Actions: Azure/azure-cli
Actions
Showing runs from all workflows
2,500+ workflow runs
2,500+ workflow runs
az identity create/update: Add new --resource-restriction parameter to support identity assignment restrictions
GH Check CLI Style
#6740:
Pull request #32214
synchronize
by
mohamedyilmaz123
az identity create/update: Add new --resource-restriction parameter to support identity assignment restrictions
GH Check CLI Linter
#6738:
Pull request #32214
synchronize
by
mohamedyilmaz123
--expires flag on az keyvault secret set silently passes invalid dates to the service, but the existing datetime_type validator in keyvault/_validators.py should already catch this case. (#33233)
GH Check CLI Style
#6739:
Pull request #33235
labeled
by
microsoft-github-policy-service
bot
--expires flag on az keyvault secret set silently passes invalid dates to the service, but the existing datetime_type validator in keyvault/_validators.py should already catch this case. (#33233)
Block PR merging on blocked labels
#4794:
Pull request #33235
labeled
by
microsoft-github-policy-service
bot
--expires flag on az keyvault secret set silently passes invalid dates to the service, but the existing datetime_type validator in keyvault/_validators.py should already catch this case. (#33233)
GH Check CLI Linter
#6737:
Pull request #33235
labeled
by
microsoft-github-policy-service
bot
--expires flag on az keyvault secret set silently passes invalid dates to the service, but the existing datetime_type validator in keyvault/_validators.py should already catch this case. (#33233)
GH Check CLI Style
#6738:
Pull request #33235
labeled
by
microsoft-github-policy-service
bot
--expires flag on az keyvault secret set silently passes invalid dates to the service, but the existing datetime_type validator in keyvault/_validators.py should already catch this case. (#33233)
GH Check CLI Linter
#6736:
Pull request #33235
labeled
by
microsoft-github-policy-service
bot
--expires flag on az keyvault secret set silently passes invalid dates to the service, but the existing datetime_type validator in keyvault/_validators.py should already catch this case. (#33233)
Block PR merging on blocked labels
#4793:
Pull request #33235
labeled
by
microsoft-github-policy-service
bot
--expires flag on az keyvault secret set silently passes invalid dates to the service, but the existing datetime_type validator in keyvault/_validators.py should already catch this case. (#33233)
GH Check CLI Linter
#6735:
Pull request #33235
labeled
by
microsoft-github-policy-service
bot
--expires flag on az keyvault secret set silently passes invalid dates to the service, but the existing datetime_type validator in keyvault/_validators.py should already catch this case. (#33233)
Block PR merging on blocked labels
#4792:
Pull request #33235
labeled
by
microsoft-github-policy-service
bot
--expires flag on az keyvault secret set silently passes invalid dates to the service, but the existing datetime_type validator in keyvault/_validators.py should already catch this case. (#33233)
GH Check CLI Style
#6737:
Pull request #33235
labeled
by
microsoft-github-policy-service
bot
--expires flag on az keyvault secret set silently passes invalid dates to the service, but the existing datetime_type validator in keyvault/_validators.py should already catch this case. (#33233)
.github/workflows/AddPRComment.yml
#3530:
Pull request #33235
opened
by
notyashhh
--expires flag on az keyvault secret set silently passes invalid dates to the service, but the existing datetime_type validator in keyvault/_validators.py should already catch this case. (#33233)
GH Check CLI Style
#6736:
Pull request #33235
opened
by
notyashhh
--expires flag on az keyvault secret set silently passes invalid dates to the service, but the existing datetime_type validator in keyvault/_validators.py should already catch this case. (#33233)
GH Check CLI Linter
#6734:
Pull request #33235
opened
by
notyashhh