Skip to content

Commit 30a9233

Browse files
committed
pull upstream main
2 parents 500779a + 645756f commit 30a9233

File tree

229 files changed

+1161
-752
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

229 files changed

+1161
-752
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -878,6 +878,12 @@
878878
"branch": "docs-snippets",
879879
"branch_mapping": {}
880880
},
881+
{
882+
"path_to_root": "ms-identity-python-webapp",
883+
"url": "https://github.com/Azure-Samples/ms-identity-python-webapp",
884+
"branch": "main",
885+
"branch_mapping": {}
886+
},
881887
{
882888
"path_to_root": "ms-identity-node",
883889
"url": "https://github.com/Azure-Samples/ms-identity-node",

articles/active-directory/authentication/how-to-certificate-based-authentication.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,10 @@ To enable the certificate-based authentication and configure user bindings in th
7272
1. To delete a CA certificate, select the certificate and click **Delete**.
7373
1. Click **Columns** to add or delete columns.
7474

75-
### Configure certification authorities using PowerShell
75+
>[!NOTE]
76+
>Upload of new CAs will fail when any of the existing CAs are expired. Tenant Admin should delete the expired CAs and then upload the new CA.
77+
78+
### Configure certification authorities(CA) using PowerShell
7679

7780
Only one CRL Distribution Point (CDP) for a trusted CA is supported. The CDP can only be HTTP URLs. Online Certificate Status Protocol (OCSP) or Lightweight Directory Access Protocol (LDAP) URLs aren't supported.
7881

@@ -87,6 +90,9 @@ Only one CRL Distribution Point (CDP) for a trusted CA is supported. The CDP can
8790
[!INCLUDE [Get-AzureAD](../../../includes/active-directory-authentication-get-trusted-azuread.md)]
8891
### Add
8992

93+
>[!NOTE]
94+
>Upload of new CAs will fail when any of the existing CAs are expired. Tenant Admin should delete the expired CAs and then upload the new CA.
95+
9096
[!INCLUDE [New-AzureAD](../../../includes/active-directory-authentication-new-trusted-azuread.md)]
9197

9298
**AuthorityType**

articles/active-directory/develop/includes/web-app/quickstart-python.md

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -74,15 +74,11 @@ You can also use an integrated development environment to open the folder.
7474

7575
1. Create a *.env* file in the root folder of the project using *.env.sample* as a guide.
7676

77-
```python
78-
TENANT_ID=<tenant id>
79-
CLIENT_ID=<client id>
80-
CLIENT_SECRET=<client secret>
81-
```
77+
:::code language="python" source="~/ms-identity-python-webapp/.env.sample":::
8278

83-
* Set the value of `TENANT_ID` to the **Directory (tenant) ID** of the registered application, also available on the overview page.
8479
* Set the value of `CLIENT_ID` to the **Application (client) ID** for the registered application, available on the overview page.
8580
* Set the value of `CLIENT_SECRET` to the client secret you created in **Certificates & Secrets** for the registered application.
81+
* Set the value of `TENANT_ID` to the **Directory (tenant) ID** of the registered application, also available on the overview page.
8682

8783
The environment variables are referenced in *app_config.py*, and are kept in a separate *.env* file to keep them out of source control. The provided *.gitignore* file prevents the *.env* file from being checked in.
8884

@@ -101,7 +97,7 @@ You can also use an integrated development environment to open the folder.
10197
2. Run the app from the command line, specifying the host and port to match the redirect URI:
10298

10399
```shell
104-
python3 -m flask run --host=localhost --port=5000
100+
python3 -m flask run --debug --host=localhost --port=5000
105101
```
106102

107103
> [!IMPORTANT]

articles/aks/csi-storage-drivers.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Container Storage Interface (CSI) drivers on Azure Kubernetes Service (AKS)
33
description: Learn about and deploy the Container Storage Interface (CSI) drivers for Azure Disks and Azure Files in an Azure Kubernetes Service (AKS) cluster
44
ms.topic: article
5-
ms.date: 01/19/2023
5+
ms.date: 03/30/2023
66

77
---
88

@@ -17,11 +17,13 @@ The CSI storage driver support on AKS allows you to natively use:
1717
- [**Azure Blob storage**](azure-blob-csi.md) can be used to mount Blob storage (or object storage) as a file system into a container or pod. Using Blob storage enables your cluster to support applications that work with large unstructured datasets like log file data, images or documents, HPC, and others. Additionally, if you ingest data into [Azure Data Lake storage](../storage/blobs/data-lake-storage-introduction.md), you can directly mount and use it in AKS without configuring another interim filesystem.
1818

1919
> [!IMPORTANT]
20-
> Starting with Kubernetes version 1.26, in-tree persistent volume types *kubernetes.io/azure-disk* and *kubernetes.io/azure-file* are deprecated and will no longer be supported. Removing these drivers following their deprecation is not planned, however you should migrate to the corresponding CSI drivers *disks.csi.azure.com* and *file.csi.azure.com*. To review the migration options for your storage classes and upgrade your cluster to use Azure Disks and Azure Files CSI drivers, see [Migrate from in-tree to CSI drivers][migrate-from-in-tree-to-csi-drivers].
20+
> Starting with Kubernetes version 1.26, in-tree persistent volume types *kubernetes.io/azure-disk* and *kubernetes.io/azure-file* are deprecated and will no longer be supported. Removing these drivers following their deprecation is not planned, however you should migrate to the corresponding CSI drivers *disks.csi.azure.com* and *file.csi.azure.com*. To review the migration options for your storage classes and upgrade your cluster to use Azure Disks and Azure Files CSI drivers, see [Migrate from in-tree to CSI drivers][migrate-from-in-tree-csi-drivers].
2121
>
2222
> *In-tree drivers* refers to the storage drivers that are part of the core Kubernetes code opposed to the CSI drivers, which are plug-ins.
2323
2424
> [!NOTE]
25+
> It is recommended to delete the corresponding PersistentVolumeClaim object instead of the PersistentVolume object when deleting a CSI volume. The external provisioner in the CSI driver will react to the deletion of the PersistentVolumeClaim and based on its reclamation policy, it will issue the DeleteVolume call against the CSI volume driver commands to delete the volume. The PersistentVolume object will then be deleted.
26+
>
2527
> Azure Disks CSI driver v2 (preview) improves scalability and reduces pod failover latency. It uses shared disks to provision attachment replicas on multiple cluster nodes and integrates with the pod scheduler to ensure a node with an attachment replica is chosen on pod failover. Azure Disks CSI driver v2 (preview) also provides the ability to fine tune performance. If you're interested in participating in the preview, submit a request: [https://aka.ms/DiskCSIv2Preview](https://aka.ms/DiskCSIv2Preview). This preview version is provided without a service level agreement, and you can occasionally expect breaking changes while in preview. The preview version isn't recommended for production workloads. For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
2628
2729
## Prerequisites

0 commit comments

Comments
 (0)