6.tgz", - "integrity": "sha512-GSmOT2EbHrINBf9SR7CDELwlJ8AENk3Qn7OikK4nFYAu3Ote2+JYNVvkpAEQm3/TLNEJFD/xZJjzyxg3KBWOzw==" + "version": "1.0.7", + "resolved": "https://registry.npmjs.org/path-parse/-/path-parse-1.0.7.tgz", + "integrity": "sha512-LDJzPVEEEPR+y48z93A0Ed0yXb8pAByGWo/k5YYdYgpY2/2EsOsksJrq7lOHxryrVOn1ejG6oAp8ahvOIQD8sw==" }, "path-to-regexp": { "version": "0.1.7", @@ -11153,50 +11135,21 @@ "integrity": "sha1-AerA/jta9xoqbAL+q7jB/vfgDqs=" }, "postcss": { - "version": "7.0.35", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.35.tgz", - "integrity": "sha512-3QT8bBJeX/S5zKTTjTCIjRF3If4avAT6kqxcASlTWEtAFCb9NH0OUxNDfgZSWdP5fJnBYCMEWkIFfWeugjzYMg==", + "version": "8.3.6", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-8.3.6.tgz", + "integrity": "sha512-wG1cc/JhRgdqB6WHEuyLTedf3KIRuD0hG6ldkFEZNCjRxiC+3i6kkWUUbiJQayP28iwG35cEmAbe98585BYV0A==", + "dev": true, "requires": { - "chalk": "^2.4.2", - "source-map": "^0.6.1", - "supports-color": "^6.1.0" + "colorette": "^1.2.2", + "nanoid": "^3.1.23", + "source-map-js": "^0.6.2" }, "dependencies": { - "ansi-styles": { - "version": "3.2.1", - "resolved": "https://registry.npmjs.org/ansi-styles/-/ansi-styles-3.2.1.tgz", - "integrity": "sha512-VT0ZI6kZRdTh8YyJw3SMbYm/u+NqfsAxEpWO0Pf9sq8/e94WxxOpPKx9FR1FlyCtOVDNOQ+8ntlqFxiRc+r5qA==", - "requires": { - "color-convert": "^1.9.0" - } - }, - "chalk": { - "version": "2.4.2", - "resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz", - "integrity": "sha512-Mti+f9lpJNcwF4tWV8/OrTTtF1gZi+f8FqlyAdouralcFWFQWF2+NgCHShjkCb+IFBLq9buZwE1xckQU4peSuQ==", - "requires": { - "ansi-styles": "^3.2.1", - "escape-string-regexp": "^1.0.5", - "supports-color": "^5.3.0" - }, - "dependencies": { - "supports-color": { - "version": "5.5.0", - "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-5.5.0.tgz", - "integrity": "sha512-QjVjwdXIt408MIiAqCX4oUKsgU2EqAGzs2Ppkm4aQYbjm+ZEWEcW4SfFNTr4uMNZma0ey4f5lgLrkB0aX0QMow==", - "requires": { - "has-flag": "^3.0.0" - } - } - } - }, - "supports-color": { - "version": "6.1.0", - "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz", - "integrity": "sha512-qe1jfm1Mg7Nq/NSh6XE24gPXROEVsWHxC1LIx//XNlD9iw7YZQGjZNjYN7xGaEG6iKdA8EtNFW6R0gjnVXp+wQ==", - "requires": { - "has-flag": "^3.0.0" - } + "nanoid": { + "version": "3.1.25", + "resolved": "https://registry.npmjs.org/nanoid/-/nanoid-3.1.25.tgz", + "integrity": "sha512-rdwtIXaXCLFAQbnfqDRnI6jaRHp9fTcYBjtFKE8eezcZ7LuLjhUaQGNeMXf1HmRoCH32CLz6XwX0TtxEOS/A3Q==", + "dev": true } } }, @@ -11205,24 +11158,19 @@ "resolved": "https://registry.npmjs.org/postcss-attribute-case-insensitive/-/postcss-attribute-case-insensitive-4.0.2.tgz", "integrity": "sha512-clkFxk/9pcdb4Vkn0hAHq3YnxBQ2p0CGD1dy24jN+reBck+EWxMbxSUqN4Yj7t0w8csl87K6p0gxBe1utkJsYA==", "requires": { - "postcss": "^7.0.2", "postcss-selector-parser": "^6.0.2" } }, "postcss-browser-comments": { "version": "3.0.0", "resolved": "https://registry.npmjs.org/postcss-browser-comments/-/postcss-browser-comments-3.0.0.tgz", - "integrity": "sha512-qfVjLfq7HFd2e0HW4s1dvU8X080OZdG46fFbIBFjW7US7YPDcWfRvdElvwMJr2LI6hMmD+7LnH2HcmXTs+uOig==", - "requires": { - "postcss": "^7" - } + "integrity": "sha512-qfVjLfq7HFd2e0HW4s1dvU8X080OZdG46fFbIBFjW7US7YPDcWfRvdElvwMJr2LI6hMmD+7LnH2HcmXTs+uOig==" }, "postcss-calc": { "version": "7.0.5", "resolved": "https://registry.npmjs.org/postcss-calc/-/postcss-calc-7.0.5.tgz", "integrity": "sha512-1tKHutbGtLtEZF6PT4JSihCHfIVldU72mZ8SdZHIYriIZ9fh9k9aWSppaT8rHsyI3dX+KSR+W+Ix9BMY3AODrg==", "requires": { - "postcss": "^7.0.27", "postcss-selector-parser": "^6.0.2", "postcss-value-parser": "^4.0.2" } @@ -11232,7 +11180,6 @@ "resolved": "https://registry.npmjs.org/postcss-color-functional-notation/-/postcss-color-functional-notation-2.0.1.tgz", "integrity": "sha512-ZBARCypjEDofW4P6IdPVTLhDNXPRn8T2s1zHbZidW6rPaaZvcnCS2soYFIQJrMZSxiePJ2XIYTlcb2ztr/eT2g==", "requires": { - "postcss": "^7.0.2", "postcss-values-parser": "^2.0.0" } }, @@ -11242,7 +11189,6 @@ "integrity": "sha512-q6BuRnAGKM/ZRpfDascZlIZPjvwsRye7UDNalqVz3s7GDxMtqPY6+Q871liNxsonUw8oC61OG+PSaysYpl1bnw==", "requires": { "@csstools/convert-colors": "^1.4.0", - "postcss": "^7.0.5", "postcss-values-parser": "^2.0.0" } }, @@ -11251,7 +11197,6 @@ "resolved": "https://registry.npmjs.org/postcss-color-hex-alpha/-/postcss-color-hex-alpha-5.0.3.tgz", "integrity": "sha512-PF4GDel8q3kkreVXKLAGNpHKilXsZ6xuu+mOQMHWHLPNyjiUBOr75sp5ZKJfmv1MCus5/DWUGcK9hm6qHEnXYw==", "requires": { - "postcss": "^7.0.14", "postcss-values-parser": "^2.0.1" } }, @@ -11261,7 +11206,6 @@ "integrity": "sha512-YP4VG+xufxaVtzV6ZmhEtc+/aTXH3d0JLpnYfxqTvwZPbJhWqp8bSY3nfNzNRFLgB4XSaBA82OE4VjOOKpCdVQ==", "requires": { "@csstools/convert-colors": "^1.4.0", - "postcss": "^7.0.2", "postcss-values-parser": "^2.0.0" } }, @@ -11270,7 +11214,6 @@ "resolved": "https://registry.npmjs.org/postcss-color-rebeccapurple/-/postcss-color-rebeccapurple-4.0.1.tgz", "integrity": "sha512-aAe3OhkS6qJXBbqzvZth2Au4V3KieR5sRQ4ptb2b2O8wgvB3SJBsdG+jsn2BZbbwekDG8nTfcCNKcSfe/lEy8g==", "requires": { - "postcss": "^7.0.2", "postcss-values-parser": "^2.0.0" } }, @@ -11282,7 +11225,6 @@ "browserslist": "^4.0.0", "color": "^3.0.0", "has": "^1.0.0", - "postcss": "^7.0.0", "postcss-value-parser": "^3.0.0" }, "dependencies": { @@ -11298,7 +11240,6 @@ "resolved": "https://registry.npmjs.org/postcss-convert-values/-/postcss-convert-values-4.0.1.tgz", "integrity": "sha512-Kisdo1y77KUC0Jmn0OXU/COOJbzM8cImvw1ZFsBgBgMgb1iL23Zs/LXRe3r+EZqM3vGYKdQ2YJVQ5VkJI+zEJQ==", "requires": { - "postcss": "^7.0.0", "postcss-value-parser": "^3.0.0" }, "dependencies": { @@ -11312,17 +11253,13 @@ "postcss-custom-media": { "version": "7.0.8", "resolved": "https://registry.npmjs.org/postcss-custom-media/-/postcss-custom-media-7.0.8.tgz", - "integrity": "sha512-c9s5iX0Ge15o00HKbuRuTqNndsJUbaXdiNsksnVH8H4gdc+zbLzr/UasOwNG6CTDpLFekVY4672eWdiiWu2GUg==", - "requires": { - "postcss": "^7.0.14" - } + "integrity": "sha512-c9s5iX0Ge15o00HKbuRuTqNndsJUbaXdiNsksnVH8H4gdc+zbLzr/UasOwNG6CTDpLFekVY4672eWdiiWu2GUg==" }, "postcss-custom-properties": { "version": "8.0.11", "resolved": "https://registry.npmjs.org/postcss-custom-properties/-/postcss-custom-properties-8.0.11.tgz", "integrity": "sha512-nm+o0eLdYqdnJ5abAJeXp4CEU1c1k+eB2yMCvhgzsds/e0umabFrN6HoTy/8Q4K5ilxERdl/JD1LO5ANoYBeMA==", "requires": { - "postcss": "^7.0.17", "postcss-values-parser": "^2.0.1" } }, @@ -11331,7 +11268,6 @@ "resolved": "https://registry.npmjs.org/postcss-custom-selectors/-/postcss-custom-selectors-5.1.2.tgz", "integrity": "sha512-DSGDhqinCqXqlS4R7KGxL1OSycd1lydugJ1ky4iRXPHdBRiozyMHrdu0H3o7qNOCiZwySZTUI5MV0T8QhCLu+w==", "requires": { - "postcss": "^7.0.2", "postcss-selector-parser": "^5.0.0-rc.3" }, "dependencies": { @@ -11357,7 +11293,6 @@ "resolved": "https://registry.npmjs.org/postcss-dir-pseudo-class/-/postcss-dir-pseudo-class-5.0.0.tgz", "integrity": "sha512-3pm4oq8HYWMZePJY+5ANriPs3P07q+LW6FAdTlkFH2XqDdP4HeeJYMOzn0HYLhRSjBO3fhiqSwwU9xEULSrPgw==", "requires": { - "postcss": "^7.0.2", "postcss-selector-parser": "^5.0.0-rc.3" }, "dependencies": { @@ -11381,41 +11316,28 @@ "postcss-discard-comments": { "version": "4.0.2", "resolved": "https://registry.npmjs.org/postcss-discard-comments/-/postcss-discard-comments-4.0.2.tgz", - "integrity": "sha512-RJutN259iuRf3IW7GZyLM5Sw4GLTOH8FmsXBnv8Ab/Tc2k4SR4qbV4DNbyyY4+Sjo362SyDmW2DQ7lBSChrpkg==", - "requires": { - "postcss": "^7.0.0" - } + "integrity": "sha512-RJutN259iuRf3IW7GZyLM5Sw4GLTOH8FmsXBnv8Ab/Tc2k4SR4qbV4DNbyyY4+Sjo362SyDmW2DQ7lBSChrpkg==" }, "postcss-discard-duplicates": { "version": "4.0.2", "resolved": "https://registry.npmjs.org/postcss-discard-duplicates/-/postcss-discard-duplicates-4.0.2.tgz", - "integrity": "sha512-ZNQfR1gPNAiXZhgENFfEglF93pciw0WxMkJeVmw8eF+JZBbMD7jp6C67GqJAXVZP2BWbOztKfbsdmMp/k8c6oQ==", - "requires": { - "postcss": "^7.0.0" - } + "integrity": "sha512-ZNQfR1gPNAiXZhgENFfEglF93pciw0WxMkJeVmw8eF+JZBbMD7jp6C67GqJAXVZP2BWbOztKfbsdmMp/k8c6oQ==" }, "postcss-discard-empty": { "version": "4.0.1", "resolved": "https://registry.npmjs.org/postcss-discard-empty/-/postcss-discard-empty-4.0.1.tgz", - "integrity": "sha512-B9miTzbznhDjTfjvipfHoqbWKwd0Mj+/fL5s1QOz06wufguil+Xheo4XpOnc4NqKYBCNqqEzgPv2aPBIJLox0w==", - "requires": { - "postcss": "^7.0.0" - } + "integrity": "sha512-B9miTzbznhDjTfjvipfHoqbWKwd0Mj+/fL5s1QOz06wufguil+Xheo4XpOnc4NqKYBCNqqEzgPv2aPBIJLox0w==" }, "postcss-discard-overridden": { "version": "4.0.1", "resolved": "https://registry.npmjs.org/postcss-discard-overridden/-/postcss-discard-overridden-4.0.1.tgz", - "integrity": "sha512-IYY2bEDD7g1XM1IDEsUT4//iEYCxAmP5oDSFMVU/JVvT7gh+l4fmjciLqGgwjdWpQIdb0Che2VX00QObS5+cTg==", - "requires": { - "postcss": "^7.0.0" - } + "integrity": "sha512-IYY2bEDD7g1XM1IDEsUT4//iEYCxAmP5oDSFMVU/JVvT7gh+l4fmjciLqGgwjdWpQIdb0Che2VX00QObS5+cTg==" }, "postcss-double-position-gradients": { "version": "1.0.0", "resolved": "https://registry.npmjs.org/postcss-double-position-gradients/-/postcss-double-position-gradients-1.0.0.tgz", "integrity": "sha512-G+nV8EnQq25fOI8CH/B6krEohGWnF5+3A6H/+JEpOncu5dCnkS1QQ6+ct3Jkaepw1NGVqqOZH6lqrm244mCftA==", "requires": { - "postcss": "^7.0.5", "postcss-values-parser": "^2.0.0" } }, @@ -11424,66 +11346,46 @@ "resolved": "https://registry.npmjs.org/postcss-env-function/-/postcss-env-function-2.0.2.tgz", "integrity": "sha512-rwac4BuZlITeUbiBq60h/xbLzXY43qOsIErngWa4l7Mt+RaSkT7QBjXVGTcBHupykkblHMDrBFh30zchYPaOUw==", "requires": { - "postcss": "^7.0.2", "postcss-values-parser": "^2.0.0" } }, "postcss-flexbugs-fixes": { "version": "4.2.1", "resolved": "https://registry.npmjs.org/postcss-flexbugs-fixes/-/postcss-flexbugs-fixes-4.2.1.tgz", - "integrity": "sha512-9SiofaZ9CWpQWxOwRh1b/r85KD5y7GgvsNt1056k6OYLvWUun0czCvogfJgylC22uJTwW1KzY3Gz65NZRlvoiQ==", - "requires": { - "postcss": "^7.0.26" - } + "integrity": "sha512-9SiofaZ9CWpQWxOwRh1b/r85KD5y7GgvsNt1056k6OYLvWUun0czCvogfJgylC22uJTwW1KzY3Gz65NZRlvoiQ==" }, "postcss-focus-visible": { "version": "4.0.0", "resolved": "https://registry.npmjs.org/postcss-focus-visible/-/postcss-focus-visible-4.0.0.tgz", - "integrity": "sha512-Z5CkWBw0+idJHSV6+Bgf2peDOFf/x4o+vX/pwcNYrWpXFrSfTkQ3JQ1ojrq9yS+upnAlNRHeg8uEwFTgorjI8g==", - "requires": { - "postcss": "^7.0.2" - } + "integrity": "sha512-Z5CkWBw0+idJHSV6+Bgf2peDOFf/x4o+vX/pwcNYrWpXFrSfTkQ3JQ1ojrq9yS+upnAlNRHeg8uEwFTgorjI8g==" }, "postcss-focus-within": { "version": "3.0.0", "resolved": "https://registry.npmjs.org/postcss-focus-within/-/postcss-focus-within-3.0.0.tgz", - "integrity": "sha512-W0APui8jQeBKbCGZudW37EeMCjDeVxKgiYfIIEo8Bdh5SpB9sxds/Iq8SEuzS0Q4YFOlG7EPFulbbxujpkrV2w==", - "requires": { - "postcss": "^7.0.2" - } + "integrity": "sha512-W0APui8jQeBKbCGZudW37EeMCjDeVxKgiYfIIEo8Bdh5SpB9sxds/Iq8SEuzS0Q4YFOlG7EPFulbbxujpkrV2w==" }, "postcss-font-variant": { "version": "4.0.1", "resolved": "https://registry.npmjs.org/postcss-font-variant/-/postcss-font-variant-4.0.1.tgz", - "integrity": "sha512-I3ADQSTNtLTTd8uxZhtSOrTCQ9G4qUVKPjHiDk0bV75QSxXjVWiJVJ2VLdspGUi9fbW9BcjKJoRvxAH1pckqmA==", - "requires": { - "postcss": "^7.0.2" - } + "integrity": "sha512-I3ADQSTNtLTTd8uxZhtSOrTCQ9G4qUVKPjHiDk0bV75QSxXjVWiJVJ2VLdspGUi9fbW9BcjKJoRvxAH1pckqmA==" }, "postcss-gap-properties": { "version": "2.0.0", "resolved": "https://registry.npmjs.org/postcss-gap-properties/-/postcss-gap-properties-2.0.0.tgz", - "integrity": "sha512-QZSqDaMgXCHuHTEzMsS2KfVDOq7ZFiknSpkrPJY6jmxbugUPTuSzs/vuE5I3zv0WAS+3vhrlqhijiprnuQfzmg==", - "requires": { - "postcss": "^7.0.2" - } + "integrity": "sha512-QZSqDaMgXCHuHTEzMsS2KfVDOq7ZFiknSpkrPJY6jmxbugUPTuSzs/vuE5I3zv0WAS+3vhrlqhijiprnuQfzmg==" }, "postcss-image-set-function": { "version": "3.0.1", "resolved": "https://registry.npmjs.org/postcss-image-set-function/-/postcss-image-set-function-3.0.1.tgz", "integrity": "sha512-oPTcFFip5LZy8Y/whto91L9xdRHCWEMs3e1MdJxhgt4jy2WYXfhkng59fH5qLXSCPN8k4n94p1Czrfe5IOkKUw==", "requires": { - "postcss": "^7.0.2", "postcss-values-parser": "^2.0.0" } }, "postcss-initial": { "version": "3.0.4", "resolved": "https://registry.npmjs.org/postcss-initial/-/postcss-initial-3.0.4.tgz", - "integrity": "sha512-3RLn6DIpMsK1l5UUy9jxQvoDeUN4gP939tDcKUHD/kM8SGSKbFAnvkpFpj3Bhtz3HGk1jWY5ZNWX6mPta5M9fg==", - "requires": { - "postcss": "^7.0.2" - } + "integrity": "sha512-3RLn6DIpMsK1l5UUy9jxQvoDeUN4gP939tDcKUHD/kM8SGSKbFAnvkpFpj3Bhtz3HGk1jWY5ZNWX6mPta5M9fg==" }, "postcss-lab-function": { "version": "2.0.1", @@ -11491,7 +11393,6 @@ "integrity": "sha512-whLy1IeZKY+3fYdqQFuDBf8Auw+qFuVnChWjmxm/UhHWqNHZx+B99EwxTvGYmUBqe3Fjxs4L1BoZTJmPu6usVg==", "requires": { "@csstools/convert-colors": "^1.4.0", - "postcss": "^7.0.2", "postcss-values-parser": "^2.0.0" } }, @@ -11546,7 +11447,6 @@ "integrity": "sha512-cLWoDEY5OwHcAjDnkyRQzAXfs2jrKjXpO/HQFcc5b5u/r7aa471wdmChmwfnv7x2u840iat/wi0lQ5nbRgSkUA==", "requires": { "loader-utils": "^1.1.0", - "postcss": "^7.0.0", "postcss-load-config": "^2.0.0", "schema-utils": "^1.0.0" }, @@ -11584,18 +11484,12 @@ "postcss-logical": { "version": "3.0.0", "resolved": "https://registry.npmjs.org/postcss-logical/-/postcss-logical-3.0.0.tgz", - "integrity": "sha512-1SUKdJc2vuMOmeItqGuNaC+N8MzBWFWEkAnRnLpFYj1tGGa7NqyVBujfRtgNa2gXR+6RkGUiB2O5Vmh7E2RmiA==", - "requires": { - "postcss": "^7.0.2" - } + "integrity": "sha512-1SUKdJc2vuMOmeItqGuNaC+N8MzBWFWEkAnRnLpFYj1tGGa7NqyVBujfRtgNa2gXR+6RkGUiB2O5Vmh7E2RmiA==" }, "postcss-media-minmax": { "version": "4.0.0", "resolved": "https://registry.npmjs.org/postcss-media-minmax/-/postcss-media-minmax-4.0.0.tgz", - "integrity": "sha512-fo9moya6qyxsjbFAYl97qKO9gyre3qvbMnkOZeZwlsW6XYFsvs2DMGDlchVLfAd8LHPZDxivu/+qW2SMQeTHBw==", - "requires": { - "postcss": "^7.0.2" - } + "integrity": "sha512-fo9moya6qyxsjbFAYl97qKO9gyre3qvbMnkOZeZwlsW6XYFsvs2DMGDlchVLfAd8LHPZDxivu/+qW2SMQeTHBw==" }, "postcss-merge-longhand": { "version": "4.0.11", @@ -11603,7 +11497,6 @@ "integrity": "sha512-alx/zmoeXvJjp7L4mxEMjh8lxVlDFX1gqWHzaaQewwMZiVhLo42TEClKaeHbRf6J7j82ZOdTJ808RtN0ZOZwvw==", "requires": { "css-color-names": "0.0.4", - "postcss": "^7.0.0", "postcss-value-parser": "^3.0.0", "stylehacks": "^4.0.0" }, @@ -11623,7 +11516,6 @@ "browserslist": "^4.0.0", "caniuse-api": "^3.0.0", "cssnano-util-same-parent": "^4.0.0", - "postcss": "^7.0.0", "postcss-selector-parser": "^3.0.0", "vendors": "^1.0.0" }, @@ -11645,7 +11537,6 @@ "resolved": "https://registry.npmjs.org/postcss-minify-font-values/-/postcss-minify-font-values-4.0.2.tgz", "integrity": "sha512-j85oO6OnRU9zPf04+PZv1LYIYOprWm6IA6zkXkrJXyRveDEuQggG6tvoy8ir8ZwjLxLuGfNkCZEQG7zan+Hbtg==", "requires": { - "postcss": "^7.0.0", "postcss-value-parser": "^3.0.0" }, "dependencies": { @@ -11663,7 +11554,6 @@ "requires": { "cssnano-util-get-arguments": "^4.0.0", "is-color-stop": "^1.0.0", - "postcss": "^7.0.0", "postcss-value-parser": "^3.0.0" }, "dependencies": { @@ -11682,7 +11572,6 @@ "alphanum-sort": "^1.0.0", "browserslist": "^4.0.0", "cssnano-util-get-arguments": "^4.0.0", - "postcss": "^7.0.0", "postcss-value-parser": "^3.0.0", "uniqs": "^2.0.0" }, @@ -11701,7 +11590,6 @@ "requires": { "alphanum-sort": "^1.0.0", "has": "^1.0.0", - "postcss": "^7.0.0", "postcss-selector-parser": "^3.0.0" }, "dependencies": { @@ -11720,10 +11608,7 @@ "postcss-modules-extract-imports": { "version": "2.0.0", "resolved": "https://registry.npmjs.org/postcss-modules-extract-imports/-/postcss-modules-extract-imports-2.0.0.tgz", - "integrity": "sha512-LaYLDNS4SG8Q5WAWqIJgdHPJrDDr/Lv775rMBFUbgjTz6j34lUznACHcdRWroPvXANP2Vj7yNK57vp9eFqzLWQ==", - "requires": { - "postcss": "^7.0.5" - } + "integrity": "sha512-LaYLDNS4SG8Q5WAWqIJgdHPJrDDr/Lv775rMBFUbgjTz6j34lUznACHcdRWroPvXANP2Vj7yNK57vp9eFqzLWQ==" }, "postcss-modules-local-by-default": { "version": "3.0.3", @@ -11731,7 +11616,6 @@ "integrity": "sha512-e3xDq+LotiGesympRlKNgaJ0PCzoUIdpH0dj47iWAui/kyTgh3CiAr1qP54uodmJhl6p9rN6BoNcdEDVJx9RDw==", "requires": { "icss-utils": "^4.1.1", - "postcss": "^7.0.32", "postcss-selector-parser": "^6.0.2", "postcss-value-parser": "^4.1.0" } @@ -11741,7 +11625,6 @@ "resolved": "https://registry.npmjs.org/postcss-modules-scope/-/postcss-modules-scope-2.2.0.tgz", "integrity": "sha512-YyEgsTMRpNd+HmyC7H/mh3y+MeFWevy7V1evVhJWewmMbjDHIbZbOXICC2y+m1xI1UVfIT1HMW/O04Hxyu9oXQ==", "requires": { - "postcss": "^7.0.6", "postcss-selector-parser": "^6.0.0" } }, @@ -11750,17 +11633,13 @@ "resolved": "https://registry.npmjs.org/postcss-modules-values/-/postcss-modules-values-3.0.0.tgz", "integrity": "sha512-1//E5jCBrZ9DmRX+zCtmQtRSV6PV42Ix7Bzj9GbwJceduuf7IqP8MgeTXuRDHOWj2m0VzZD5+roFWDuU8RQjcg==", "requires": { - "icss-utils": "^4.0.0", - "postcss": "^7.0.6" + "icss-utils": "^4.0.0" } }, "postcss-nesting": { "version": "7.0.1", "resolved": "https://registry.npmjs.org/postcss-nesting/-/postcss-nesting-7.0.1.tgz", - "integrity": "sha512-FrorPb0H3nuVq0Sff7W2rnc3SmIcruVC6YwpcS+k687VxyxO33iE1amna7wHuRVzM8vfiYofXSBHNAZ3QhLvYg==", - "requires": { - "postcss": "^7.0.2" - } + "integrity": "sha512-FrorPb0H3nuVq0Sff7W2rnc3SmIcruVC6YwpcS+k687VxyxO33iE1amna7wHuRVzM8vfiYofXSBHNAZ3QhLvYg==" }, "postcss-normalize": { "version": "8.0.1", @@ -11769,7 +11648,6 @@ "requires": { "@csstools/normalize.css": "^10.1.0", "browserslist": "^4.6.2", - "postcss": "^7.0.17", "postcss-browser-comments": "^3.0.0", "sanitize.css": "^10.0.0" } @@ -11777,10 +11655,7 @@ "postcss-normalize-charset": { "version": "4.0.1", "resolved": "https://registry.npmjs.org/postcss-normalize-charset/-/postcss-normalize-charset-4.0.1.tgz", - "integrity": "sha512-gMXCrrlWh6G27U0hF3vNvR3w8I1s2wOBILvA87iNXaPvSNo5uZAMYsZG7XjCUf1eVxuPfyL4TJ7++SGZLc9A3g==", - "requires": { - "postcss": "^7.0.0" - } + "integrity": "sha512-gMXCrrlWh6G27U0hF3vNvR3w8I1s2wOBILvA87iNXaPvSNo5uZAMYsZG7XjCUf1eVxuPfyL4TJ7++SGZLc9A3g==" }, "postcss-normalize-display-values": { "version": "4.0.2", @@ -11788,7 +11663,6 @@ "integrity": "sha512-3F2jcsaMW7+VtRMAqf/3m4cPFhPD3EFRgNs18u+k3lTJJlVe7d0YPO+bnwqo2xg8YiRpDXJI2u8A0wqJxMsQuQ==", "requires": { "cssnano-util-get-match": "^4.0.0", - "postcss": "^7.0.0", "postcss-value-parser": "^3.0.0" }, "dependencies": { @@ -11806,7 +11680,6 @@ "requires": { "cssnano-util-get-arguments": "^4.0.0", "has": "^1.0.0", - "postcss": "^7.0.0", "postcss-value-parser": "^3.0.0" }, "dependencies": { @@ -11824,7 +11697,6 @@ "requires": { "cssnano-util-get-arguments": "^4.0.0", "cssnano-util-get-match": "^4.0.0", - "postcss": "^7.0.0", "postcss-value-parser": "^3.0.0" }, "dependencies": { @@ -11841,7 +11713,6 @@ "integrity": "sha512-RrERod97Dnwqq49WNz8qo66ps0swYZDSb6rM57kN2J+aoyEAJfZ6bMx0sx/F9TIEX0xthPGCmeyiam/jXif0eA==", "requires": { "has": "^1.0.0", - "postcss": "^7.0.0", "postcss-value-parser": "^3.0.0" }, "dependencies": { @@ -11858,7 +11729,6 @@ "integrity": "sha512-acwJY95edP762e++00Ehq9L4sZCEcOPyaHwoaFOhIwWCDfik6YvqsYNxckee65JHLKzuNSSmAdxwD2Cud1Z54A==", "requires": { "cssnano-util-get-match": "^4.0.0", - "postcss": "^7.0.0", "postcss-value-parser": "^3.0.0" }, "dependencies": { @@ -11875,7 +11745,6 @@ "integrity": "sha512-od18Uq2wCYn+vZ/qCOeutvHjB5jm57ToxRaMeNuf0nWVHaP9Hua56QyMF6fs/4FSUnVIw0CBPsU0K4LnBPwYwg==", "requires": { "browserslist": "^4.0.0", - "postcss": "^7.0.0", "postcss-value-parser": "^3.0.0" }, "dependencies": { @@ -11893,7 +11762,6 @@ "requires": { "is-absolute-url": "^2.0.0", "normalize-url": "^3.0.0", - "postcss": "^7.0.0", "postcss-value-parser": "^3.0.0" }, "dependencies": { @@ -11914,7 +11782,6 @@ "resolved": "https://registry.npmjs.org/postcss-normalize-whitespace/-/postcss-normalize-whitespace-4.0.2.tgz", "integrity": "sha512-tO8QIgrsI3p95r8fyqKV+ufKlSHh9hMJqACqbv2XknufqEDhDvbguXGBBqxw9nsQoXWf0qOqppziKJKHMD4GtA==", "requires": { - "postcss": "^7.0.0", "postcss-value-parser": "^3.0.0" }, "dependencies": { @@ -11931,7 +11798,6 @@ "integrity": "sha512-2fCObh5UanxvSxeXrtLtlwVThBvHn6MQcu4ksNT2tsaV2Fg76R2CV98W7wNSlX+5/pFwEyaDwKLLoEV7uRybAw==", "requires": { "cssnano-util-get-arguments": "^4.0.0", - "postcss": "^7.0.0", "postcss-value-parser": "^3.0.0" }, "dependencies": { @@ -11945,25 +11811,18 @@ "postcss-overflow-shorthand": { "version": "2.0.0", "resolved": "https://registry.npmjs.org/postcss-overflow-shorthand/-/postcss-overflow-shorthand-2.0.0.tgz", - "integrity": "sha512-aK0fHc9CBNx8jbzMYhshZcEv8LtYnBIRYQD5i7w/K/wS9c2+0NSR6B3OVMu5y0hBHYLcMGjfU+dmWYNKH0I85g==", - "requires": { - "postcss": "^7.0.2" - } + "integrity": "sha512-aK0fHc9CBNx8jbzMYhshZcEv8LtYnBIRYQD5i7w/K/wS9c2+0NSR6B3OVMu5y0hBHYLcMGjfU+dmWYNKH0I85g==" }, "postcss-page-break": { "version": "2.0.0", "resolved": "https://registry.npmjs.org/postcss-page-break/-/postcss-page-break-2.0.0.tgz", - "integrity": "sha512-tkpTSrLpfLfD9HvgOlJuigLuk39wVTbbd8RKcy8/ugV2bNBUW3xU+AIqyxhDrQr1VUj1RmyJrBn1YWrqUm9zAQ==", - "requires": { - "postcss": "^7.0.2" - } + "integrity": "sha512-tkpTSrLpfLfD9HvgOlJuigLuk39wVTbbd8RKcy8/ugV2bNBUW3xU+AIqyxhDrQr1VUj1RmyJrBn1YWrqUm9zAQ==" }, "postcss-place": { "version": "4.0.1", "resolved": "https://registry.npmjs.org/postcss-place/-/postcss-place-4.0.1.tgz", "integrity": "sha512-Zb6byCSLkgRKLODj/5mQugyuj9bvAAw9LqJJjgwz5cYryGeXfFZfSXoP1UfveccFmeq0b/2xxwcTEVScnqGxBg==", "requires": { - "postcss": "^7.0.2", "postcss-values-parser": "^2.0.0" } }, @@ -11979,7 +11838,6 @@ "css-has-pseudo": "^0.10.0", "css-prefers-color-scheme": "^3.1.1", "cssdb": "^4.4.0", - "postcss": "^7.0.17", "postcss-attribute-case-insensitive": "^4.0.1", "postcss-color-functional-notation": "^2.0.1", "postcss-color-gray": "^5.0.0", @@ -12016,7 +11874,6 @@ "resolved": "https://registry.npmjs.org/postcss-pseudo-class-any-link/-/postcss-pseudo-class-any-link-6.0.0.tgz", "integrity": "sha512-lgXW9sYJdLqtmw23otOzrtbDXofUdfYzNm4PIpNE322/swES3VU9XlXHeJS46zT2onFO7V1QFdD4Q9LiZj8mew==", "requires": { - "postcss": "^7.0.2", "postcss-selector-parser": "^5.0.0-rc.3" }, "dependencies": { @@ -12044,8 +11901,7 @@ "requires": { "browserslist": "^4.0.0", "caniuse-api": "^3.0.0", - "has": "^1.0.0", - "postcss": "^7.0.0" + "has": "^1.0.0" } }, "postcss-reduce-transforms": { @@ -12055,7 +11911,6 @@ "requires": { "cssnano-util-get-match": "^4.0.0", "has": "^1.0.0", - "postcss": "^7.0.0", "postcss-value-parser": "^3.0.0" }, "dependencies": { @@ -12069,10 +11924,7 @@ "postcss-replace-overflow-wrap": { "version": "3.0.0", "resolved": "https://registry.npmjs.org/postcss-replace-overflow-wrap/-/postcss-replace-overflow-wrap-3.0.0.tgz", - "integrity": "sha512-2T5hcEHArDT6X9+9dVSPQdo7QHzG4XKclFT8rU5TzJPDN7RIRTbO9c4drUISOVemLj03aezStHCR2AIcr8XLpw==", - "requires": { - "postcss": "^7.0.2" - } + "integrity": "sha512-2T5hcEHArDT6X9+9dVSPQdo7QHzG4XKclFT8rU5TzJPDN7RIRTbO9c4drUISOVemLj03aezStHCR2AIcr8XLpw==" }, "postcss-safe-parser": { "version": "5.0.2", @@ -12099,8 +11951,7 @@ "resolved": "https://registry.npmjs.org/postcss-selector-matches/-/postcss-selector-matches-4.0.0.tgz", "integrity": "sha512-LgsHwQR/EsRYSqlwdGzeaPKVT0Ml7LAT6E75T8W8xLJY62CE4S/l03BWIt3jT8Taq22kXP08s2SfTSzaraoPww==", "requires": { - "balanced-match": "^1.0.0", - "postcss": "^7.0.2" + "balanced-match": "^1.0.0" } }, "postcss-selector-not": { @@ -12108,8 +11959,7 @@ "resolved": "https://registry.npmjs.org/postcss-selector-not/-/postcss-selector-not-4.0.1.tgz", "integrity": "sha512-YolvBgInEK5/79C+bdFMyzqTg6pkYqDbzZIST/PDMqa/o3qtXenD05apBG2jLgT0/BQ77d4U2UK12jWpilqMAQ==", "requires": { - "balanced-match": "^1.0.0", - "postcss": "^7.0.2" + "balanced-match": "^1.0.0" } }, "postcss-selector-parser": { @@ -12126,7 +11976,6 @@ "resolved": "https://registry.npmjs.org/postcss-svgo/-/postcss-svgo-4.0.3.tgz", "integrity": "sha512-NoRbrcMWTtUghzuKSoIm6XV+sJdvZ7GZSc3wdBN0W19FTtp2ko8NqLsgoh/m9CzNhU3KLPvQmjIwtaNFkaFTvw==", "requires": { - "postcss": "^7.0.0", "postcss-value-parser": "^3.0.0", "svgo": "^1.0.0" }, @@ -12144,7 +11993,6 @@ "integrity": "sha512-+JanVaryLo9QwZjKrmJgkI4Fn8SBgRO6WXQBJi7KiAVPlmxikB5Jzc4EvXMT2H0/m0RjrVVm9rGNhZddm/8Spg==", "requires": { "alphanum-sort": "^1.0.0", - "postcss": "^7.0.0", "uniqs": "^2.0.0" } }, @@ -14243,6 +14091,12 @@ "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz", "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g==" }, + "source-map-js": { + "version": "0.6.2", + "resolved": "https://registry.npmjs.org/source-map-js/-/source-map-js-0.6.2.tgz", + "integrity": "sha512-/3GptzWzu0+0MBQFrDKzw/DvvMTUORvgY6k6jd/VS6iCR4RDTKWH6v6WPwQoUO8667uQEf9Oe38DxAYWY5F/Ug==", + "dev": true + }, "source-map-resolve": { "version": "0.5.3", "resolved": "https://registry.npmjs.org/source-map-resolve/-/source-map-resolve-0.5.3.tgz", @@ -14694,7 +14548,6 @@ "integrity": "sha512-7GlLk9JwlElY4Y6a/rmbH2MhVlTyVmiJd1PfTCqFaIBEGMYNsrO/v3SeGTdhBThLg4Z+NbOk/qFMwCa+J+3p/g==", "requires": { "browserslist": "^4.0.0", - "postcss": "^7.0.0", "postcss-selector-parser": "^3.0.0" }, "dependencies": { From 88d2c57938d6e20fae41ce76a989f94dd0eb9b47 Mon Sep 17 00:00:00 2001 From: Garima4496 Date: Thu, 19 Aug 2021 18:28:58 +0530 Subject: [PATCH 07/16] Adding ConditionalAccessPolicy to SPOTenantSettings --- .../MSFT_SPOTenantSettings.psm1 | 19 ++++++++++++++++++- 1 file changed, 18 insertions(+), 1 deletion(-) diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_SPOTenantSettings/MSFT_SPOTenantSettings.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_SPOTenantSettings/MSFT_SPOTenantSettings.psm1 index 7cc8afcbbc..d9c8808693 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_SPOTenantSettings/MSFT_SPOTenantSettings.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_SPOTenantSettings/MSFT_SPOTenantSettings.psm1 @@ -83,6 +83,11 @@ function Get-TargetResource [System.String] $MarkNewFilesSensitiveByDefault, + [Parameter()] + [ValidateSet("AllowFullAccess", "AllowLimitedAccess", "BlockAccess")] + [System.String] + $ConditionalAccessPolicy, + [Parameter()] [ValidateSet("Present", "Absent")] [System.String] @@ -170,6 +175,7 @@ function Get-TargetResource FilePickerExternalImageSearchEnabled = $SPOTenantSettings.FilePickerExternalImageSearchEnabled HideDefaultThemes = $SPOTenantSettings.HideDefaultThemes MarkNewFilesSensitiveByDefault = $SPOTenantSettings.MarkNewFilesSensitiveByDefault + ConditionalAccessPolicy = $SPOTenantSettings.ConditionalAccessPolicy GlobalAdminAccount = $GlobalAdminAccount ApplicationId = $ApplicationId TenantId = $TenantId @@ -293,6 +299,11 @@ function Set-TargetResource [System.String] $MarkNewFilesSensitiveByDefault, + [Parameter()] + [ValidateSet("AllowFullAccess","AllowLimitedAccess", "BlockAccess")] + [System.String] + $ConditionalAccessPolicy, + [Parameter()] [ValidateSet("Present", "Absent")] [System.String] @@ -448,6 +459,11 @@ function Test-TargetResource [System.String] $MarkNewFilesSensitiveByDefault, + [Parameter()] + [ValidateSet("AllowFullAccess", "AllowLimitedAccess", "BlockAccess")] + [System.String] + $ConditionalAccessPolicy, + [Parameter()] [ValidateSet("Present", "Absent")] [System.String] @@ -522,7 +538,8 @@ function Test-TargetResource "ApplyAppEnforcedRestrictionsToAdHocRecipients", ` "FilePickerExternalImageSearchEnabled", ` "HideDefaultThemes", ` - "MarkNewFilesSensitiveByDefault" + "MarkNewFilesSensitiveByDefault", ` + "ConditionalAccessPolicy" ) Write-Verbose -Message "Test-TargetResource returned $TestResult" From 5222771f391e0e0381bd7c572efe2f1b83b36b63 Mon Sep 17 00:00:00 2001 From: Garima4496 Date: Thu, 19 Aug 2021 18:29:53 +0530 Subject: [PATCH 08/16] Adding ConditionalAccessPolicy details to schema file --- .../MSFT_SPOTenantSettings/MSFT_SPOTenantSettings.schema.mof | 1 + 1 file changed, 1 insertion(+) diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_SPOTenantSettings/MSFT_SPOTenantSettings.schema.mof b/Modules/Microsoft365DSC/DSCResources/MSFT_SPOTenantSettings/MSFT_SPOTenantSettings.schema.mof index e4d4771545..10167d07c2 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_SPOTenantSettings/MSFT_SPOTenantSettings.schema.mof +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_SPOTenantSettings/MSFT_SPOTenantSettings.schema.mof @@ -20,6 +20,7 @@ class MSFT_SPOTenantSettings : OMI_BaseResource [Write, Description("")] boolean FilePickerExternalImageSearchEnabled; [Write, Description("Defines if the default themes are visible or hidden")] boolean HideDefaultThemes; [Write, Description("Allow or block external sharing until at least one Office DLP policy scans the content of the file."), ValueMap{"AllowExternalSharing","BlockExternalSharing"}, Values{"AllowExternalSharing","BlockExternalSharing"}] string MarkNewFilesSensitiveByDefault; + [Write, Description("Allow or Block Conditional Access Policy on the SharePoint Tenant"), ValueMap{"AllowFullAccess", "AllowLimitedAccess", "BlockAccess"}, Values{"AllowFullAccess", "AllowLimitedAccess", "BlockAccess"}] string ConditionalAccessPolicy; [Write, Description("Only accepted value is 'Present'."), ValueMap{"Present","Absent"}, Values{"Present","Absent"}] String Ensure; [Write, Description("Credentials of the SharePoint Global Admin"), EmbeddedInstance("MSFT_Credential")] string GlobalAdminAccount; [Write, Description("Id of the Azure Active Directory application to authenticate with.")] String ApplicationId; From 9d888019670e33fc0f8c69da774aaa0dfb4721ba Mon Sep 17 00:00:00 2001 From: Garima4496 Date: Tue, 24 Aug 2021 13:52:09 +0530 Subject: [PATCH 09/16] Merge branch 'F1_SPO' of https://github.com/Garima4496/Microsoft365DSC into F1_SPO --- CHANGELOG.md | 2 + .../MSFT_EXOSafeLinksPolicy.psm1 | 2 +- .../MSFT_IntuneAppConfigurationPolicy.psm1 | 10 +- .../MSFT_IntuneAppProtectionPolicyiOS.psm1 | 5 +- .../MSFT_SPOOrgAssetsLibrary.psm1 | 4 +- .../MSFT_SPOSiteScript.psm1 | 2 +- .../MSFT_TeamsMeetingPolicy.psm1 | 200 +++++++++--------- .../MSFT_TeamsMeetingPolicy.schema.mof | Bin 22080 -> 22314 bytes 8 files changed, 119 insertions(+), 106 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index 9f7896dcf6..d18c51fd4a 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -5,6 +5,8 @@ * DEPENDENCIES; * Updated AzureADPreview to version 2.0.2.138; * Updated Microsoft.PowerApps.Administration.PowerShell to version 2.0.128; +* MISC + * Additional display alignment fixes for Export; # 1.21.804.1 diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_EXOSafeLinksPolicy/MSFT_EXOSafeLinksPolicy.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_EXOSafeLinksPolicy/MSFT_EXOSafeLinksPolicy.psm1 index 0215a303eb..9162a352aa 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_EXOSafeLinksPolicy/MSFT_EXOSafeLinksPolicy.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_EXOSafeLinksPolicy/MSFT_EXOSafeLinksPolicy.psm1 @@ -470,7 +470,7 @@ function Export-TargetResource else { Write-Host "`r`n" -NoNewline - }g + } $i = 1 foreach ($SafeLinksPolicy in $SafeLinksPolicies) { diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAppConfigurationPolicy/MSFT_IntuneAppConfigurationPolicy.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAppConfigurationPolicy/MSFT_IntuneAppConfigurationPolicy.psm1 index f6a07ed1b7..3e8436c739 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAppConfigurationPolicy/MSFT_IntuneAppConfigurationPolicy.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAppConfigurationPolicy/MSFT_IntuneAppConfigurationPolicy.psm1 @@ -319,7 +319,15 @@ function Export-TargetResource } catch { - Write-Host $Global:M365DSCEmojiRedX + if ($_.Exception -like '*401*') + { + Write-Host "`r`n $($Global:M365DSCEmojiYellowCircle) The current tenant is not registered for Intune." + } + else + { + Write-Host $Global:M365DSCEmojiRedX + } + try { Write-Verbose -Message $_ diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAppProtectionPolicyiOS/MSFT_IntuneAppProtectionPolicyiOS.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAppProtectionPolicyiOS/MSFT_IntuneAppProtectionPolicyiOS.psm1 index 6aa8540142..5cc3d245ea 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAppProtectionPolicyiOS/MSFT_IntuneAppProtectionPolicyiOS.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAppProtectionPolicyiOS/MSFT_IntuneAppProtectionPolicyiOS.psm1 @@ -673,11 +673,14 @@ function Export-TargetResource } catch { - Write-Host $Global:M365DSCEmojiRedX if ($_.Exception -like '*401*') { Write-Host "`r`n $($Global:M365DSCEmojiYellowCircle) The current tenant is not registered for Intune." } + else + { + Write-Host $Global:M365DSCEmojiRedX + } try { Write-Verbose -Message $_ diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_SPOOrgAssetsLibrary/MSFT_SPOOrgAssetsLibrary.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_SPOOrgAssetsLibrary/MSFT_SPOOrgAssetsLibrary.psm1 index de28421dc7..50716195f8 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_SPOOrgAssetsLibrary/MSFT_SPOOrgAssetsLibrary.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_SPOOrgAssetsLibrary/MSFT_SPOOrgAssetsLibrary.psm1 @@ -450,7 +450,7 @@ function Export-TargetResource $i = 1 $dscContent = '' - if ($orgAssets.Length -gt 0) + if ($orgAssets.Length -eq 0) { Write-Host $Global:M365DSCEmojiGreenCheckMark } @@ -462,7 +462,7 @@ function Export-TargetResource { foreach ($orgAssetLib in $orgAssets.OrgAssetsLibraries) { - Write-Host " [$i/$($orgAssets.Length)] $LibraryUrl" -NoNewline + Write-Host " [$i/$($orgAssets.Length)] $($orgAssetLib.libraryurl.DecodedUrl)" -NoNewline $Params = @{ GlobalAdminAccount = $GlobalAdminAccount LibraryUrl = "https://$tenantName.sharepoint.com/$($orgAssetLib.libraryurl.DecodedUrl)" diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_SPOSiteScript/MSFT_SPOSiteScript.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_SPOSiteScript/MSFT_SPOSiteScript.psm1 index fc360a3cd8..8ffaf4a581 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_SPOSiteScript/MSFT_SPOSiteScript.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_SPOSiteScript/MSFT_SPOSiteScript.psm1 @@ -457,7 +457,7 @@ function Export-TargetResource } foreach ($script in $siteScripts) { - Write-Host " [$i/$($siteScripts.Length)] $($script.Title)" + Write-Host " [$i/$($siteScripts.Length)] $($script.Title)" -NoNewline $params = @{ Identity = $script.Id Title = $script.Title diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_TeamsMeetingPolicy/MSFT_TeamsMeetingPolicy.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_TeamsMeetingPolicy/MSFT_TeamsMeetingPolicy.psm1 index d87330b268..7a7049b291 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_TeamsMeetingPolicy/MSFT_TeamsMeetingPolicy.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_TeamsMeetingPolicy/MSFT_TeamsMeetingPolicy.psm1 @@ -25,19 +25,19 @@ function Get-TargetResource $AllowPrivateMeetNow, [Parameter()] - [ValidateSet("Disabled", "Enabled")] + [ValidateSet('Disabled', 'Enabled')] [System.String] - $MeetingChatEnabledType = "Enabled", + $MeetingChatEnabledType = 'Enabled', [Parameter()] - [ValidateSet("Disabled", "DisabledUserOverride")] + [ValidateSet('Disabled', 'DisabledUserOverride')] [System.String] - $LiveCaptionsEnabledType = "DisabledUserOverride", + $LiveCaptionsEnabledType = 'DisabledUserOverride', [Parameter()] - [ValidateSet("OrganizerOnlyUserOverride", "EveryoneInCompanyUserOverride", "EveryoneUserOverride")] + [ValidateSet('OrganizerOnlyUserOverride', 'EveryoneInCompanyUserOverride', 'EveryoneUserOverride')] [System.String] - $DesignatedPresenterRoleMode = "EveryoneUserOverride", + $DesignatedPresenterRoleMode = 'EveryoneUserOverride', [Parameter()] [System.Boolean] @@ -48,19 +48,19 @@ function Get-TargetResource $AllowIPVideo, [Parameter()] - [ValidateSet("Enabled", "Disabled")] + [ValidateSet('Enabled', 'Disabled')] [System.String] - $AllowEngagementReport = "Disabled", + $AllowEngagementReport = 'Disabled', [Parameter()] - [ValidateSet("EnabledOutgoingIncoming", "Disabled")] + [ValidateSet('EnabledOutgoingIncoming', 'Disabled')] [System.String] - $IPAudioMode = "EnabledOutgoingIncoming", + $IPAudioMode = 'EnabledOutgoingIncoming', [Parameter()] - [ValidateSet("EnabledOutgoingIncoming", "Disabled")] + [ValidateSet('EnabledOutgoingIncoming', 'Disabled')] [System.String] - $IPVideoMode = "EnabledOutgoingIncoming", + $IPVideoMode = 'EnabledOutgoingIncoming', [Parameter()] [System.Boolean] @@ -76,7 +76,7 @@ function Get-TargetResource [Parameter()] [System.String] - [ValidateSet('EveryoneInCompany', 'Everyone', 'EveryoneInSameAndFederatedCompany', 'OrganizerOnly')] + [ValidateSet('EveryoneInCompany', 'Everyone', 'EveryoneInSameAndFederatedCompany', 'OrganizerOnly', 'InvitedUsers')] $AutoAdmittedUsers, [Parameter()] @@ -157,26 +157,26 @@ function Get-TargetResource $AllowUserToJoinExternalMeeting, [Parameter()] - [ValidateSet("Disabled", "Enabled")] + [ValidateSet('Disabled', 'Enabled')] [System.String] - $EnrollUserOverride = "Disabled", + $EnrollUserOverride = 'Disabled', [Parameter()] - [ValidateSet("Off", "Distinguish", "Attribute")] + [ValidateSet('Off', 'Distinguish', 'Attribute')] [System.String] - $RoomAttributeUserOverride = "Off", + $RoomAttributeUserOverride = 'Off', [Parameter()] - [ValidateSet("Disabled", "Enabled")] + [ValidateSet('Disabled', 'Enabled')] [System.String] - $StreamingAttendeeMode = "Enabled", + $StreamingAttendeeMode = 'Enabled', [Parameter()] [System.Boolean] $AllowBreakoutRooms, [Parameter()] - [ValidateSet("Disabled", "Enabled")] + [ValidateSet('Disabled', 'Enabled')] [System.String] $TeamsCameraFarEndPTZMode, @@ -185,9 +185,9 @@ function Get-TargetResource $AllowMeetingReactions, [Parameter()] - [ValidateSet("Present", "Absent")] + [ValidateSet('Present', 'Absent')] [System.String] - $Ensure = "Present", + $Ensure = 'Present', [Parameter(Mandatory = $true)] [System.Management.Automation.PSCredential] @@ -200,19 +200,19 @@ function Get-TargetResource -InboundParameters $PSBoundParameters #region Telemetry - $ResourceName = $MyInvocation.MyCommand.ModuleName.Replace("MSFT_", "") + $ResourceName = $MyInvocation.MyCommand.ModuleName.Replace('MSFT_', '') $data = [System.Collections.Generic.Dictionary[[String], [String]]]::new() - $data.Add("Resource", $ResourceName) - $data.Add("Method", $MyInvocation.MyCommand) - $data.Add("Principal", $GlobalAdminAccount.UserName) - $data.Add("TenantId", $TenantId) - $data.Add("ConnectionMode", $ConnectionMode) + $data.Add('Resource', $ResourceName) + $data.Add('Method', $MyInvocation.MyCommand) + $data.Add('Principal', $GlobalAdminAccount.UserName) + $data.Add('TenantId', $TenantId) + $data.Add('ConnectionMode', $ConnectionMode) Add-M365DSCTelemetryEvent -Data $data #endregion $nullReturn = $PSBoundParameters - $nullReturn.Ensure = "Absent" + $nullReturn.Ensure = 'Absent' try { $policy = Get-CsTeamsMeetingPolicy -Identity $Identity ` @@ -265,7 +265,7 @@ function Get-TargetResource AllowBreakoutRooms = $policy.AllowBreakoutRooms TeamsCameraFarEndPTZMode = $policy.TeamsCameraFarEndPTZMode AllowMeetingReactions = $policy.AllowMeetingReactions - Ensure = "Present" + Ensure = 'Present' GlobalAdminAccount = $GlobalAdminAccount } } @@ -274,7 +274,7 @@ function Get-TargetResource try { Write-Verbose -Message $_ - $tenantIdValue = "" + $tenantIdValue = '' if (-not [System.String]::IsNullOrEmpty($TenantId)) { $tenantIdValue = $TenantId @@ -321,19 +321,19 @@ function Set-TargetResource $AllowPrivateMeetNow, [Parameter()] - [ValidateSet("Disabled", "Enabled")] + [ValidateSet('Disabled', 'Enabled')] [System.String] - $MeetingChatEnabledType = "Enabled", + $MeetingChatEnabledType = 'Enabled', [Parameter()] - [ValidateSet("Disabled", "DisabledUserOverride")] + [ValidateSet('Disabled', 'DisabledUserOverride')] [System.String] - $LiveCaptionsEnabledType = "DisabledUserOverride", + $LiveCaptionsEnabledType = 'DisabledUserOverride', [Parameter()] - [ValidateSet("OrganizerOnlyUserOverride", "EveryoneInCompanyUserOverride", "EveryoneUserOverride")] + [ValidateSet('OrganizerOnlyUserOverride', 'EveryoneInCompanyUserOverride', 'EveryoneUserOverride')] [System.String] - $DesignatedPresenterRoleMode = "EveryoneUserOverride", + $DesignatedPresenterRoleMode = 'EveryoneUserOverride', [Parameter()] [System.Boolean] @@ -344,19 +344,19 @@ function Set-TargetResource $AllowIPVideo, [Parameter()] - [ValidateSet("Enabled", "Disabled")] + [ValidateSet('Enabled', 'Disabled')] [System.String] - $AllowEngagementReport = "Disabled", + $AllowEngagementReport = 'Disabled', [Parameter()] - [ValidateSet("EnabledOutgoingIncoming", "Disabled")] + [ValidateSet('EnabledOutgoingIncoming', 'Disabled')] [System.String] - $IPAudioMode = "EnabledOutgoingIncoming", + $IPAudioMode = 'EnabledOutgoingIncoming', [Parameter()] - [ValidateSet("EnabledOutgoingIncoming", "Disabled")] + [ValidateSet('EnabledOutgoingIncoming', 'Disabled')] [System.String] - $IPVideoMode = "EnabledOutgoingIncoming", + $IPVideoMode = 'EnabledOutgoingIncoming', [Parameter()] [System.Boolean] @@ -453,26 +453,26 @@ function Set-TargetResource $AllowUserToJoinExternalMeeting, [Parameter()] - [ValidateSet("Disabled", "Enabled")] + [ValidateSet('Disabled', 'Enabled')] [System.String] - $EnrollUserOverride = "Disabled", + $EnrollUserOverride = 'Disabled', [Parameter()] - [ValidateSet("Off", "Distinguish", "Attribute")] + [ValidateSet('Off', 'Distinguish', 'Attribute')] [System.String] - $RoomAttributeUserOverride = "Off", + $RoomAttributeUserOverride = 'Off', [Parameter()] - [ValidateSet("Disabled", "Enabled")] + [ValidateSet('Disabled', 'Enabled')] [System.String] - $StreamingAttendeeMode = "Enabled", + $StreamingAttendeeMode = 'Enabled', [Parameter()] [System.Boolean] $AllowBreakoutRooms, [Parameter()] - [ValidateSet("Disabled", "Enabled")] + [ValidateSet('Disabled', 'Enabled')] [System.String] $TeamsCameraFarEndPTZMode, @@ -481,23 +481,23 @@ function Set-TargetResource $AllowMeetingReactions, [Parameter()] - [ValidateSet("Present", "Absent")] + [ValidateSet('Present', 'Absent')] [System.String] - $Ensure = "Present", + $Ensure = 'Present', [Parameter(Mandatory = $true)] [System.Management.Automation.PSCredential] $GlobalAdminAccount ) - Write-Verbose -Message "Setting Teams Meeting Policy" + Write-Verbose -Message 'Setting Teams Meeting Policy' #region Telemetry - $ResourceName = $MyInvocation.MyCommand.ModuleName.Replace("MSFT_", "") + $ResourceName = $MyInvocation.MyCommand.ModuleName.Replace('MSFT_', '') $data = [System.Collections.Generic.Dictionary[[String], [String]]]::new() - $data.Add("Resource", $ResourceName) - $data.Add("Method", $MyInvocation.MyCommand) - $data.Add("Principal", $GlobalAdminAccount.UserName) + $data.Add('Resource', $ResourceName) + $data.Add('Method', $MyInvocation.MyCommand) + $data.Add('Principal', $GlobalAdminAccount.UserName) Add-M365DSCTelemetryEvent -Data $data #endregion @@ -507,8 +507,8 @@ function Set-TargetResource $CurrentValues = Get-TargetResource @PSBoundParameters $SetParameters = $PSBoundParameters - $SetParameters.Remove("Ensure") | Out-Null - $SetParameters.Remove("GlobalAdminAccount") | Out-Null + $SetParameters.Remove('Ensure') | Out-Null + $SetParameters.Remove('GlobalAdminAccount') | Out-Null if ($Ensure -eq 'Present' -and $CurrentValues.Ensure -eq 'Absent') { @@ -516,9 +516,9 @@ function Set-TargetResource # The AllowAnonymousUsersToDialOut is temporarly disabled. Therefore # we can't create or update a policy with it and it needs to be removed; - if ($SetParameters.ContainsKey("AllowAnonymousUsersToDialOut")) + if ($SetParameters.ContainsKey('AllowAnonymousUsersToDialOut')) { - $SetParameters.Remove("AllowAnonymousUsersToDialOut") | Out-Null + $SetParameters.Remove('AllowAnonymousUsersToDialOut') | Out-Null } New-CsTeamsMeetingPolicy @SetParameters } @@ -530,14 +530,14 @@ function Set-TargetResource # The AllowAnonymousUsersToDialOut is temporarly disabled. Therefore # we can't create or update a policy with it and it needs to be removed; - if ($SetParameters.ContainsKey("AllowAnonymousUsersToDialOut")) + if ($SetParameters.ContainsKey('AllowAnonymousUsersToDialOut')) { - $SetParameters.Remove("AllowAnonymousUsersToDialOut") | Out-Null + $SetParameters.Remove('AllowAnonymousUsersToDialOut') | Out-Null } if ($SetParameters.AllowCloudRecording -eq $false ) { - $SetParameters.Remove("RecordingStorageMode") - $SetParameters.Remove("AllowRecordingStorageOutsideRegion") + $SetParameters.Remove('RecordingStorageMode') + $SetParameters.Remove('AllowRecordingStorageOutsideRegion') } Set-CsTeamsMeetingPolicy @SetParameters } @@ -575,19 +575,19 @@ function Test-TargetResource $AllowPrivateMeetNow, [Parameter()] - [ValidateSet("Disabled", "Enabled")] + [ValidateSet('Disabled', 'Enabled')] [System.String] - $MeetingChatEnabledType = "Enabled", + $MeetingChatEnabledType = 'Enabled', [Parameter()] - [ValidateSet("Disabled", "DisabledUserOverride")] + [ValidateSet('Disabled', 'DisabledUserOverride')] [System.String] - $LiveCaptionsEnabledType = "DisabledUserOverride", + $LiveCaptionsEnabledType = 'DisabledUserOverride', [Parameter()] - [ValidateSet("OrganizerOnlyUserOverride", "EveryoneInCompanyUserOverride", "EveryoneUserOverride")] + [ValidateSet('OrganizerOnlyUserOverride', 'EveryoneInCompanyUserOverride', 'EveryoneUserOverride')] [System.String] - $DesignatedPresenterRoleMode = "EveryoneUserOverride", + $DesignatedPresenterRoleMode = 'EveryoneUserOverride', [Parameter()] [System.Boolean] @@ -598,19 +598,19 @@ function Test-TargetResource $AllowIPVideo, [Parameter()] - [ValidateSet("Enabled", "Disabled")] + [ValidateSet('Enabled', 'Disabled')] [System.String] - $AllowEngagementReport = "Disabled", + $AllowEngagementReport = 'Disabled', [Parameter()] - [ValidateSet("EnabledOutgoingIncoming", "Disabled")] + [ValidateSet('EnabledOutgoingIncoming', 'Disabled')] [System.String] - $IPAudioMode = "EnabledOutgoingIncoming", + $IPAudioMode = 'EnabledOutgoingIncoming', [Parameter()] - [ValidateSet("EnabledOutgoingIncoming", "Disabled")] + [ValidateSet('EnabledOutgoingIncoming', 'Disabled')] [System.String] - $IPVideoMode = "EnabledOutgoingIncoming", + $IPVideoMode = 'EnabledOutgoingIncoming', [Parameter()] [System.Boolean] @@ -707,26 +707,26 @@ function Test-TargetResource $AllowUserToJoinExternalMeeting, [Parameter()] - [ValidateSet("Disabled", "Enabled")] + [ValidateSet('Disabled', 'Enabled')] [System.String] - $EnrollUserOverride = "Disabled", + $EnrollUserOverride = 'Disabled', [Parameter()] - [ValidateSet("Off", "Distinguish", "Attribute")] + [ValidateSet('Off', 'Distinguish', 'Attribute')] [System.String] - $RoomAttributeUserOverride = "Off", + $RoomAttributeUserOverride = 'Off', [Parameter()] - [ValidateSet("Disabled", "Enabled")] + [ValidateSet('Disabled', 'Enabled')] [System.String] - $StreamingAttendeeMode = "Enabled", + $StreamingAttendeeMode = 'Enabled', [Parameter()] [System.Boolean] $AllowBreakoutRooms, [Parameter()] - [ValidateSet("Disabled", "Enabled")] + [ValidateSet('Disabled', 'Enabled')] [System.String] $TeamsCameraFarEndPTZMode, @@ -735,21 +735,21 @@ function Test-TargetResource $AllowMeetingReactions, [Parameter()] - [ValidateSet("Present", "Absent")] + [ValidateSet('Present', 'Absent')] [System.String] - $Ensure = "Present", + $Ensure = 'Present', [Parameter(Mandatory = $true)] [System.Management.Automation.PSCredential] $GlobalAdminAccount ) #region Telemetry - $ResourceName = $MyInvocation.MyCommand.ModuleName.Replace("MSFT_", "") + $ResourceName = $MyInvocation.MyCommand.ModuleName.Replace('MSFT_', '') $data = [System.Collections.Generic.Dictionary[[String], [String]]]::new() - $data.Add("Resource", $ResourceName) - $data.Add("Method", $MyInvocation.MyCommand) - $data.Add("Principal", $GlobalAdminAccount.UserName) - $data.Add("TenantId", $TenantId) + $data.Add('Resource', $ResourceName) + $data.Add('Method', $MyInvocation.MyCommand) + $data.Add('Principal', $GlobalAdminAccount.UserName) + $data.Add('TenantId', $TenantId) Add-M365DSCTelemetryEvent -Data $data #endregion @@ -764,7 +764,7 @@ function Test-TargetResource $ValuesToCheck.Remove('GlobalAdminAccount') | Out-Null # The AllowAnonymousUsersToDialOut is temporarly disabled. Therefore # we can't create or update a policy with it and it needs to be removed; - $ValuesToCheck.Remove("AllowAnonymousUsersToDialOut") | Out-Null + $ValuesToCheck.Remove('AllowAnonymousUsersToDialOut') | Out-Null $TestResult = Test-M365DSCParameterState -CurrentValues $CurrentValues ` @@ -791,13 +791,13 @@ function Export-TargetResource -InboundParameters $PSBoundParameters #region Telemetry - $ResourceName = $MyInvocation.MyCommand.ModuleName.Replace("MSFT_", "") + $ResourceName = $MyInvocation.MyCommand.ModuleName.Replace('MSFT_', '') $data = [System.Collections.Generic.Dictionary[[String], [String]]]::new() - $data.Add("Resource", $ResourceName) - $data.Add("Method", $MyInvocation.MyCommand) - $data.Add("Principal", $GlobalAdminAccount.UserName) - $data.Add("TenantId", $TenantId) - $data.Add("ConnectionMode", $ConnectionMode) + $data.Add('Resource', $ResourceName) + $data.Add('Method', $MyInvocation.MyCommand) + $data.Add('Principal', $GlobalAdminAccount.UserName) + $data.Add('TenantId', $TenantId) + $data.Add('ConnectionMode', $ConnectionMode) Add-M365DSCTelemetryEvent -Data $data #endregion @@ -836,7 +836,7 @@ function Export-TargetResource try { Write-Verbose -Message $_ - $tenantIdValue = "" + $tenantIdValue = '' if (-not [System.String]::IsNullOrEmpty($TenantId)) { $tenantIdValue = $TenantId @@ -853,7 +853,7 @@ function Export-TargetResource { Write-Verbose -Message $_ } - return "" + return '' } } diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_TeamsMeetingPolicy/MSFT_TeamsMeetingPolicy.schema.mof b/Modules/Microsoft365DSC/DSCResources/MSFT_TeamsMeetingPolicy/MSFT_TeamsMeetingPolicy.schema.mof index 31150efdbc0955eb64a260426a6de5dcf26c8166..3476e2c3b2fdd35d3b20ea99199cffed157b91ab 100644 GIT binary patch delta 186 zcmX@GhH=$8#tmf(ljkT)iF-2SF_bZ6GL$f+GNdqsG86;pB8KA0*|PSNXBlv5D=_2( zRpc;KGAIDmWB_FqfU1%8C@_>lbWPsKsW|zHg2?1JS-#0z6xt^HIkMq2KT%kE@-+n^ PqSP{mif`soGBE)F+)6M1 delta 30 mcmZ3rj`6@6#tmf(lS>5UCfg}4o6MrLZ}Jmek Date: Tue, 24 Aug 2021 08:18:54 -0400 Subject: [PATCH 10/16] Updated Teams and Power Apps dependencies --- CHANGELOG.md | 5 +++-- Modules/Microsoft365DSC/Microsoft365DSC.psd1 | 4 ++-- 2 files changed, 5 insertions(+), 4 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index d18c51fd4a..334a00c779 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,10 +1,11 @@ # Change log for Microsoft365DSC -# 1.21.811.1 +# 1.21.825.1 * DEPENDENCIES; * Updated AzureADPreview to version 2.0.2.138; - * Updated Microsoft.PowerApps.Administration.PowerShell to version 2.0.128; + * Updated Microsoft.PowerApps.Administration.PowerShell to version 2.0.131; + * Updated Microsoft.Teams to version 2.5.0; * MISC * Additional display alignment fixes for Export; diff --git a/Modules/Microsoft365DSC/Microsoft365DSC.psd1 b/Modules/Microsoft365DSC/Microsoft365DSC.psd1 index e86cc48c7b..59d47c39c5 100644 --- a/Modules/Microsoft365DSC/Microsoft365DSC.psd1 +++ b/Modules/Microsoft365DSC/Microsoft365DSC.psd1 @@ -81,11 +81,11 @@ }, @{ ModuleName = "Microsoft.PowerApps.Administration.PowerShell" - RequiredVersion = "2.0.128" + RequiredVersion = "2.0.131" }, @{ ModuleName = "MicrosoftTeams" - RequiredVersion = "2.3.1" + RequiredVersion = "2.5.0" }, @{ ModuleName = "MSCloudLoginAssistant" From aba4bc2c2ebd57bdcfc92f2691b3d8cd0c518998 Mon Sep 17 00:00:00 2001 From: Garima4496 Date: Tue, 24 Aug 2021 19:00:40 +0530 Subject: [PATCH 11/16] Update MSFT_SPOTenantSettings.psm1 --- .../MSFT_SPOTenantSettings.psm1 | 16 +++++++++++++++- 1 file changed, 15 insertions(+), 1 deletion(-) diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_SPOTenantSettings/MSFT_SPOTenantSettings.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_SPOTenantSettings/MSFT_SPOTenantSettings.psm1 index d9c8808693..dbce598dea 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_SPOTenantSettings/MSFT_SPOTenantSettings.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_SPOTenantSettings/MSFT_SPOTenantSettings.psm1 @@ -88,6 +88,10 @@ function Get-TargetResource [System.String] $ConditionalAccessPolicy, + [Parameter()] + [System.Guid[]] + $DisabledWebPartIds, + [Parameter()] [ValidateSet("Present", "Absent")] [System.String] @@ -176,6 +180,7 @@ function Get-TargetResource HideDefaultThemes = $SPOTenantSettings.HideDefaultThemes MarkNewFilesSensitiveByDefault = $SPOTenantSettings.MarkNewFilesSensitiveByDefault ConditionalAccessPolicy = $SPOTenantSettings.ConditionalAccessPolicy + DisabledWebPartIds = $SPOTenantSettings.DisabledWebPartIds GlobalAdminAccount = $GlobalAdminAccount ApplicationId = $ApplicationId TenantId = $TenantId @@ -304,6 +309,10 @@ function Set-TargetResource [System.String] $ConditionalAccessPolicy, + [Parameter()] + [System.Guid[]] + $DisabledWebPartIds, + [Parameter()] [ValidateSet("Present", "Absent")] [System.String] @@ -464,6 +473,10 @@ function Test-TargetResource [System.String] $ConditionalAccessPolicy, + [Parameter()] + [System.Guid[]] + $DisabledWebPartIds, + [Parameter()] [ValidateSet("Present", "Absent")] [System.String] @@ -539,7 +552,8 @@ function Test-TargetResource "FilePickerExternalImageSearchEnabled", ` "HideDefaultThemes", ` "MarkNewFilesSensitiveByDefault", ` - "ConditionalAccessPolicy" + "ConditionalAccessPolicy", ` + "DisabledWebPartIds" ) Write-Verbose -Message "Test-TargetResource returned $TestResult" From cadba9995f58690a6964c610e2d34e5e579713a0 Mon Sep 17 00:00:00 2001 From: Garima4496 Date: Tue, 24 Aug 2021 19:00:50 +0530 Subject: [PATCH 12/16] Update MSFT_SPOTenantSettings.schema.mof --- .../MSFT_SPOTenantSettings/MSFT_SPOTenantSettings.schema.mof | 1 + 1 file changed, 1 insertion(+) diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_SPOTenantSettings/MSFT_SPOTenantSettings.schema.mof b/Modules/Microsoft365DSC/DSCResources/MSFT_SPOTenantSettings/MSFT_SPOTenantSettings.schema.mof index 10167d07c2..ac6e459118 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_SPOTenantSettings/MSFT_SPOTenantSettings.schema.mof +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_SPOTenantSettings/MSFT_SPOTenantSettings.schema.mof @@ -21,6 +21,7 @@ class MSFT_SPOTenantSettings : OMI_BaseResource [Write, Description("Defines if the default themes are visible or hidden")] boolean HideDefaultThemes; [Write, Description("Allow or block external sharing until at least one Office DLP policy scans the content of the file."), ValueMap{"AllowExternalSharing","BlockExternalSharing"}, Values{"AllowExternalSharing","BlockExternalSharing"}] string MarkNewFilesSensitiveByDefault; [Write, Description("Allow or Block Conditional Access Policy on the SharePoint Tenant"), ValueMap{"AllowFullAccess", "AllowLimitedAccess", "BlockAccess"}, Values{"AllowFullAccess", "AllowLimitedAccess", "BlockAccess"}] string ConditionalAccessPolicy; + [Write, Description("Provide GUID for the Web Parts that are to be disabled on the Sharepoint Site)] string DisabledWebPartIds; [Write, Description("Only accepted value is 'Present'."), ValueMap{"Present","Absent"}, Values{"Present","Absent"}] String Ensure; [Write, Description("Credentials of the SharePoint Global Admin"), EmbeddedInstance("MSFT_Credential")] string GlobalAdminAccount; [Write, Description("Id of the Azure Active Directory application to authenticate with.")] String ApplicationId; From e78385bd08cb20a50fbb253085badf626f1d86a9 Mon Sep 17 00:00:00 2001 From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com> Date: Tue, 24 Aug 2021 15:25:46 +0000 Subject: [PATCH 13/16] Bump url-parse from 1.5.1 to 1.5.3 in /generator Bumps [url-parse](https://github.com/unshiftio/url-parse) from 1.5.1 to 1.5.3. - [Release notes](https://github.com/unshiftio/url-parse/releases) - [Commits](https://github.com/unshiftio/url-parse/compare/1.5.1...1.5.3) --- updated-dependencies: - dependency-name: url-parse dependency-type: indirect ... Signed-off-by: dependabot[bot] --- generator/package-lock.json | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/generator/package-lock.json b/generator/package-lock.json index 898872440f..edb0d70ba5 100644 --- a/generator/package-lock.json +++ b/generator/package-lock.json @@ -15336,9 +15336,9 @@ } }, "url-parse": { - "version": "1.5.1", - "resolved": "https://registry.npmjs.org/url-parse/-/url-parse-1.5.1.tgz", - "integrity": "sha512-HOfCOUJt7iSYzEx/UqgtwKRMC6EU91NFhsCHMv9oM03VJcVo2Qrp8T8kI9D7amFf1cu+/3CEhgb3rF9zL7k85Q==", + "version": "1.5.3", + "resolved": "https://registry.npmjs.org/url-parse/-/url-parse-1.5.3.tgz", + "integrity": "sha512-IIORyIQD9rvj0A4CLWsHkBBJuNqWpFQe224b6j9t/ABmquIS0qDU2pY6kl6AuOrL5OkCXHMCFNe1jBcuAggjvQ==", "requires": { "querystringify": "^2.1.1", "requires-port": "^1.0.0" From 47cb18be40b49cd05616ce0d190423fd017f3928 Mon Sep 17 00:00:00 2001 From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com> Date: Tue, 24 Aug 2021 15:25:52 +0000 Subject: [PATCH 14/16] Bump tar from 6.1.0 to 6.1.10 in /generator Bumps [tar](https://github.com/npm/node-tar) from 6.1.0 to 6.1.10. - [Release notes](https://github.com/npm/node-tar/releases) - [Changelog](https://github.com/npm/node-tar/blob/main/CHANGELOG.md) - [Commits](https://github.com/npm/node-tar/compare/v6.1.0...v6.1.10) --- updated-dependencies: - dependency-name: tar dependency-type: indirect ... Signed-off-by: dependabot[bot] --- generator/package-lock.json | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/generator/package-lock.json b/generator/package-lock.json index 898872440f..85beb91e27 100644 --- a/generator/package-lock.json +++ b/generator/package-lock.json @@ -14692,9 +14692,9 @@ "integrity": "sha512-4WK/bYZmj8xLr+HUCODHGF1ZFzsYffasLUgEiMBY4fgtltdO6B4WJtlSbPaDTLpYTcGVwM2qLnFTICEcNxs3kA==" }, "tar": { - "version": "6.1.0", - "resolved": "https://registry.npmjs.org/tar/-/tar-6.1.0.tgz", - "integrity": "sha512-DUCttfhsnLCjwoDoFcI+B2iJgYa93vBnDUATYEeRx6sntCTdN01VnqsIuTlALXla/LWooNg0yEGeB+Y8WdFxGA==", + "version": "6.1.10", + "resolved": "https://registry.npmjs.org/tar/-/tar-6.1.10.tgz", + "integrity": "sha512-kvvfiVvjGMxeUNB6MyYv5z7vhfFRwbwCXJAeL0/lnbrttBVqcMOnpHUf0X42LrPMR8mMpgapkJMchFH4FSHzNA==", "requires": { "chownr": "^2.0.0", "fs-minipass": "^2.0.0", From 3531c7afb393192443dd3ea821acaff7be0051f3 Mon Sep 17 00:00:00 2001 From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com> Date: Tue, 24 Aug 2021 15:26:08 +0000 Subject: [PATCH 15/16] Bump ws from 6.2.1 to 6.2.2 in /generator Bumps [ws](https://github.com/websockets/ws) from 6.2.1 to 6.2.2. - [Release notes](https://github.com/websockets/ws/releases) - [Commits](https://github.com/websockets/ws/compare/6.2.1...6.2.2) --- updated-dependencies: - dependency-name: ws dependency-type: indirect ... Signed-off-by: dependabot[bot] --- generator/package-lock.json | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/generator/package-lock.json b/generator/package-lock.json index 898872440f..aa66fdcbc0 100644 --- a/generator/package-lock.json +++ b/generator/package-lock.json @@ -16456,9 +16456,9 @@ } }, "ws": { - "version": "6.2.1", - "resolved": "https://registry.npmjs.org/ws/-/ws-6.2.1.tgz", - "integrity": "sha512-GIyAXC2cB7LjvpgMt9EKS2ldqr0MTrORaleiOno6TweZ6r3TKtoFQWay/2PceJ3RuBasOHzXNn5Lrw1X0bEjqA==", + "version": "6.2.2", + "resolved": "https://registry.npmjs.org/ws/-/ws-6.2.2.tgz", + "integrity": "sha512-zmhltoSR8u1cnDsD43TX59mzoMZsLKqUweyYBAIvTngR3shc0W6aOZylZmq/7hqyVxPdi+5Ud2QInblgyE72fw==", "requires": { "async-limiter": "~1.0.0" } @@ -16912,9 +16912,9 @@ } }, "ws": { - "version": "7.4.5", - "resolved": "https://registry.npmjs.org/ws/-/ws-7.4.5.tgz", - "integrity": "sha512-xzyu3hFvomRfXKH8vOFMU3OguG6oOvhXMo3xsGy3xWExqaM2dxBbVxuD99O7m3ZUFMvvscsZDqxfgMaRr/Nr1g==" + "version": "7.5.3", + "resolved": "https://registry.npmjs.org/ws/-/ws-7.5.3.tgz", + "integrity": "sha512-kQ/dHIzuLrS6Je9+uv81ueZomEwH0qVYstcAQ4/Z93K8zeko9gtAbttJWzoC5ukqXY1PpoouV3+VSOqEAFt5wg==" }, "xml-name-validator": { "version": "3.0.0", From 807b7b1d21c2647b77f03345b21316b6a7549e87 Mon Sep 17 00:00:00 2001 From: Nik Charlebois Date: Wed, 25 Aug 2021 09:47:58 -0400 Subject: [PATCH 16/16] Release 1.21.825.1 --- CHANGELOG.md | 2 ++ .../MSFT_SPOTenantSettings.schema.mof | 2 +- Modules/Microsoft365DSC/Microsoft365DSC.psd1 | 15 ++++++++------- 3 files changed, 11 insertions(+), 8 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index 334a00c779..e01ce0b100 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -2,6 +2,8 @@ # 1.21.825.1 +* SPOTenantSettings + * Added the DisabledWebpartIds & ConditionalAccessPolicy properties; * DEPENDENCIES; * Updated AzureADPreview to version 2.0.2.138; * Updated Microsoft.PowerApps.Administration.PowerShell to version 2.0.131; diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_SPOTenantSettings/MSFT_SPOTenantSettings.schema.mof b/Modules/Microsoft365DSC/DSCResources/MSFT_SPOTenantSettings/MSFT_SPOTenantSettings.schema.mof index ac6e459118..103bc0138f 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_SPOTenantSettings/MSFT_SPOTenantSettings.schema.mof +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_SPOTenantSettings/MSFT_SPOTenantSettings.schema.mof @@ -21,7 +21,7 @@ class MSFT_SPOTenantSettings : OMI_BaseResource [Write, Description("Defines if the default themes are visible or hidden")] boolean HideDefaultThemes; [Write, Description("Allow or block external sharing until at least one Office DLP policy scans the content of the file."), ValueMap{"AllowExternalSharing","BlockExternalSharing"}, Values{"AllowExternalSharing","BlockExternalSharing"}] string MarkNewFilesSensitiveByDefault; [Write, Description("Allow or Block Conditional Access Policy on the SharePoint Tenant"), ValueMap{"AllowFullAccess", "AllowLimitedAccess", "BlockAccess"}, Values{"AllowFullAccess", "AllowLimitedAccess", "BlockAccess"}] string ConditionalAccessPolicy; - [Write, Description("Provide GUID for the Web Parts that are to be disabled on the Sharepoint Site)] string DisabledWebPartIds; + [Write, Description("Provide GUID for the Web Parts that are to be disabled on the Sharepoint Site")] string DisabledWebPartIds; [Write, Description("Only accepted value is 'Present'."), ValueMap{"Present","Absent"}, Values{"Present","Absent"}] String Ensure; [Write, Description("Credentials of the SharePoint Global Admin"), EmbeddedInstance("MSFT_Credential")] string GlobalAdminAccount; [Write, Description("Id of the Azure Active Directory application to authenticate with.")] String ApplicationId; diff --git a/Modules/Microsoft365DSC/Microsoft365DSC.psd1 b/Modules/Microsoft365DSC/Microsoft365DSC.psd1 index 59d47c39c5..a2691bf703 100644 --- a/Modules/Microsoft365DSC/Microsoft365DSC.psd1 +++ b/Modules/Microsoft365DSC/Microsoft365DSC.psd1 @@ -3,7 +3,7 @@ # # Generated by: Microsoft Corporation # -# Generated on: 2021-08-04 +# Generated on: 2021-08-25 @{ @@ -11,7 +11,7 @@ # RootModule = '' # Version number of this module. - ModuleVersion = '1.21.804.1' + ModuleVersion = '1.21.825.1' # Supported PSEditions # CompatiblePSEditions = @() @@ -174,13 +174,14 @@ IconUri = 'https://github.com/microsoft/Microsoft365DSC/blob/Dev/Modules/Microsoft365DSC/Dependencies/Images/Logo.png?raw=true' # ReleaseNotes of this module - ReleaseNotes = "* SCDLPComplianceRule - * Fixed issue where SCDLPCompliance rule failed when using senstitivy labels; + ReleaseNotes = "* SPOTenantSettings + * Added the DisabledWebpartIds & ConditionalAccessPolicy properties; * DEPENDENCIES; - * Updated MSCloudLoginAssistant to version 1.0.62; + * Updated AzureADPreview to version 2.0.2.138; + * Updated Microsoft.PowerApps.Administration.PowerShell to version 2.0.131; + * Updated Microsoft.Teams to version 2.5.0; * MISC - * Added support for ApplicationSecret in SPO resources; - * Revamped the entire display from an Export;" + * Additional display alignment fixes for Export;" # Flag to indicate whether the module requires explicit user acceptance for install/update # RequireLicenseAcceptance = $false