@pnp/cli-microsoft365 10.1.0-beta.10765f6 → 10.1.0-beta.6c6be23

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (36) hide show
  1. package/README.md +2 -2
  2. package/allCommands.json +1 -1
  3. package/allCommandsFull.json +1 -1
  4. package/dist/Command.js +1 -1
  5. package/dist/m365/entra/commands/enterpriseapp/enterpriseapp-add.js +3 -0
  6. package/dist/m365/entra/commands/enterpriseapp/enterpriseapp-get.js +3 -0
  7. package/dist/m365/entra/commands/enterpriseapp/enterpriseapp-list.js +3 -0
  8. package/dist/m365/entra/commands/m365group/m365group-conversation-list.js +21 -6
  9. package/dist/m365/entra/commands/m365group/m365group-get.js +29 -7
  10. package/dist/m365/entra/commands/m365group/m365group-remove.js +21 -9
  11. package/dist/m365/entra/commands/m365group/m365group-renew.js +19 -7
  12. package/dist/m365/entra/commands/m365group/m365group-teamify.js +12 -21
  13. package/dist/m365/graph/commands/subscription/subscription-add.js +46 -5
  14. package/dist/m365/spo/commands/contenttype/contenttype-get.js +2 -2
  15. package/dist/m365/spo/commands/contenttype/contenttype-list.js +6 -3
  16. package/dist/m365/spo/commands/list/list-contenttype-list.js +5 -2
  17. package/dist/m365/viva/commands/engage/engage-community-set.js +111 -0
  18. package/dist/m365/viva/commands.js +1 -0
  19. package/dist/utils/entraGroup.js +18 -0
  20. package/docs/docs/cmd/entra/m365group/m365group-conversation-list.mdx +12 -3
  21. package/docs/docs/cmd/entra/m365group/m365group-get.mdx +29 -5
  22. package/docs/docs/cmd/entra/m365group/m365group-remove.mdx +7 -4
  23. package/docs/docs/cmd/entra/m365group/m365group-renew.mdx +11 -2
  24. package/docs/docs/cmd/entra/m365group/m365group-teamify.mdx +12 -3
  25. package/docs/docs/cmd/entra/m365group/m365group-user-add.mdx +2 -2
  26. package/docs/docs/cmd/entra/m365group/m365group-user-list.mdx +6 -0
  27. package/docs/docs/cmd/entra/m365group/m365group-user-remove.mdx +1 -1
  28. package/docs/docs/cmd/entra/m365group/m365group-user-set.mdx +3 -3
  29. package/docs/docs/cmd/graph/subscription/subscription-add.mdx +30 -5
  30. package/docs/docs/cmd/login.mdx +45 -44
  31. package/docs/docs/cmd/pp/managementapp/managementapp-add.mdx +1 -1
  32. package/docs/docs/cmd/spo/contenttype/contenttype-get.mdx +7 -1
  33. package/docs/docs/cmd/spo/contenttype/contenttype-list.mdx +7 -1
  34. package/docs/docs/cmd/spo/list/list-contenttype-list.mdx +7 -1
  35. package/docs/docs/cmd/viva/engage/engage-community-set.mdx +61 -0
  36. package/package.json +2 -2
@@ -15,6 +15,12 @@ m365 login [options]
15
15
  ## Options
16
16
 
17
17
  ```md definition-list
18
+ `--appId [appId]`
19
+ : App ID of the Microsoft Entra application to use for authentication. This option is crucial and should be specified if it isn't defined elsewhere.
20
+
21
+ `--tenant [tenant]`
22
+ : ID of the tenant from which accounts should authenticate. Use `common` or `organization` for multitenant apps. Defaults to `common` if not specified and if the config value `tenantId` and the environment variable `CLIMICROSOFT365_TENANT` are also not set.
23
+
18
24
  `-t, --authType [authType]`
19
25
  : The type of authentication to use. Allowed values `certificate`, `deviceCode`, `password`, `identity`, `browser`, `secret`. Default `deviceCode`
20
26
 
@@ -36,12 +42,6 @@ m365 login [options]
36
42
  `-s, --secret [secret]`
37
43
  : Client Secret of the Microsoft Entra application to use for authentication. Required when `authType` is set to `secret`.
38
44
 
39
- `--appId [appId]`
40
- : App ID of the Microsoft Entra application to use for authentication. If not specified, use the app specified in the `CLIMICROSOFT365_ENTRAAPPID` environment variable. If the environment variable is not defined, use the multitenant PnP Management Shell app
41
-
42
- `--tenant [tenant]`
43
- : ID of the tenant from which accounts should be able to authenticate. Use `common` or `organization` if the app is multitenant. If not specified, use the tenant specified in the `CLIMICROSOFT365_TENANT` environment variable. If the environment variable is not defined, use `common` as the tenant identifier
44
-
45
45
  `--cloud [cloud]`
46
46
  : Cloud to connect to. Allowed values `Public`, `USGov`, `USGovHigh`, `USGovDoD` and `China`. Default `Public`
47
47
 
@@ -56,6 +56,20 @@ m365 login [options]
56
56
 
57
57
  ## Remarks
58
58
 
59
+ :::tip
60
+
61
+ The CLI determines the `appId` and `tenant` values in the following order of precedence:
62
+
63
+ 1. The `appId` or `tenant` option specified during login.
64
+ 2. The `clientId` or `tenantId` value set in the configuration.
65
+ 3. The `CLIMICROSOFT365_ENTRAAPPID` or `CLIMICROSOFT365_TENANT` environment variable.
66
+
67
+ For `appId`, it is **required** that at least one of the options is specified during login.
68
+
69
+ For `tenant`, if none are specified, the CLI will default to `common`.
70
+
71
+ :::
72
+
59
73
  Using the `login` command you can log in to Microsoft 365.
60
74
 
61
75
  By default, the `login` command uses device code OAuth flow to log in to Microsoft 365. Alternatively, you can authenticate using a user name and password or certificate, which are convenient for CI/CD scenarios, but which come with their own [limitations](../user-guide/connecting-microsoft-365.mdx). The default `authType` can be configured using `m365 cli config set`. This means you'll be able to run `m365 login` without specifying the `--authType` option.
@@ -78,116 +92,103 @@ When signing in with multiple identities, every signin will be saved as a connec
78
92
 
79
93
  ## Examples
80
94
 
81
- Log in to Microsoft 365 using the device code
95
+ Log in to Microsoft 365 using the device code.
96
+
97
+ ```sh
98
+ m365 login --appId 31359c7f-bd7e-475c-86db-fdb8c937548e
99
+ ```
100
+
101
+ Log in to Microsoft 365 using the device code and set the connection name.
82
102
 
83
103
  ```sh
84
- m365 login
104
+ m365 login --connectionName 'myworkaccount' --appId 31359c7f-bd7e-475c-86db-fdb8c937548e
85
105
  ```
86
106
 
87
- Log in to Microsoft 365 using the device code and set the connection name
107
+ Log in to Microsoft 365 using your own Microsoft Entra application that's restricted only to allow accounts from the specific tenant.
88
108
 
89
109
  ```sh
90
- m365 login --connectionName 'myworkaccount'
110
+ m365 login --appId 31359c7f-bd7e-475c-86db-fdb8c937548c --tenant 31359c7f-bd7e-475c-86db-fdb8c937548a
91
111
  ```
92
112
 
93
- Log in to Microsoft 365 using the device code in debug mode including detailed debug information in the console output
113
+ Log in to Microsoft 365 using your own Microsoft Entra application and a personal information exchange (.pfx) file.
94
114
 
95
115
  ```sh
96
- m365 login --debug
116
+ m365 login --authType certificate --appId 31359c7f-bd7e-475c-86db-fdb8c937548c --tenant 31359c7f-bd7e-475c-86db-fdb8c937548a --certificateFile /Users/user/dev/localhost.pfx --password 'pass@word1'
97
117
  ```
98
118
 
99
- Log in to Microsoft 365 using a user name and password
119
+ Log in to Microsoft 365 using a user name and password with `clientId` set in the configuration.
100
120
 
101
121
  ```sh
102
122
  m365 login --authType password --userName user@contoso.com --password pass@word1
103
123
  ```
104
124
 
105
- Log in to Microsoft 365 using a PEM certificate
125
+ Log in to Microsoft 365 using a PEM certificate with `clientId` set in the configuration.
106
126
 
107
127
  ```sh
108
128
  m365 login --authType certificate --certificateFile /Users/user/dev/localhost.pem
109
129
  ```
110
130
 
111
- Log in to Microsoft 365 using a PEM certificate. Use the specified thumbprint
131
+ Log in to Microsoft 365 using a PEM certificate with `clientId` set in the configuration. Use the specified thumbprint.
112
132
 
113
133
  ```sh
114
134
  m365 login --authType certificate --certificateFile /Users/user/dev/localhost.pem --thumbprint 47C4885736C624E90491F32B98855AA8A7562AF1
115
135
  ```
116
136
 
117
- Log in to Microsoft 365 using a personal information exchange (.pfx) file
137
+ Log in to Microsoft 365 using a personal information exchange (.pfx) file with `CLIMICROSOFT365_ENTRAAPPID` environment variable set.
118
138
 
119
139
  ```sh
120
140
  m365 login --authType certificate --certificateFile /Users/user/dev/localhost.pfx --password 'pass@word1'
121
141
  ```
122
142
 
123
- Log in to Microsoft 365 using a personal information exchange (.pfx) file protected with an empty password
143
+ Log in to Microsoft 365 using a personal information exchange (.pfx) file protected with an empty password and `CLIMICROSOFT365_ENTRAAPPID` environment variable set.
124
144
 
125
145
  ```sh
126
146
  m365 login --authType certificate --certificateFile /Users/user/dev/localhost.pfx --password
127
147
  ```
128
148
 
129
- Log in to Microsoft 365 using a personal information exchange (.pfx) file not protected with a password
149
+ Log in to Microsoft 365 using a personal information exchange (.pfx) file not protected with a password and `CLIMICROSOFT365_ENTRAAPPID` environment variable set.
130
150
 
131
151
  ```sh
132
152
  m365 login --authType certificate --certificateFile /Users/user/dev/localhost.pfx
133
153
  ```
134
154
 
135
- Log in to Microsoft 365 using a personal information exchange (.pfx) file. Use the specified thumbprint
155
+ Log in to Microsoft 365 using a personal information exchange (.pfx) file. Use the specified thumbprint and `CLIMICROSOFT365_ENTRAAPPID` environment variable set.
136
156
 
137
157
  ```sh
138
158
  m365 login --authType certificate --certificateFile /Users/user/dev/localhost.pfx --thumbprint 47C4885736C624E90491F32B98855AA8A7562AF1 --password 'pass@word1'
139
159
  ```
140
160
 
141
- Log in to Microsoft 365 using a certificate from a base64-encoded string
161
+ Log in to Microsoft 365 using a certificate from a base64-encoded string with `CLIMICROSOFT365_ENTRAAPPID` environment variable set.
142
162
 
143
163
  ```sh
144
164
  m365 login --authType certificate --certificateBase64Encoded MIII2QIBAzCCCJ8GCSqGSIb3DQEHAaCCCJAEg...eX1N5AgIIAA== --thumbprint D0C9B442DE249F55D10CDA1A2418952DC7D407A3
145
165
  ```
146
166
 
147
- Log in to Microsoft 365 using a system assigned managed identity. Applies to Azure resources with managed identity enabled,
148
- such as Azure Virtual Machines, Azure App Service or Azure Functions
167
+ Log in to Microsoft 365 using a system assigned managed identity with `clientId` set in the configuration. Applies to Azure resources with managed identity enabled, such as Azure Virtual Machines, Azure App Service or Azure Functions.
149
168
 
150
169
  ```sh
151
170
  m365 login --authType identity
152
171
  ```
153
172
 
154
- Log in to Microsoft 365 using managed identity in Azure Cloud Shell. Uses the identity of the current user.
173
+ Log in to Microsoft 365 using managed identity in Azure Cloud Shell with `clientId` set in the configuration. Uses the identity of the current user.
155
174
 
156
175
  ```sh
157
176
  m365 login --authType identity
158
177
  ```
159
178
 
160
- Log in to Microsoft 365 using a user-assigned managed identity. Client id or principal id also known as object id value can be specified in the `userName` option. Applies to Azure resources with managed identity enabled, such as Azure Virtual Machines, Azure App Service or Azure Functions
179
+ Log in to Microsoft 365 using a user-assigned managed identity with `clientId` set in the configuration. Client id or principal id also known as object id value can be specified in the `userName` option. Applies to Azure resources with managed identity enabled, such as Azure Virtual Machines, Azure App Service or Azure Functions.
161
180
 
162
181
  ```sh
163
182
  m365 login --authType identity --userName ac9fbed5-804c-4362-a369-21a4ec51109e
164
183
  ```
165
184
 
166
- Log in to Microsoft 365 using your own multitenant Microsoft Entra application
167
-
168
- ```sh
169
- m365 login --appId 31359c7f-bd7e-475c-86db-fdb8c937548c
170
- ```
171
-
172
- Log in to Microsoft 365 using your own Microsoft Entra application that's restricted only to allow accounts from the specific tenant
173
-
174
- ```sh
175
- m365 login --appId 31359c7f-bd7e-475c-86db-fdb8c937548c --tenant 31359c7f-bd7e-475c-86db-fdb8c937548a
176
- ```
177
-
178
- Log in to Microsoft 365 using your own Microsoft Entra application and a personal information exchange (.pfx) file
179
-
180
- ```sh
181
- m365 login --authType certificate --appId 31359c7f-bd7e-475c-86db-fdb8c937548c --tenant 31359c7f-bd7e-475c-86db-fdb8c937548a --certificateFile /Users/user/dev/localhost.pfx --password 'pass@word1'
182
- ```
183
-
184
- Log in to Microsoft 365 using the interactive browser authentication. Uses the identity of the current user.
185
+ Log in to Microsoft 365 using the interactive browser authentication with `clientId` set in the configuration. Uses the identity of the current user.
185
186
 
186
187
  ```sh
187
188
  m365 login --authType browser
188
189
  ```
189
190
 
190
- Log in to Microsoft 365 using a client secret.
191
+ Log in to Microsoft 365 using a client secret with `clientId` set in the configuration.
191
192
 
192
193
  ```sh
193
194
  m365 login --authType secret --secret topSeCr3t@007
@@ -29,7 +29,7 @@ m365 pp managementapp add [options]
29
29
 
30
30
  ## Remarks
31
31
 
32
- To execute this command the first time you'll need sign in using the Microsoft Azure PowerShell app registration. You can do this by executing `m365 login --appId 1950a258-227b-4e31-a9cf-717495945fc2`. To register the Microsoft Entra app registration that CLI for Microsoft 365 uses by default, execute `m365 pp managementapp add--appId 31359c7f-bd7e-475c-86db-fdb8c937548e`.
32
+ To execute this command the first time you'll need sign in using the Microsoft Azure PowerShell application registration. You can do this by executing `m365 login --appId 1950a258-227b-4e31-a9cf-717495945fc2`. To register the Microsoft Entra application registration that CLI for Microsoft 365 uses by default, execute `m365 pp managementapp add--appId 31359c7f-bd7e-475c-86db-fdb8c937548e`.
33
33
 
34
34
  For best performance use the `appId` option to reference the Microsoft Entra application registration to update. If you use `objectId` or `name`, this command will first need to find the corresponding `appId` for that application.
35
35
 
@@ -108,6 +108,12 @@ m365 spo contenttype get --webUrl https://contoso.sharepoint.com/sites/contoso-s
108
108
  "NewFormTarget": 0,
109
109
  "NewFormTemplateName": "ListForm",
110
110
  "NewFormUrl": "",
111
+ "Parent": {
112
+ "StringId": "0x01000B1208C5D23DF",
113
+ "Name": "Item",
114
+ "Group": "List items",
115
+ "Id": { "StringId": "0x01000B1208C5D23DF" }
116
+ },
111
117
  "ReadOnly": false,
112
118
  "SchemaXml": "<ContentType ID=\"0x01007926A45D687BA842B947286090B8F67D\" Name=\"PnP Alert\" Group=\"PnP Content Types\" Description=\"Create a new list item.\" Version=\"0\"><Folder TargetName=\"_cts/PnP Alert\" /><Fields><Field ID=\"{c042a256-787d-4a6f-8a8a-cf6ab767f12d}\" Name=\"ContentType\" SourceID=\"http://schemas.microsoft.com/sharepoint/v3\" StaticName=\"ContentType\" Group=\"_Hidden\" Type=\"Computed\" DisplayName=\"Content Type\" Sealed=\"TRUE\" Sortable=\"FALSE\" RenderXMLUsingPattern=\"TRUE\" PITarget=\"MicrosoftWindowsSharePointServices\" PIAttribute=\"ContentTypeID\" DelayActivateTemplateBinding=\"GROUP,SPSPERS,SITEPAGEPUBLISHING\" Customization=\"\"><FieldRefs><FieldRef ID=\"{03e45e84-1992-4d42-9116-26f756012634}\" Name=\"ContentTypeId\" /></FieldRefs><DisplayPattern><MapToContentType><Column Name=\"ContentTypeId\" /></MapToContentType></DisplayPattern></Field><Field ID=\"{fa564e0f-0c70-4ab9-b863-0177e6ddd247}\" Name=\"Title\" SourceID=\"http://schemas.microsoft.com/sharepoint/v3\" StaticName=\"Title\" Group=\"_Hidden\" Type=\"Text\" DisplayName=\"Title\" Required=\"TRUE\" FromBaseType=\"TRUE\" DelayActivateTemplateBinding=\"GROUP,SPSPERS,SITEPAGEPUBLISHING\" Customization=\"\" ShowInNewForm=\"TRUE\" ShowInEditForm=\"TRUE\"></Field></Fields><XmlDocuments><XmlDocument NamespaceURI=\"http://schemas.microsoft.com/sharepoint/v3/contenttype/forms\"><FormTemplates xmlns=\"http://schemas.microsoft.com/sharepoint/v3/contenttype/forms\"><Display>ListForm</Display><Edit>ListForm</Edit><New>ListForm</New></FormTemplates></XmlDocument></XmlDocuments></ContentType>",
113
119
  "Scope": "/sites/contoso-sales",
@@ -170,7 +176,7 @@ m365 spo contenttype get --webUrl https://contoso.sharepoint.com/sites/contoso-s
170
176
 
171
177
  Date: 10/2/2023
172
178
 
173
- ## PnP Alert ([object Object])
179
+ ## PnP Alert (0x01007926A45D687BA842B947286090B8F67D)
174
180
 
175
181
  Property | Value
176
182
  ---------|-------
@@ -75,6 +75,12 @@ m365 spo contenttype list --webUrl "https://contoso.sharepoint.com/sites/contoso
75
75
  "NewFormTarget": 0,
76
76
  "NewFormTemplateName": "ListForm",
77
77
  "NewFormUrl": "",
78
+ "Parent": {
79
+ "StringId": "0x01000B1208C5D23DF",
80
+ "Name": "Item",
81
+ "Group": "List items",
82
+ "Id": { "StringId": "0x01000B1208C5D23DF" }
83
+ },
78
84
  "ReadOnly": false,
79
85
  "SchemaXml": "<ContentType ID=\"0x01007926A45D687BA842B947286090B8F67D\" Name=\"PnP Alert\" Group=\"PnP Content Types\" Description=\"Create a new list item.\" Version=\"0\"><Folder TargetName=\"_cts/PnP Alert\" /><Fields><Field ID=\"{c042a256-787d-4a6f-8a8a-cf6ab767f12d}\" Name=\"ContentType\" SourceID=\"http://schemas.microsoft.com/sharepoint/v3\" StaticName=\"ContentType\" Group=\"_Hidden\" Type=\"Computed\" DisplayName=\"Content Type\" Sealed=\"TRUE\" Sortable=\"FALSE\" RenderXMLUsingPattern=\"TRUE\" PITarget=\"MicrosoftWindowsSharePointServices\" PIAttribute=\"ContentTypeID\" DelayActivateTemplateBinding=\"GROUP,SPSPERS,SITEPAGEPUBLISHING\" Customization=\"\"><FieldRefs><FieldRef ID=\"{03e45e84-1992-4d42-9116-26f756012634}\" Name=\"ContentTypeId\" /></FieldRefs><DisplayPattern><MapToContentType><Column Name=\"ContentTypeId\" /></MapToContentType></DisplayPattern></Field><Field ID=\"{fa564e0f-0c70-4ab9-b863-0177e6ddd247}\" Name=\"Title\" SourceID=\"http://schemas.microsoft.com/sharepoint/v3\" StaticName=\"Title\" Group=\"_Hidden\" Type=\"Text\" DisplayName=\"Title\" Required=\"TRUE\" FromBaseType=\"TRUE\" DelayActivateTemplateBinding=\"GROUP,SPSPERS,SITEPAGEPUBLISHING\" Customization=\"\" ShowInNewForm=\"TRUE\" ShowInEditForm=\"TRUE\"></Field></Fields><XmlDocuments><XmlDocument NamespaceURI=\"http://schemas.microsoft.com/sharepoint/v3/contenttype/forms\"><FormTemplates xmlns=\"http://schemas.microsoft.com/sharepoint/v3/contenttype/forms\"><Display>ListForm</Display><Edit>ListForm</Edit><New>ListForm</New></FormTemplates></XmlDocument></XmlDocuments></ContentType>",
80
86
  "Scope": "/sites/contoso-sales",
@@ -108,7 +114,7 @@ m365 spo contenttype list --webUrl "https://contoso.sharepoint.com/sites/contoso
108
114
  # spo contenttype list --webUrl "https://contoso.sharepoint.com/sites/contoso-sales"
109
115
 
110
116
  Date: 10/2/2023
111
- ## PnP Alert ([object Object])
117
+ ## PnP Alert (0x01007926A45D687BA842B947286090B8F67D)
112
118
 
113
119
  Property | Value
114
120
  ---------|-------
@@ -87,6 +87,12 @@ m365 spo list contenttype list --webUrl https://contoso.sharepoint.com/sites/pro
87
87
  "NewFormTarget": 0,
88
88
  "NewFormTemplateName": "ListForm",
89
89
  "NewFormUrl": "",
90
+ "Parent": {
91
+ "StringId": "0x01000B1208C5D23DF",
92
+ "Name": "Item",
93
+ "Group": "List items",
94
+ "Id": { "StringId": "0x01000B1208C5D23DF" }
95
+ },
90
96
  "ReadOnly": false,
91
97
  "SchemaXml": "<ContentType ID=\"0x01000B1208C5D23DF44B9F1AEE7373DE9D5E\" Name=\"Item\" Group=\"List Content Types\" Description=\"Create a new list item.\" Version=\"0\" FeatureId=\"{695b6570-a48b-4a8e-8ea5-26ea7fc1d162}\" FeatureIds=\"{695b6570-a48b-4a8e-8ea5-26ea7fc1d162};{c94c1702-30a7-454c-be15-5a895223428d}\"><Folder TargetName=\"Item\"/><Fields><Field ID=\"{c042a256-787d-4a6f-8a8a-cf6ab767f12d}\" Type=\"Computed\" DisplayName=\"Content Type\" Name=\"ContentType\" DisplaceOnUpgrade=\"TRUE\" RenderXMLUsingPattern=\"TRUE\" Sortable=\"FALSE\" SourceID=\"http://schemas.microsoft.com/sharepoint/v3\" StaticName=\"ContentType\" Group=\"_Hidden\" PITarget=\"MicrosoftWindowsSharePointServices\" PIAttribute=\"ContentTypeID\" FromBaseType=\"TRUE\"><FieldRefs><FieldRef Name=\"ContentTypeId\"/></FieldRefs><DisplayPattern><MapToContentType><Column Name=\"ContentTypeId\"/></MapToContentType></DisplayPattern></Field><Field ID=\"{fa564e0f-0c70-4ab9-b863-0177e6ddd247}\" Type=\"Text\" Name=\"Title\" DisplayName=\"Title\" Required=\"TRUE\" SourceID=\"http://schemas.microsoft.com/sharepoint/v3\" StaticName=\"Title\" FromBaseType=\"TRUE\" ColName=\"nvarchar1\" ShowInNewForm=\"TRUE\" ShowInEditForm=\"TRUE\"/></Fields><XmlDocuments><XmlDocument NamespaceURI=\"http://schemas.microsoft.com/sharepoint/v3/contenttype/forms\"><FormTemplates xmlns=\"http://schemas.microsoft.com/sharepoint/v3/contenttype/forms\"><Display>ListForm</Display><Edit>ListForm</Edit><New>ListForm</New></FormTemplates></XmlDocument></XmlDocuments></ContentType>",
92
98
  "Scope": "/Lists/Test",
@@ -121,7 +127,7 @@ m365 spo list contenttype list --webUrl https://contoso.sharepoint.com/sites/pro
121
127
 
122
128
  Date: 2/20/2023
123
129
 
124
- ## Document ([object Object])
130
+ ## Document (0x01000B1208C5D23DF44B9F1AEE7373DE9D5E)
125
131
 
126
132
  Property | Value
127
133
  ---------|-------
@@ -0,0 +1,61 @@
1
+ import Global from '/docs/cmd/_global.mdx';
2
+ import Tabs from '@theme/Tabs';
3
+ import TabItem from '@theme/TabItem';
4
+
5
+ # viva engage community set
6
+
7
+ Updates an existing Viva Engage community
8
+
9
+ ## Usage
10
+
11
+ ```sh
12
+ m365 viva engage community set [options]
13
+ ```
14
+
15
+ ## Options
16
+
17
+ ```md definition-list
18
+ `-i, --id [id]`
19
+ : The id of the community. Specify either `id`, `displayName` or `entraGroupId`, but not multiple.
20
+
21
+ `-d, --displayName [displayName]`
22
+ : The name of the community. Specify either `id`, `displayName` or `entraGroupId`, but not multiple.
23
+
24
+ `--entraGroupId [entraGroupId]`
25
+ : The id of the Microsoft Entra group associated with the community. Specify either `id`, `displayName` or `entraGroupId`, but not multiple.
26
+
27
+ `--newDisplayName [newDisplayName]`
28
+ : New name for the community. The maximum length is 255 characters.
29
+
30
+ `--description [description]`
31
+ : The description of the community. The maximum length is 1024 characters.
32
+
33
+ `--privacy [privacy]`
34
+ : Defines the privacy level of the community. The possible values are: `public`, and `private`.
35
+ ```
36
+
37
+ <Global />
38
+
39
+ ## Examples
40
+
41
+ Update info about the community specified by id
42
+
43
+ ```sh
44
+ m365 viva engage community set --id eyJfdHlwZSI6Ikdyb3VwIiwiaWQiOiI0NzY5MTM1ODIwOSJ9 --newDisplayName 'Developers' --description 'Community for all devs' --privacy public
45
+ ```
46
+
47
+ Update info about the community specified by name
48
+
49
+ ```sh
50
+ m365 viva engage community set --displayName 'Developrs' --newDisplayName 'Developers'
51
+ ```
52
+
53
+ Update info about the community specified by Entra group id
54
+
55
+ ```sh
56
+ m365 viva engage community set --entraGroupId '0bed8b86-5026-4a93-ac7d-56750cc099f1' --newDisplayName 'Developers'
57
+ ```
58
+
59
+ ## Response
60
+
61
+ The command won't return a response on success.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@pnp/cli-microsoft365",
3
- "version": "10.1.0-beta.10765f6",
3
+ "version": "10.1.0-beta.6c6be23",
4
4
  "description": "Manage Microsoft 365 and SharePoint Framework projects on any platform",
5
5
  "license": "MIT",
6
6
  "main": "./dist/api.js",
@@ -28,7 +28,7 @@
28
28
  "test:version": "node scripts/check-version.js",
29
29
  "test:cov": "c8 npm run test:test",
30
30
  "test:test": "mocha",
31
- "lint": "eslint --ext .ts src"
31
+ "lint": "eslint --ext .ts src --cache --cache-strategy content"
32
32
  },
33
33
  "keywords": [
34
34
  "adaptive card",