Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[DRAFT]Guli/dev/dns resolvers #18719

Merged

Conversation

guandali
Copy link

All SDK Contribution checklist:

This checklist is used to make sure that common guidelines for a pull request are followed.

  • Please open PR in Draft mode if it is:
    • Work in progress or not intended to be merged.
    • Encountering multiple pipeline failures and working on fixes.
  • If an SDK is being regenerated based on a new swagger spec, a link to the pull request containing these swagger spec changes has been included above.
  • I have read the contribution guidelines.
  • The pull request does not introduce breaking changes.

General Guidelines and Best Practices

  • Title of the pull request is clear and informative.
  • There are a small number of commits, each of which have an informative message. This means that previously merged commits do not appear in the history of the PR. For more information on cleaning up the commits in your PR, see this page.

Testing Guidelines

  • Pull request includes test coverage for the included changes.

SDK Generation Guidelines

  • The generate.cmd file for the SDK has been updated with the version of AutoRest, as well as the commitid of your swagger spec or link to the swagger spec, used to generate the code. (Track 2 only)
  • The *.csproj and AssemblyInfo.cs files have been updated with the new version of the SDK. Please double check nuget.org current release version.

Additional management plane SDK specific contribution checklist:

Note: Only applies to Microsoft.Azure.Management.[RP] or Azure.ResourceManager.[RP]

  • Include updated management metadata.
  • Update AzureRP.props to add/remove version info to maintain up to date API versions.

Management plane SDK Troubleshooting

  • If this is very first SDK for a services and you are adding new service folders directly under /SDK, please add new service label and/or contact assigned reviewer.
  • If the check fails at the Verify Code Generation step, please ensure:
    • Do not modify any code in generated folders.
    • Do not selectively include/remove generated files in the PR.
    • Do use generate.ps1/cmd to generate this PR instead of calling autorest directly.
      Please pay attention to the @microsoft.csharp version output after running generate.ps1. If it is lower than current released version (2.3.82), please run it again as it should pull down the latest version,

Old outstanding PR cleanup

Please note:
If PRs (including draft) has been out for more than 60 days and there are no responses from our query or followups, they will be closed to maintain a concise list for our reviewers.

jsquire and others added 30 commits January 29, 2021 10:04
The focus of these changes is to virtualize read-only properties that
cannot be set as part of the constructor to enable mocking them during
testing.
* EG API updates

* webjob tests

* Use optional serializer param in GetData<T> methods; revert culture in SAS
Co-authored-by: Victor XField <vxfield@outlook.com>
Azure#18227)

* Implement create, update, get, and delete for Role Definitions
Changed the type for `IEnumerable` to `IList` as this is a property in an input-only object. 
Followed what other libraries like Search and KV do.
* Updates for GA version -
<AzureApiTag>Capacity_2020-10-01-preview;Capacity_2020-10-25;</AzureApiTag>

* Updating release notes.

* Updating version to -Preview - 1.15.0-preview

* Updated Package release notes.

* Removing -Preview from changelog.md to fix CI build error.

* Adding -Preview to Package version.

* Updating recorded Tests.

* Updating Tests.

* Uprating the version to - <Version>1.15.0-preview</Version> in csproj file.

* Updating Tests.

* Updating commit ID.

* Removing model files not nrequired.
To ensure we always include the global variables in all
our pipeline jobs and stages we should import the variables
at the highest pipeline level to ensure we don't miss setting
these variables in any jobs.
* Enforce API approval status for GA and include SDK type in package properties

* Fix per review comment

* Fixes as per review comments to avoid changing constructor signature

* Fixes as per review comments to handle track 1 packages

* Fix yaml format error

Co-authored-by: praveenkuttappan <prmarott@microsoft.com>
In this PR:
- Ability to provide a handler to capture queue messages that are in invalid format.

Bonus:
- Ability to get parent queue service (like we did in Azure#16437 )

Pending dependency: Azure#18170
* language and locale as extensible enums
…8281)

* upgrading msal dependency

* update changelog

* updating test recordings
The sample tests weren't intended to be run in the CI, but were instead useful to demonstrate how you might perform the different methods of authentication. That's actually done in the README now, so i'm just going to remove it since I can't make the build happy with keeping them around.
Increment package version after release of Azure.Identity
The focus of these changes is to fix a typo in label application for the
Digital Twins service.  The ownership of Service Bus has also been tweaked
to reflect a change in areas of responsibility.
Co-authored-by: Shivangi Reja <shreja@microsoft.com>
Azure#18290)

* Update the readme with more information about thread safety and other concepts.

* Update sdk/keyvault/Azure.Security.KeyVault.Administration/README.md

Co-authored-by: Mariana Rios Flores <mariari@microsoft.com>

* Update sdk/keyvault/Azure.Security.KeyVault.Administration/README.md

Co-authored-by: Heath Stewart <heaths@outlook.com>

* Address PR feedback.

Co-authored-by: Mariana Rios Flores <mariari@microsoft.com>
Co-authored-by: Heath Stewart <heaths@outlook.com>
@check-enforcer
Copy link

This pull request is protected by Check Enforcer.

What is Check Enforcer?

Check Enforcer helps ensure all pull requests are covered by at least one check-run (typically an Azure Pipeline). When all check-runs associated with this pull request pass then Check Enforcer itself will pass.

Why am I getting this message?

You are getting this message because Check Enforcer did not detect any check-runs being associated with this pull request within five minutes. This may indicate that your pull request is not covered by any pipelines and so Check Enforcer is correctly blocking the pull request being merged.

What should I do now?

If the check-enforcer check-run is not passing and all other check-runs associated with this PR are passing (excluding license-cla) then you could try telling Check Enforcer to evaluate your pull request again. You can do this by adding a comment to this pull request as follows:
/check-enforcer evaluate
Typically evaulation only takes a few seconds. If you know that your pull request is not covered by a pipeline and this is expected you can override Check Enforcer using the following command:
/check-enforcer override
Note that using the override command triggers alerts so that follow-up investigations can occur (PRs still need to be approved as normal).

What if I am onboarding a new service?

Often, new services do not have validation pipelines associated with them. In order to bootstrap pipelines for a new service, please perform following steps:

For data-plane/track 2 SDKs Issue the following command as a pull request comment:

/azp run prepare-pipelines
This will run a pipeline that analyzes the source tree and creates the pipelines necessary to build and validate your pull request. Once the pipeline has been created you can trigger the pipeline using the following comment:
/azp run net - [service] - ci

For track 1 management-plane SDKs

Please open a separate PR and to your service SDK path in this file. Once that PR has been merged, you can re-run the pipeline to trigger the verification.

@markcowl markcowl merged commit 87cc454 into Azure:Microsoft.Network-dnsResolvers Feb 12, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.