From 07fdc66af46acb3d1c7caff368ea8f647ede4022 Mon Sep 17 00:00:00 2001 From: Andy Jordan <2226434+andyleejordan@users.noreply.github.com> Date: Fri, 24 Jan 2025 16:36:12 -0800 Subject: [PATCH 1/6] Blank commit to fix OneBranch through PR validation From 235ddeec3a9b0967d07f1e50e272efa71529e48d Mon Sep 17 00:00:00 2001 From: GitOps Date: Fri, 12 Sep 2025 18:02:22 +0000 Subject: [PATCH 2/6] Inventory drift --- es-metadata.yml | 8 ++++++++ 1 file changed, 8 insertions(+) create mode 100644 es-metadata.yml diff --git a/es-metadata.yml b/es-metadata.yml new file mode 100644 index 0000000..88c3f86 --- /dev/null +++ b/es-metadata.yml @@ -0,0 +1,8 @@ +schemaVersion: 0.0.1 +isProduction: true +accountableOwners: + service: cef1de07-99d6-45df-b907-77d0066032ec +routing: + defaultAreaPath: + org: msazure + path: One\MGMT\Compute\Powershell\Powershell From 672bac2ed7cb0b508c8674f2866e48d1f5c5dc4e Mon Sep 17 00:00:00 2001 From: Dependabot Date: Fri, 12 Dec 2025 22:03:10 +0000 Subject: [PATCH 3/6] [SECURITY] Bump dotnet-sdk from 8.0.300 to 8.0.318 Bumps [dotnet-sdk](https://github.com/dotnet/sdk) from 8.0.300 to 8.0.318. - [Release notes](https://github.com/dotnet/sdk/releases) - [Commits](https://github.com/dotnet/sdk/compare/v8.0.300...v8.0.318) --- global.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/global.json b/global.json index ee4995e..72f7879 100644 --- a/global.json +++ b/global.json @@ -1,6 +1,6 @@ { "sdk": { - "version": "8.0.300", + "version": "8.0.318", "rollForward": "latestFeature", "allowPrerelease": false } From f7ee988938b0df3dc9488e81187ad8a7dfaf6414 Mon Sep 17 00:00:00 2001 From: GitOps Date: Fri, 19 Dec 2025 08:38:40 +0000 Subject: [PATCH 4/6] Update EsMetadata schema versions to 1.0.0 --- es-metadata.yml | 20 ++++++++++++-------- 1 file changed, 12 insertions(+), 8 deletions(-) diff --git a/es-metadata.yml b/es-metadata.yml index 88c3f86..6d8d35a 100644 --- a/es-metadata.yml +++ b/es-metadata.yml @@ -1,8 +1,12 @@ -schemaVersion: 0.0.1 -isProduction: true -accountableOwners: - service: cef1de07-99d6-45df-b907-77d0066032ec -routing: - defaultAreaPath: - org: msazure - path: One\MGMT\Compute\Powershell\Powershell +schemaVersion: 1.0.0 +providers: +- provider: InventoryAsCode + version: 1.0.0 + metadata: + isProduction: true + accountableOwners: + service: cef1de07-99d6-45df-b907-77d0066032ec + routing: + defaultAreaPath: + org: msazure + path: One\MGMT\Compute\Powershell\Powershell From 4057afda299978335e289bac2246aedddaa14487 Mon Sep 17 00:00:00 2001 From: Justin Chung Date: Wed, 8 Apr 2026 14:07:22 -0500 Subject: [PATCH 5/6] Add suppression --- test/Microsoft.PowerShell.SecretStore.Tests.ps1 | 3 +++ 1 file changed, 3 insertions(+) diff --git a/test/Microsoft.PowerShell.SecretStore.Tests.ps1 b/test/Microsoft.PowerShell.SecretStore.Tests.ps1 index 6d1e964..fba147a 100644 --- a/test/Microsoft.PowerShell.SecretStore.Tests.ps1 +++ b/test/Microsoft.PowerShell.SecretStore.Tests.ps1 @@ -1,6 +1,9 @@ # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License. +[Diagnostics.CodeAnalysis.SuppressMessageAttribute('PSAvoidUsingConvertToSecureStringWithPlainText', '', Justification = 'Tests create SecureStrings from known test data')] +param() + Describe "Test Microsoft.PowerShell.SecretStore module" { BeforeAll { Import-Module -Force -Name Microsoft.PowerShell.SecretManagement From ab91071983560fc3957a70ed8397364dddb37e4a Mon Sep 17 00:00:00 2001 From: Justin Chung Date: Wed, 8 Apr 2026 15:09:31 -0500 Subject: [PATCH 6/6] Fix PSAvoidUsingConvertToSecureStringWithPlainText in tests --- test/Microsoft.PowerShell.SecretStore.Tests.ps1 | 13 +++++-------- 1 file changed, 5 insertions(+), 8 deletions(-) diff --git a/test/Microsoft.PowerShell.SecretStore.Tests.ps1 b/test/Microsoft.PowerShell.SecretStore.Tests.ps1 index fba147a..1694a79 100644 --- a/test/Microsoft.PowerShell.SecretStore.Tests.ps1 +++ b/test/Microsoft.PowerShell.SecretStore.Tests.ps1 @@ -1,9 +1,6 @@ # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License. -[Diagnostics.CodeAnalysis.SuppressMessageAttribute('PSAvoidUsingConvertToSecureStringWithPlainText', '', Justification = 'Tests create SecureStrings from known test data')] -param() - Describe "Test Microsoft.PowerShell.SecretStore module" { BeforeAll { Import-Module -Force -Name Microsoft.PowerShell.SecretManagement @@ -126,7 +123,7 @@ Describe "Test Microsoft.PowerShell.SecretStore module" { } It "Verifies Unlock-SecretStore throws expected error when in no password mode" { - $token = ConvertTo-SecureString -String "None" -AsPlainText -Force + $token = [System.Net.NetworkCredential]::new('', 'None').SecurePassword { Unlock-SecretStore -Password $token } | Should -Throw -ErrorId 'InvalidOperation,Microsoft.PowerShell.SecretStore.UnlockSecretStoreCommand' } } @@ -332,7 +329,7 @@ Describe "Test Microsoft.PowerShell.SecretStore module" { BeforeAll { $secretName = [System.IO.Path]::GetFileNameWithoutExtension([System.IO.Path]::GetRandomFileName()) $randomSecret = [System.IO.Path]::GetRandomFileName() - $secureStringToWrite = ConvertTo-SecureString -String $randomSecret -AsPlainText -Force + $secureStringToWrite = [System.Net.NetworkCredential]::new('', $randomSecret).SecurePassword $errorMsg = "" } @@ -398,7 +395,7 @@ Describe "Test Microsoft.PowerShell.SecretStore module" { } It "Verifies PSCredential type write to SecretStore" { - $cred = [pscredential]::new('UserL', (ConvertTo-SecureString $randomSecret -AsPlainText -Force)) + $cred = [pscredential]::new('UserL', ([System.Net.NetworkCredential]::new('', $randomSecret).SecurePassword)) $success = [Microsoft.PowerShell.SecretStore.LocalSecretStore]::GetInstance().WriteObject( $secretName, $cred, @@ -465,8 +462,8 @@ Describe "Test Microsoft.PowerShell.SecretStore module" { $ht = @{ Blob = ([byte[]] @(1,2)) Str = "TestHashtableString" - SecureString = (ConvertTo-SecureString $randomSecretA -AsPlainText -Force) - Cred = ([pscredential]::New("UserA", (ConvertTo-SecureString $randomSecretB -AsPlainText -Force))) + SecureString = ([System.Net.NetworkCredential]::new('', $randomSecretA).SecurePassword) + Cred = ([pscredential]::New("UserA", ([System.Net.NetworkCredential]::new('', $randomSecretB).SecurePassword))) } $success = [Microsoft.PowerShell.SecretStore.LocalSecretStore]::GetInstance().WriteObject(