Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update 7/27 #7

Merged
merged 71 commits into from
Jul 27, 2021
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
71 commits
Select commit Hold shift + click to select a range
c8d75cf
[AutoRelease] t2-loganalytics-2021-07-12-55352 (#19751)
Jul 12, 2021
aef5b6e
test (#19752)
msyyc Jul 12, 2021
d794aee
Exclude Latest Version of azure-communication-phonenumbers from regre…
scbedd Jul 12, 2021
e75c11b
Increment package version after release of azure-monitor-query (#19673)
azure-sdk Jul 12, 2021
97d6913
[AutoRelease] t2-recoveryservices-2021-07-12-56754 (#19750)
Jul 13, 2021
e87f0ad
service add (#19766)
RAY-316 Jul 13, 2021
f753668
Update livetest_folder_link.py (#19767)
msyyc Jul 13, 2021
805ab35
[AutoRelease] t2-resource-2021-07-13-77207 (#19764)
Jul 13, 2021
ef6e7dc
[AutoRelease] t2-guestconfig-2021-07-13-19526 (#19769)
Jul 13, 2021
f609786
[AutoRelease] t2-avs-2021-07-13-67747 (#19770)
Jul 13, 2021
2c1299b
Core request id not override (#19759)
xiangyan99 Jul 13, 2021
52ae26d
Update broken link (#19776)
xiangyan99 Jul 13, 2021
d1d8e9f
[Key Vault] Add azure-keyvault-administration samples (#19736)
mccoyp Jul 13, 2021
004c25b
Update README.md (#19782)
laujan Jul 13, 2021
4480744
Aggregations must be plural + inclue types (#19762)
Jul 13, 2021
08e0f4d
Add sender_display_name in SendTypingNotification Operation (#19760)
LuChen-Microsoft Jul 13, 2021
b844d2c
Sync eng/common directory with azure-sdk-tools for PR 1808 (#19784)
azure-sdk Jul 13, 2021
8259d59
ci config (#19772)
RAY-316 Jul 14, 2021
398c149
Update swagger_to_sdk_config_autorest.json (#19791)
msyyc Jul 14, 2021
2f8f507
improve streaming tests (#19743)
xiangyan99 Jul 14, 2021
1b4b481
Use `pip==20.3`, Remove pinned min-dependency override on `cryptograp…
scbedd Jul 14, 2021
c6ab402
switch to autorestv3 branch (#19758)
iscai-msft Jul 14, 2021
f65d26f
[translation] perf test (#19317)
kristapratico Jul 14, 2021
2c04f44
Sync eng/common directory with azure-sdk-tools for PR 1748 (#19567)
azure-sdk Jul 14, 2021
e7568fd
Search v3 skills (#19804)
xiangyan99 Jul 14, 2021
8f33748
skip failing detect language tests due to service bug (#19806)
kristapratico Jul 14, 2021
053e685
data-plan skip changelog generation (#19815)
msyyc Jul 15, 2021
58f4008
[AutoRelease] t2-sql-2021-07-15-33216 (#19819)
Jul 15, 2021
c23fa2b
Hivyas/fixconnectionstring (#19761)
hivyas Jul 15, 2021
9f94045
Fix a couple broken links (#19830)
scbedd Jul 15, 2021
42f9ba1
CodeGen from PR 15225 in Azure/azure-rest-api-specs (#19847)
msyyc Jul 16, 2021
27ca362
skip detect language tests (#19841)
kristapratico Jul 16, 2021
a269888
set environment variable to nightly-edge build to force pure python v…
scbedd Jul 16, 2021
ec74e12
[Perfstress] Update test proxy URL in docs (#19807)
annatisch Jul 16, 2021
9033064
Resolve Remaining Issues w/ upgrade to pip==20.3 (#19837)
scbedd Jul 16, 2021
c5aae37
remove pip installing of autorest.python (#19823)
iscai-msft Jul 19, 2021
1e131b8
Azure Communication Services Network Traversal - GetRelayConfiguratio…
AriZavala2 Jul 19, 2021
95787ba
Add AAD support for EG (#19421)
Jul 19, 2021
cb05bec
Update CHANGELOG.md (#19866)
Jul 19, 2021
e6a8934
Resolve Bad Storage Sync Update (#19865)
scbedd Jul 19, 2021
c66aa8b
Update CHANGELOG.md (#19870)
Jul 19, 2021
1cbcc75
[EventHubs] improve code coverage (#19553)
swathipil Jul 19, 2021
85ce0e9
[qna] regen (#19827)
iscai-msft Jul 20, 2021
f08609c
[AutoRelease] t2-resource-2021-07-19-61255 (#19863)
Jul 20, 2021
d6e2056
[AutoRelease] t2-rdbms-2021-07-19-21374 (#19861)
Jul 20, 2021
dfe260b
[AutoRelease] t2-containerinstance-2021-07-20-75648 (#19874)
Jul 20, 2021
a65e853
Reduce redundant logging during ChainedTokenCredential.get_token() (#…
chlowell Jul 20, 2021
f496498
[EventHubs] add contains to DictMixin (#19886)
swathipil Jul 20, 2021
a54df6f
resolve 409 failures by enabling dev versioning for mgmt/nspkg, but _…
scbedd Jul 20, 2021
1614c53
Test Samples shouldn't run if we have a failure earlier in the build …
scbedd Jul 20, 2021
64128ba
[AutoRelease] t2-redis-2021-07-16-74903 (#19843)
Jul 21, 2021
03f1449
[Eventhub] TableCheckpointstore base branch (#19726)
Jg1255 Jul 21, 2021
865065c
[QnA] Added method overloads (#19876)
annatisch Jul 21, 2021
dde54e1
[translation] filters renames/alignment (#19826)
kristapratico Jul 21, 2021
eb12059
[AutoRelease] t2-containerregistry-2021-07-22-22325 (#19908)
Jul 22, 2021
ada8c67
[AutoRelease] t2-recoveryservicesbackup-2021-07-22-01117 (#19910)
Jul 22, 2021
78e928e
[AutoRelease] t2-compute-2021-07-22-89014 (#19911)
Jul 22, 2021
28837f5
[Key Vault] Fix broken links (#19907)
mccoyp Jul 22, 2021
2e60b97
fix doc for highlight_fields (#19916)
xiangyan99 Jul 22, 2021
8d60603
Sync eng/common directory with azure-sdk-tools for PR 1827 (#19920)
azure-sdk Jul 22, 2021
e41751e
[translation] support translation kwargs for single translation overl…
kristapratico Jul 22, 2021
360a418
[scripts] Update python - autorest - pr with new autorest test folder…
iscai-msft Jul 23, 2021
77918e8
deprecate loop parameter (#19927)
xiangyan99 Jul 23, 2021
f0f09cf
aiohttp should not depend on requests (#19808)
xiangyan99 Jul 23, 2021
ee646d7
fix flaky id in polling (#19921)
kristapratico Jul 23, 2021
8912ff8
Update and improve README (#19903)
Jul 23, 2021
663d3e9
Add instructions for locating the resource ID (#19929)
scottaddie Jul 23, 2021
46bda75
[AutoRelease] t2-recoveryservicesbackup-2021-07-26-35043 (#19934)
Jul 26, 2021
54d0b9a
[translation] add tests for glossaries (#19931)
kristapratico Jul 26, 2021
a8fd00b
Remove responses and return a list (#19872)
Jul 26, 2021
bbf08d3
[AutoRelease] t2-edgeorder-2021-07-27-26245 (#19948)
Jul 27, 2021
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
6 changes: 3 additions & 3 deletions doc/dev/perfstress_tests.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
1. [The perfstress framework](#the-perfstress-framework)
- [The PerfStressTest base](#the-perfstresstest-base)
- [Default command options](#default-command-options)
- [Running with test proxy](#running-with-test-proxy)
- [Running with test proxy](#running-with-the-test-proxy)
2. [Adding performance tests to an SDK](#adding-performance-tests-to-an-sdk)
- [Writing a test](#writing-a-test)
- [Adding legacy T1 tests](#adding-legacy-t1-tests)
Expand Down Expand Up @@ -88,7 +88,7 @@ The framework has a series of common command line options built in:

## Running with the test proxy
Follow the instructions here to install and run the test proxy server:
https://github.com/Azure/azure-sdk-tools/tree/feature/http-recording-server/tools/test-proxy/Azure.Sdk.Tools.TestProxy
https://github.com/Azure/azure-sdk-tools/tree/main/tools/test-proxy/Azure.Sdk.Tools.TestProxy

Once running, in a separate process run the perf test in question, combined with the `-x` flag to specify the proxy endpoint.
```cmd
Expand Down Expand Up @@ -375,4 +375,4 @@ Using the `perfstress` command alone will list the available perf tests found. N
Please add a `README.md` to the perfstress_tests directory so that others know how to setup and run the perf tests, along with a description of the available tests and any support command line options. README files in a `tests/perfstress_tests` directory should already be filtered from CI validation for SDK readmes.
Some examples can be found here:
- [Azure Storage Blob](https://github.com/Azure/azure-sdk-for-python/blob/main/sdk/storage/azure-storage-blob/tests/perfstress_tests/README.md)
- [Azure Service Bus](https://github.com/Azure/azure-sdk-for-python/blob/main/sdk/servicebus/azure-servicebus/tests/perf_tests/README.md)
- [Azure Service Bus](https://github.com/Azure/azure-sdk-for-python/blob/main/sdk/servicebus/azure-servicebus/tests/perf_tests/README.md)
2 changes: 1 addition & 1 deletion eng/ci_tools.txt
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ coverage==4.5.4
codecov==2.1.0
beautifulsoup4==4.9.1
pkginfo==1.5.0.1
pip==20.2
pip==20.3
black==21.6b0; python_version >= '3.6'

# locking packages defined as deps from azure-sdk-tools or azure-devtools
Expand Down
7 changes: 1 addition & 6 deletions eng/common/pipelines/templates/steps/bypass-local-dns.yml
Original file line number Diff line number Diff line change
Expand Up @@ -6,11 +6,6 @@ steps:
condition: |
and(
succeededOrFailed(),
or(
eq(variables['OSVmImage'], 'ubuntu-18.04'),
eq(variables['OSVmImage'], 'ubuntu-20.04'),
eq(variables['OSVmImage'], 'MMSUbuntu18.04'),
eq(variables['OSVmImage'], 'MMSUbuntu20.04')
),
contains(variables['OSVmImage'], 'ubuntu'),
eq(variables['Container'], '')
)
103 changes: 103 additions & 0 deletions eng/common/scripts/FilterPoliCheckResults.ps1
Original file line number Diff line number Diff line change
@@ -0,0 +1,103 @@
<#
.SYNOPSIS
Filters PoliCheck Result.
.DESCRIPTION
This script will read data speciefied in one or more PoliCheckAllowList.yml files,
It then reamoves all allwed entries from the PoliCheckResult
.PARAMETER PoliCheckResultFilePath
The Path to the PoliCheck Result. Usually named PoliCheck.sarif
.PARAMETER ServiceDirtectory
If the PoliCheck scan is scoped to a particular service provide the ServiceDirectory
.EXAMPLE
PS> ./FilterPoliCheckResults.ps1 -PoliCheckResultFilePath .\PoliCheck.sarif
#>
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String] $PoliCheckResultFilePath,
[String] $ServiceDirtectory
)

. "${PSScriptRoot}\logging.ps1"

$RepoRoot = Resolve-Path -Path "${PSScriptRoot}\..\..\..\"
$PathToAllowListFiles = Join-Path $RepoRoot $ServiceDirtectory
$PolicCheckAllowListFiles = Get-ChildItem -Path $PathToAllowListFiles -Recurse -File -Include "PoliCheckAllowList.yml"
$allowListData = @{}

# Combine all AllowLists Found
foreach ($file in $PolicCheckAllowListFiles)
{
$allowListDataInFile = ConvertFrom-Yaml (Get-Content $file.FullName -Raw)
$allowListData["PC1001"] += $allowListDataInFile["PC1001"]
$allowListData["PC1002"] += $allowListDataInFile["PC1002"]
$allowListData["PC1003"] += $allowListDataInFile["PC1003"]
$allowListData["PC1004"] += $allowListDataInFile["PC1004"]
$allowListData["PC1005"] += $allowListDataInFile["PC1005"]
$allowListData["PC1006"] += $allowListDataInFile["PC1006"]
}

$poliCheckData = Get-Content $PoliCheckResultFilePath | ConvertFrom-Json
$poliCheckResultsCount = $poliCheckData.runs[0].results.Count
$newCount

$updatedRuns = @()

foreach ($run in $poliCheckData.runs)
{
$updatedResults = @()
foreach ($result in $run.results)
{
$ruleId = $result.ruleId
$allowedEntries = $allowListData[$ruleId]
if ($allowedEntries)
{
$updatedLocations = @()

foreach ($location in $result.locations)
{
$filePath = $location.physicalLocation.artifactLocation.uri
$text = $location.physicalLocation.region.snippet.text
$contextRegion = $location.physicalLocation.contextRegion.snippet.text

$allowedEntry = $allowedEntries[0] | Where-Object { $_.FilePath -eq $filePath }

if ($allowedEntry.Count -gt 0)
{
$foundAllowedInstance = $false
foreach ($instance in $allowedEntry.instances)
{
if (($instance.Text.Trim() -eq $text.Trim()) -and ($instance.ContextRegion.Trim() -eq $contextRegion.Trim()))
{
Write-Host "Found instance" -ForegroundColor Green
$foundAllowedInstance = $true
}
}
if ($foundAllowedInstance -eq $true)
{
continue
}
}

$updatedLocations += $location
}

$result.locations = $updatedLocations
}

if ($result.locations.Count -gt 0)
{
$updatedResults += $result
}
}
$run.results = $updatedResults
$newCount = $run.results.Count
$updatedRuns += $run
}

$poliCheckData.runs = $updatedRuns

Set-Content -Path $PoliCheckResultFilePath -Value ($poliCheckData | ConvertTo-Json -Depth 100)

LogDebug "Original Result Count: ${poliCheckResultsCount}"
LogDebug "New Result Count: ${newCount}"
2 changes: 1 addition & 1 deletion eng/common/scripts/Update-DocsMsMetadata.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -84,7 +84,7 @@ keywords: Azure, $Language, SDK, API, $($PackageInfo.Name), $service
author: maggiepint
ms.author: magpint
ms.date: $date
ms.topic: article
ms.topic: reference
ms.prod: azure
ms.technology: azure
ms.devlang: $Language
Expand Down
2 changes: 1 addition & 1 deletion eng/common/scripts/update-docs-metadata.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -71,7 +71,7 @@ function GetAdjustedReadmeContent($pkgInfo){
$ReplacementPattern = "`${1}$($pkgInfo.Tag)"
$fileContent = $fileContent -replace $releaseReplaceRegex, $ReplacementPattern

$header = "---`ntitle: $foundTitle`nkeywords: Azure, $Language, SDK, API, $($pkgInfo.PackageId), $service`nauthor: maggiepint`nms.author: magpint`nms.date: $date`nms.topic: article`nms.prod: azure`nms.technology: azure`nms.devlang: $Language`nms.service: $service`n---`n"
$header = "---`ntitle: $foundTitle`nkeywords: Azure, $Language, SDK, API, $($pkgInfo.PackageId), $service`nauthor: maggiepint`nms.author: magpint`nms.date: $date`nms.topic: reference`nms.prod: azure`nms.technology: azure`nms.devlang: $Language`nms.service: $service`n---`n"

if ($fileContent) {
return "$header`n$fileContent"
Expand Down
13 changes: 6 additions & 7 deletions eng/pipelines/autorest_checks.yml
Original file line number Diff line number Diff line change
Expand Up @@ -40,25 +40,24 @@ jobs:
versionSpec: $(PythonVersion)

- script: |
pip install -r eng/autorest_req.txt
git clone $(auto_rest_clone_url)
cd autorest.python
git checkout $(repo_branch)
npm install
displayName: 'Prepare Environment'

- script: |
cd $(Build.SourcesDirectory)/autorest.python/test/vanilla
cd $(Build.SourcesDirectory)/autorest.python/test/vanilla/legacy
pip install $(Build.SourcesDirectory)/$(source_path_azure_core)
pip install -r requirements.txt
pip freeze
pytest $(Build.SourcesDirectory)/autorest.python/test/vanilla
displayName: 'Install azure-core and Test Vanilla'
pytest $(Build.SourcesDirectory)/autorest.python/test/vanilla/legacy
displayName: 'Install azure-core and Test Vanilla Legacy'

- script: |
cd $(Build.SourcesDirectory)/autorest.python/test/azure
cd $(Build.SourcesDirectory)/autorest.python/test/azure/legacy
pip install $(Build.SourcesDirectory)/$(source_path_azure_mgmt_core)
pip install -r requirements.txt
pip freeze
pytest $(Build.SourcesDirectory)/autorest.python/test/azure
displayName: 'Install azure-mgmt-core and Test Azure'
pytest $(Build.SourcesDirectory)/autorest.python/test/azure/legacy
displayName: 'Install azure-mgmt-core and Test Azure Legacy'
4 changes: 3 additions & 1 deletion eng/pipelines/templates/jobs/tests-nightly-python.yml
Original file line number Diff line number Diff line change
Expand Up @@ -38,8 +38,10 @@ jobs:
python3 -m pip install tox tox-monorepo packaging twine codecov beautifulsoup4
python3 --version
cd $(Build.SourcesDirectory)
python3 ./scripts/devops_tasks/setup_execute_tests.py "$(BuildTargetingString)" --junitxml="junit/test_results_38.xml" --toxenv="whl,sdist"
python3 ./scripts/devops_tasks/setup_execute_tests.py "$(BuildTargetingString)" --junitxml="junit/test_results_38.xml" --toxenv="whl"
displayName: 'Setup - Run Filtered Tests "Nightly" using Python Edge'
env:
YARL_NO_EXTENSIONS: 1
continueOnError: true

- task: PublishTestResults@2
Expand Down
2 changes: 1 addition & 1 deletion eng/pipelines/templates/steps/build-test.yml
Original file line number Diff line number Diff line change
Expand Up @@ -90,7 +90,7 @@ steps:

- task: PythonScript@0
displayName: 'Test Samples'
condition: eq(variables['TestSamples'], 'true')
condition: and(succeeded(), eq(variables['TestSamples'], 'true'))
inputs:
scriptPath: 'scripts/devops_tasks/setup_execute_tests.py'
arguments: >-
Expand Down
17 changes: 0 additions & 17 deletions eng/pipelines/templates/steps/verify-autorest.yml
Original file line number Diff line number Diff line change
Expand Up @@ -32,23 +32,6 @@ steps:
autorest --help
displayName: "Install autorest"

- template: /eng/common/pipelines/templates/steps/sparse-checkout.yml
parameters:
Paths:
- "/*"
Repositories:
- Name: "Azure/autorest.python"
Commitish: "master"
WorkingDirectory: "$(Build.SourcesDirectory)/autorest.python"
SkipDefaultCheckout: true

- script: |
python --version
pip install -r eng/autorest_req.txt
cd autorest.python
npm install
displayName: 'Prepare Environment'

- task: PythonScript@0
displayName: 'Verify autorest'
inputs:
Expand Down
2 changes: 1 addition & 1 deletion eng/test_tools.txt
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
pip==20.2
pip==20.3

# requirements leveraged by ci for testing
pytest==4.6.9; python_version == '2.7'
Expand Down
6 changes: 4 additions & 2 deletions eng/tox/install_depend_packages.py
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,7 @@
import logging
from packaging.specifiers import SpecifierSet
from pkg_resources import Requirement, parse_version

from pypi_tools.pypi import PyPIClient

setup_parser_path = os.path.abspath(
Expand All @@ -30,11 +31,12 @@
MINIMUM_VERSION_SUPPORTED_OVERRIDE = {
'azure-common': '1.1.10',
'msrest': '0.6.10',
'six': '1.9',
'typing-extensions': '3.6.5',
'opentelemetry-api': '1.3.0',
'cryptography': '3.3',
'opentelemetry-sdk': '1.3.0',
'azure-core': '1.11.0',
'requests': '2.19.0',
'six': '1.12.0'
}

def install_dependent_packages(setup_py_file_path, dependency_type, temp_dir):
Expand Down
2 changes: 1 addition & 1 deletion eng/tox/sanitize_setup.py
Original file line number Diff line number Diff line change
Expand Up @@ -96,7 +96,7 @@ def process_requires(setup_py_path):
requires = [
Requirement.parse(r)
for r in get_install_requires(setup_py_path)
if r.startswith("azure") and "-nspkg" not in r
if r.startswith("azure")
]
# Find package requirements that are not available on PyPI
requirement_to_update = {}
Expand Down
2 changes: 1 addition & 1 deletion eng/versioning/version_increment.py
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@ def increment_version(old_version):

package_name = args.package_name.replace('_', '-')

packages = get_packages(args, package_name)
packages = get_packages(args, package_name, additional_excludes = ["mgmt", "-nspkg"])

package_map = { pkg[1][0]: pkg for pkg in packages }

Expand Down
12 changes: 6 additions & 6 deletions eng/versioning/version_shared.py
Original file line number Diff line number Diff line change
Expand Up @@ -34,8 +34,8 @@

logging.getLogger().setLevel(logging.INFO)

def path_excluded(path):
return "-nspkg" in path or "tests" in path or "mgmt" in path or is_metapackage(path)
def path_excluded(path, additional_excludes):
return any([excl in path for excl in additional_excludes]) or "tests" in path or is_metapackage(path)

# Metapackages do not have an 'azure' folder within them
def is_metapackage(package_path):
Expand All @@ -44,13 +44,13 @@ def is_metapackage(package_path):
azure_path = path.join(dir_path, 'azure')
return not path.exists(azure_path)

def get_setup_py_paths(glob_string, base_path):
def get_setup_py_paths(glob_string, base_path, additional_excludes):
setup_paths = process_glob_string(glob_string, base_path)
filtered_paths = [path.join(p, 'setup.py') for p in setup_paths if not path_excluded(p)]
filtered_paths = [path.join(p, 'setup.py') for p in setup_paths if not path_excluded(p, additional_excludes)]
return filtered_paths


def get_packages(args, package_name = ""):
def get_packages(args, package_name = "", additional_excludes = []):
# This function returns list of path to setup.py and setup info like install requires, version for all packages discovered using glob
# Followiong are the list of arguements expected and parsed by this method
# service, glob_string
Expand All @@ -59,7 +59,7 @@ def get_packages(args, package_name = ""):
else:
target_dir = root_dir

paths = get_setup_py_paths(args.glob_string, target_dir)
paths = get_setup_py_paths(args.glob_string, target_dir, additional_excludes)

# Check if package is excluded if a package name param is passed
if package_name and not any(filter(lambda x: package_name == os.path.basename(os.path.dirname(x)), paths)):
Expand Down
2 changes: 2 additions & 0 deletions scripts/auto_release/livetest_folder_link.py
Original file line number Diff line number Diff line change
Expand Up @@ -121,4 +121,6 @@
'timeseriesinsights' : 'timeseriesinsights',
'trafficmanager' : 'trafficmanager',
'workloadmonitor' : 'workloadmonitor',
'guestconfig' : 'machinelearning',
'avs' : 'compute',
}
5 changes: 4 additions & 1 deletion scripts/devops_tasks/git_helper.py
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,10 @@
'azure-schemaregistry-avroserializer': '1.0.0b1',
'azure-storage-blob-changefeed' : '12.0.0b2',
'azure-storage-file-datalake': '12.2.0b1',
'azure-communication-identity': '1.0.0'
'azure-communication-identity': '1.0.0',
'azure-communication-phonenumbers': '1.0.0',
'azure-communication-sms': '1.0.0',
'azure-search-documents': '11.2.0b3',
}

# This method identifies release tag for latest or oldest released version of a given package
Expand Down
8 changes: 4 additions & 4 deletions sdk/attestation/azure-security-attestation/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -327,10 +327,10 @@ section of the project.
[azure_identity]: https://docs.microsoft.com/python/api/overview/azure/identity-readme?view=azure-python-preview
[DefaultAzureCredential]: https://docs.microsoft.com/python/api/azure-identity/azure.identity.defaultazurecredential?view=azure-python
[ClientSecretCredential]: https://docs.microsoft.com/python/api/azure-identity/azure.identity.clientsecretcredential?view=azure-python
[attestation_policy_result]:https://docs.microsoft.com/python/api/azure-security-attestation/azure.security.attestation.policyresult?view=azure-python-preview
[attestation_client]: https://docs.microsoft.com/python/api/azure-security-attestation/azure.security.attestation.attestationclient?view=azure-python-preview
[attestation_admin_client]: https://docs.microsoft.com/python/api/azure-security-attestation/azure.security.attestation.attestationadministrationclient?view=azure-python-preview
[attestation_policy_result_parameters]: https://docs.microsoft.com/python/api/azure-security-attestation/azure.security.attestation.policyresult?view=azure-python-preview#parameters
[attestation_policy_result]:https://docs.microsoft.com/python/api/azure-security-attestation/azure.security.attestation.attestationpolicyresult
[attestation_client]: https://docs.microsoft.com/python/api/azure-security-attestation/azure.security.attestation.attestationclient
[attestation_admin_client]: https://docs.microsoft.com/python/api/azure-security-attestation/azure.security.attestation.attestationadministrationclient
[attestation_policy_result_parameters]: https://docs.microsoft.com/python/api/azure-security-attestation/azure.security.attestation.attestationpolicyresult#parameters
[attest_sgx]: https://docs.microsoft.com/python/api/azure-security-attestation/azure.security.attestation.attestationclient?view=azure-python-preview#attest-sgx-enclave-quote--inittime-data-none--runtime-data-none--draft-policy-none----kwargs-
[attestation_pypi]: https://aka.ms/azsdk/python/azure-security-attestation
[API_reference]:https://docs.microsoft.com/python/api/overview/azure/security-attestation-readme?view=azure-python-preview
Expand Down
4 changes: 2 additions & 2 deletions sdk/batch/azure-mgmt-batch/dev_requirements.txt
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
-e ../../../tools/azure-sdk-tools
-e ../../keyvault/azure-mgmt-keyvault
-e ../../network/azure-mgmt-network
azure-mgmt-keyvault<9.0.0
azure-mgmt-network<19.0.0
-e ../../../tools/azure-devtools
Loading