-
Notifications
You must be signed in to change notification settings - Fork 371
chore: Merge Latest changes from main to demo #382
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
feat: Added code changes related azd quota check
…ipts and parameters
feat: Merge the Azd Quota check changes from dev to main
docs: process of choosing between sandbox and production configurations when deploying Azure infrastructure using the `azd up` command
feat: Update deployment configurations to set WAF architecture parameters
fix: Updated Planner prompt to remove EXCEPTION wording and align with LLM behavior
fix: p2/p3 Bug fixes
fix: enable the appinsights telemetry logs code
Added Reusing an Existing Log Analytics Workspace section
fix: added fix for not creating task for input like "x" or "abcd" or meani…
feat: Merging the changes from dev to main
fix: User story changes and bug fix
fix: bug fix
feat: replacing DefaultAzureCredential with ManagedIdentityCredential, RAI check, API upgrades
feat: down merge from main to dev
fix: rate limit error message change
docs: Removed outdated container publishing instructions
fix: updated the azure-ai-agents version to resolve the package issue
fix: Update azure-ai-agents dependency to >=1.2.0b1 to resolve compatibility issues with latest SDK features
…_docs docs: Added Documentation for Reusing Azure AI Foundry Project
This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation. |
Credential object: Either AioDefaultAzureCredential or AioManagedIdentityCredential. | ||
""" | ||
if os.getenv("APP_ENV", "prod").lower() == 'dev': | ||
return AioDefaultAzureCredential() # CodeQL [SM05139] Okay use of DefaultAzureCredential as it is only used in development |
Check notice
Code scanning / CodeQL
Suppression of type m365. Expiration date: none, Suppression Code: SM05139. Justification: Okay use of DefaultAzureCredential as it is only used in development. Note
Credential object: Either DefaultAzureCredential or ManagedIdentityCredential. | ||
""" | ||
if os.getenv("APP_ENV", "prod").lower() == 'dev': | ||
return DefaultAzureCredential() # CodeQL [SM05139] Okay use of DefaultAzureCredential as it is only used in development |
Check failure
Code scanning / CodeQL
Detect unsafe use of DefaultAzureCredential in python application Error
Credential object: Either DefaultAzureCredential or ManagedIdentityCredential. | ||
""" | ||
if os.getenv("APP_ENV", "prod").lower() == 'dev': | ||
return DefaultAzureCredential() # CodeQL [SM05139] Okay use of DefaultAzureCredential as it is only used in development |
Check notice
Code scanning / CodeQL
Suppression of type m365. Expiration date: none, Suppression Code: SM05139. Justification: Okay use of DefaultAzureCredential as it is only used in development. Note
🎉 This PR is included in version 2.2.0 🎉 The release is available on GitHub release Your semantic-release bot 📦🚀 |
Purpose
Does this introduce a breaking change?
How to Test
What to Check
Verify that the following are valid
Other Information