Skip to content

Commit

Permalink
Merge branch 'Dev' into feat/intune-disk-encryption-pde
Browse files Browse the repository at this point in the history
  • Loading branch information
FabienTschanz authored Nov 19, 2024
2 parents 9cbc80c + 6d76c30 commit d687c31
Show file tree
Hide file tree
Showing 12 changed files with 1,033 additions and 45 deletions.
14 changes: 14 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,20 @@

# UNRELEASED

* AADConditionalAccessPolicy
* Fixed bug where a null value was passed in the request for the
excludePlatforms parameter when just values were assigned to includePlatforms, which throws an error.
* Fixed bug where a null value was passed in the request for the
sessionControl parameter when there are no session controls, which throws an error.
* Fixed bug where a null value was passed in the request for the
applicationEnforcedRestrictions parameter when value was set to false, which throws an error.
* AADRoleEligibilityScheduleRequest
* Adds support for custom role assignments at app scope.
* IntuneDeviceConfigurationPolicyAndroidDeviceOwner
* Fixed issue when properties `DetailedHelpText`,
`DeviceOwnerLockScreenMessage` or `ShortHelpText` were defined but the
request was not being sent correctly
FIXES [#5411](https://github.com/microsoft/Microsoft365DSC/issues/5411)
* IntuneDiskEncryptionPDEPolicyWindows10
* Initial release.
* IntuneFirewallRulesHyperVPolicyWindows10
Expand All @@ -23,6 +35,8 @@
* AADRoleEligibilityScheduleRequest
* FIXES [#3787](https://github.com/microsoft/Microsoft365DSC/issues/3787)
* FIXES [#5089](https://github.com/microsoft/Microsoft365DSC/issues/5089)
* AzureBillingAccountPolicy
* Initial release.
* EXOATPBuiltInProtectionRule, EXOEOPProtectionRule
* Fixed issue where empty arrays were being compared incorrectly to null
strings
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -1485,13 +1485,11 @@ function Set-TargetResource
if (-not $conditions.Contains('platforms'))
{
$conditions.Add('platforms', @{
excludePlatforms = @()
includePlatforms = @()
})
}
else
{
$conditions.platforms.Add('excludePlatforms', @())
$conditions.platforms.Add('includePlatforms', @())
}
Write-Verbose -Message "Set-Targetresource: IncludePlatforms: $IncludePlatforms"
Expand All @@ -1504,8 +1502,11 @@ function Set-TargetResource
$conditions.platforms.includePlatforms = @() + $IncludePlatforms
}
#no translation or conversion needed
Write-Verbose -Message "Set-Targetresource: ExcludePlatforms: $ExcludePlatforms"
$conditions.platforms.excludePlatforms = @() + $ExcludePlatforms
if (([Array]$ExcludePlatforms).Length -ne 0)
{
$conditions.platforms.Add('excludePlatforms', @())
$conditions.platforms.excludePlatforms = @() + $ExcludePlatforms
}
#no translation or conversion needed
}
else
Expand Down Expand Up @@ -1729,18 +1730,16 @@ function Set-TargetResource
$NewParameters.Add('grantControls', $GrantControls)
}

Write-Verbose -Message 'Set-Targetresource: process session controls'

$sessioncontrols = $null
if ($ApplicationEnforcedRestrictionsIsEnabled -or $CloudAppSecurityIsEnabled -or $SignInFrequencyIsEnabled -or $PersistentBrowserIsEnabled)
{
Write-Verbose -Message 'Set-Targetresource: process session controls'
$sessioncontrols = $null
Write-Verbose -Message 'Set-Targetresource: create provision Session Control object'
$sessioncontrols = @{
applicationEnforcedRestrictions = @{}
}
$sessioncontrols = @{}

if ($ApplicationEnforcedRestrictionsIsEnabled -eq $true)
{
$sessioncontrols.Add('applicationEnforcedRestrictions', @{})
#create and provision ApplicationEnforcedRestrictions object if used
$sessioncontrols.applicationEnforcedRestrictions.Add('IsEnabled', $true)
}
Expand Down Expand Up @@ -1798,9 +1797,9 @@ function Set-TargetResource
$sessioncontrols.persistentBrowser.isEnabled = $true
$sessioncontrols.persistentBrowser.mode = $PersistentBrowserMode
}
$NewParameters.Add('sessionControls', $sessioncontrols)
#add SessionControls to the parameter list
}
$NewParameters.Add('sessionControls', $sessioncontrols)
#add SessionControls to the parameter list
}

Write-Host "newparameters: $($NewParameters | ConvertTo-Json -Depth 5)"
Expand Down
Loading

0 comments on commit d687c31

Please sign in to comment.