@pnp/cli-microsoft365 10.1.0-beta.10765f6 → 10.1.0-beta.6c6be23
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +2 -2
- package/allCommands.json +1 -1
- package/allCommandsFull.json +1 -1
- package/dist/Command.js +1 -1
- package/dist/m365/entra/commands/enterpriseapp/enterpriseapp-add.js +3 -0
- package/dist/m365/entra/commands/enterpriseapp/enterpriseapp-get.js +3 -0
- package/dist/m365/entra/commands/enterpriseapp/enterpriseapp-list.js +3 -0
- package/dist/m365/entra/commands/m365group/m365group-conversation-list.js +21 -6
- package/dist/m365/entra/commands/m365group/m365group-get.js +29 -7
- package/dist/m365/entra/commands/m365group/m365group-remove.js +21 -9
- package/dist/m365/entra/commands/m365group/m365group-renew.js +19 -7
- package/dist/m365/entra/commands/m365group/m365group-teamify.js +12 -21
- package/dist/m365/graph/commands/subscription/subscription-add.js +46 -5
- package/dist/m365/spo/commands/contenttype/contenttype-get.js +2 -2
- package/dist/m365/spo/commands/contenttype/contenttype-list.js +6 -3
- package/dist/m365/spo/commands/list/list-contenttype-list.js +5 -2
- package/dist/m365/viva/commands/engage/engage-community-set.js +111 -0
- package/dist/m365/viva/commands.js +1 -0
- package/dist/utils/entraGroup.js +18 -0
- package/docs/docs/cmd/entra/m365group/m365group-conversation-list.mdx +12 -3
- package/docs/docs/cmd/entra/m365group/m365group-get.mdx +29 -5
- package/docs/docs/cmd/entra/m365group/m365group-remove.mdx +7 -4
- package/docs/docs/cmd/entra/m365group/m365group-renew.mdx +11 -2
- package/docs/docs/cmd/entra/m365group/m365group-teamify.mdx +12 -3
- package/docs/docs/cmd/entra/m365group/m365group-user-add.mdx +2 -2
- package/docs/docs/cmd/entra/m365group/m365group-user-list.mdx +6 -0
- package/docs/docs/cmd/entra/m365group/m365group-user-remove.mdx +1 -1
- package/docs/docs/cmd/entra/m365group/m365group-user-set.mdx +3 -3
- package/docs/docs/cmd/graph/subscription/subscription-add.mdx +30 -5
- package/docs/docs/cmd/login.mdx +45 -44
- package/docs/docs/cmd/pp/managementapp/managementapp-add.mdx +1 -1
- package/docs/docs/cmd/spo/contenttype/contenttype-get.mdx +7 -1
- package/docs/docs/cmd/spo/contenttype/contenttype-list.mdx +7 -1
- package/docs/docs/cmd/spo/list/list-contenttype-list.mdx +7 -1
- package/docs/docs/cmd/viva/engage/engage-community-set.mdx +61 -0
- package/package.json +2 -2
package/docs/docs/cmd/login.mdx
CHANGED
|
@@ -15,6 +15,12 @@ m365 login [options]
|
|
|
15
15
|
## Options
|
|
16
16
|
|
|
17
17
|
```md definition-list
|
|
18
|
+
`--appId [appId]`
|
|
19
|
+
: App ID of the Microsoft Entra application to use for authentication. This option is crucial and should be specified if it isn't defined elsewhere.
|
|
20
|
+
|
|
21
|
+
`--tenant [tenant]`
|
|
22
|
+
: ID of the tenant from which accounts should authenticate. Use `common` or `organization` for multitenant apps. Defaults to `common` if not specified and if the config value `tenantId` and the environment variable `CLIMICROSOFT365_TENANT` are also not set.
|
|
23
|
+
|
|
18
24
|
`-t, --authType [authType]`
|
|
19
25
|
: The type of authentication to use. Allowed values `certificate`, `deviceCode`, `password`, `identity`, `browser`, `secret`. Default `deviceCode`
|
|
20
26
|
|
|
@@ -36,12 +42,6 @@ m365 login [options]
|
|
|
36
42
|
`-s, --secret [secret]`
|
|
37
43
|
: Client Secret of the Microsoft Entra application to use for authentication. Required when `authType` is set to `secret`.
|
|
38
44
|
|
|
39
|
-
`--appId [appId]`
|
|
40
|
-
: App ID of the Microsoft Entra application to use for authentication. If not specified, use the app specified in the `CLIMICROSOFT365_ENTRAAPPID` environment variable. If the environment variable is not defined, use the multitenant PnP Management Shell app
|
|
41
|
-
|
|
42
|
-
`--tenant [tenant]`
|
|
43
|
-
: ID of the tenant from which accounts should be able to authenticate. Use `common` or `organization` if the app is multitenant. If not specified, use the tenant specified in the `CLIMICROSOFT365_TENANT` environment variable. If the environment variable is not defined, use `common` as the tenant identifier
|
|
44
|
-
|
|
45
45
|
`--cloud [cloud]`
|
|
46
46
|
: Cloud to connect to. Allowed values `Public`, `USGov`, `USGovHigh`, `USGovDoD` and `China`. Default `Public`
|
|
47
47
|
|
|
@@ -56,6 +56,20 @@ m365 login [options]
|
|
|
56
56
|
|
|
57
57
|
## Remarks
|
|
58
58
|
|
|
59
|
+
:::tip
|
|
60
|
+
|
|
61
|
+
The CLI determines the `appId` and `tenant` values in the following order of precedence:
|
|
62
|
+
|
|
63
|
+
1. The `appId` or `tenant` option specified during login.
|
|
64
|
+
2. The `clientId` or `tenantId` value set in the configuration.
|
|
65
|
+
3. The `CLIMICROSOFT365_ENTRAAPPID` or `CLIMICROSOFT365_TENANT` environment variable.
|
|
66
|
+
|
|
67
|
+
For `appId`, it is **required** that at least one of the options is specified during login.
|
|
68
|
+
|
|
69
|
+
For `tenant`, if none are specified, the CLI will default to `common`.
|
|
70
|
+
|
|
71
|
+
:::
|
|
72
|
+
|
|
59
73
|
Using the `login` command you can log in to Microsoft 365.
|
|
60
74
|
|
|
61
75
|
By default, the `login` command uses device code OAuth flow to log in to Microsoft 365. Alternatively, you can authenticate using a user name and password or certificate, which are convenient for CI/CD scenarios, but which come with their own [limitations](../user-guide/connecting-microsoft-365.mdx). The default `authType` can be configured using `m365 cli config set`. This means you'll be able to run `m365 login` without specifying the `--authType` option.
|
|
@@ -78,116 +92,103 @@ When signing in with multiple identities, every signin will be saved as a connec
|
|
|
78
92
|
|
|
79
93
|
## Examples
|
|
80
94
|
|
|
81
|
-
Log in to Microsoft 365 using the device code
|
|
95
|
+
Log in to Microsoft 365 using the device code.
|
|
96
|
+
|
|
97
|
+
```sh
|
|
98
|
+
m365 login --appId 31359c7f-bd7e-475c-86db-fdb8c937548e
|
|
99
|
+
```
|
|
100
|
+
|
|
101
|
+
Log in to Microsoft 365 using the device code and set the connection name.
|
|
82
102
|
|
|
83
103
|
```sh
|
|
84
|
-
m365 login
|
|
104
|
+
m365 login --connectionName 'myworkaccount' --appId 31359c7f-bd7e-475c-86db-fdb8c937548e
|
|
85
105
|
```
|
|
86
106
|
|
|
87
|
-
Log in to Microsoft 365 using
|
|
107
|
+
Log in to Microsoft 365 using your own Microsoft Entra application that's restricted only to allow accounts from the specific tenant.
|
|
88
108
|
|
|
89
109
|
```sh
|
|
90
|
-
m365 login --
|
|
110
|
+
m365 login --appId 31359c7f-bd7e-475c-86db-fdb8c937548c --tenant 31359c7f-bd7e-475c-86db-fdb8c937548a
|
|
91
111
|
```
|
|
92
112
|
|
|
93
|
-
Log in to Microsoft 365 using
|
|
113
|
+
Log in to Microsoft 365 using your own Microsoft Entra application and a personal information exchange (.pfx) file.
|
|
94
114
|
|
|
95
115
|
```sh
|
|
96
|
-
m365 login --
|
|
116
|
+
m365 login --authType certificate --appId 31359c7f-bd7e-475c-86db-fdb8c937548c --tenant 31359c7f-bd7e-475c-86db-fdb8c937548a --certificateFile /Users/user/dev/localhost.pfx --password 'pass@word1'
|
|
97
117
|
```
|
|
98
118
|
|
|
99
|
-
Log in to Microsoft 365 using a user name and password
|
|
119
|
+
Log in to Microsoft 365 using a user name and password with `clientId` set in the configuration.
|
|
100
120
|
|
|
101
121
|
```sh
|
|
102
122
|
m365 login --authType password --userName user@contoso.com --password pass@word1
|
|
103
123
|
```
|
|
104
124
|
|
|
105
|
-
Log in to Microsoft 365 using a PEM certificate
|
|
125
|
+
Log in to Microsoft 365 using a PEM certificate with `clientId` set in the configuration.
|
|
106
126
|
|
|
107
127
|
```sh
|
|
108
128
|
m365 login --authType certificate --certificateFile /Users/user/dev/localhost.pem
|
|
109
129
|
```
|
|
110
130
|
|
|
111
|
-
Log in to Microsoft 365 using a PEM certificate. Use the specified thumbprint
|
|
131
|
+
Log in to Microsoft 365 using a PEM certificate with `clientId` set in the configuration. Use the specified thumbprint.
|
|
112
132
|
|
|
113
133
|
```sh
|
|
114
134
|
m365 login --authType certificate --certificateFile /Users/user/dev/localhost.pem --thumbprint 47C4885736C624E90491F32B98855AA8A7562AF1
|
|
115
135
|
```
|
|
116
136
|
|
|
117
|
-
Log in to Microsoft 365 using a personal information exchange (.pfx) file
|
|
137
|
+
Log in to Microsoft 365 using a personal information exchange (.pfx) file with `CLIMICROSOFT365_ENTRAAPPID` environment variable set.
|
|
118
138
|
|
|
119
139
|
```sh
|
|
120
140
|
m365 login --authType certificate --certificateFile /Users/user/dev/localhost.pfx --password 'pass@word1'
|
|
121
141
|
```
|
|
122
142
|
|
|
123
|
-
Log in to Microsoft 365 using a personal information exchange (.pfx) file protected with an empty password
|
|
143
|
+
Log in to Microsoft 365 using a personal information exchange (.pfx) file protected with an empty password and `CLIMICROSOFT365_ENTRAAPPID` environment variable set.
|
|
124
144
|
|
|
125
145
|
```sh
|
|
126
146
|
m365 login --authType certificate --certificateFile /Users/user/dev/localhost.pfx --password
|
|
127
147
|
```
|
|
128
148
|
|
|
129
|
-
Log in to Microsoft 365 using a personal information exchange (.pfx) file not protected with a password
|
|
149
|
+
Log in to Microsoft 365 using a personal information exchange (.pfx) file not protected with a password and `CLIMICROSOFT365_ENTRAAPPID` environment variable set.
|
|
130
150
|
|
|
131
151
|
```sh
|
|
132
152
|
m365 login --authType certificate --certificateFile /Users/user/dev/localhost.pfx
|
|
133
153
|
```
|
|
134
154
|
|
|
135
|
-
Log in to Microsoft 365 using a personal information exchange (.pfx) file. Use the specified thumbprint
|
|
155
|
+
Log in to Microsoft 365 using a personal information exchange (.pfx) file. Use the specified thumbprint and `CLIMICROSOFT365_ENTRAAPPID` environment variable set.
|
|
136
156
|
|
|
137
157
|
```sh
|
|
138
158
|
m365 login --authType certificate --certificateFile /Users/user/dev/localhost.pfx --thumbprint 47C4885736C624E90491F32B98855AA8A7562AF1 --password 'pass@word1'
|
|
139
159
|
```
|
|
140
160
|
|
|
141
|
-
Log in to Microsoft 365 using a certificate from a base64-encoded string
|
|
161
|
+
Log in to Microsoft 365 using a certificate from a base64-encoded string with `CLIMICROSOFT365_ENTRAAPPID` environment variable set.
|
|
142
162
|
|
|
143
163
|
```sh
|
|
144
164
|
m365 login --authType certificate --certificateBase64Encoded MIII2QIBAzCCCJ8GCSqGSIb3DQEHAaCCCJAEg...eX1N5AgIIAA== --thumbprint D0C9B442DE249F55D10CDA1A2418952DC7D407A3
|
|
145
165
|
```
|
|
146
166
|
|
|
147
|
-
Log in to Microsoft 365 using a system assigned managed identity. Applies to Azure resources with managed identity enabled,
|
|
148
|
-
such as Azure Virtual Machines, Azure App Service or Azure Functions
|
|
167
|
+
Log in to Microsoft 365 using a system assigned managed identity with `clientId` set in the configuration. Applies to Azure resources with managed identity enabled, such as Azure Virtual Machines, Azure App Service or Azure Functions.
|
|
149
168
|
|
|
150
169
|
```sh
|
|
151
170
|
m365 login --authType identity
|
|
152
171
|
```
|
|
153
172
|
|
|
154
|
-
Log in to Microsoft 365 using managed identity in Azure Cloud Shell. Uses the identity of the current user.
|
|
173
|
+
Log in to Microsoft 365 using managed identity in Azure Cloud Shell with `clientId` set in the configuration. Uses the identity of the current user.
|
|
155
174
|
|
|
156
175
|
```sh
|
|
157
176
|
m365 login --authType identity
|
|
158
177
|
```
|
|
159
178
|
|
|
160
|
-
Log in to Microsoft 365 using a user-assigned managed identity. Client id or principal id also known as object id value can be specified in the `userName` option. Applies to Azure resources with managed identity enabled, such as Azure Virtual Machines, Azure App Service or Azure Functions
|
|
179
|
+
Log in to Microsoft 365 using a user-assigned managed identity with `clientId` set in the configuration. Client id or principal id also known as object id value can be specified in the `userName` option. Applies to Azure resources with managed identity enabled, such as Azure Virtual Machines, Azure App Service or Azure Functions.
|
|
161
180
|
|
|
162
181
|
```sh
|
|
163
182
|
m365 login --authType identity --userName ac9fbed5-804c-4362-a369-21a4ec51109e
|
|
164
183
|
```
|
|
165
184
|
|
|
166
|
-
Log in to Microsoft 365 using
|
|
167
|
-
|
|
168
|
-
```sh
|
|
169
|
-
m365 login --appId 31359c7f-bd7e-475c-86db-fdb8c937548c
|
|
170
|
-
```
|
|
171
|
-
|
|
172
|
-
Log in to Microsoft 365 using your own Microsoft Entra application that's restricted only to allow accounts from the specific tenant
|
|
173
|
-
|
|
174
|
-
```sh
|
|
175
|
-
m365 login --appId 31359c7f-bd7e-475c-86db-fdb8c937548c --tenant 31359c7f-bd7e-475c-86db-fdb8c937548a
|
|
176
|
-
```
|
|
177
|
-
|
|
178
|
-
Log in to Microsoft 365 using your own Microsoft Entra application and a personal information exchange (.pfx) file
|
|
179
|
-
|
|
180
|
-
```sh
|
|
181
|
-
m365 login --authType certificate --appId 31359c7f-bd7e-475c-86db-fdb8c937548c --tenant 31359c7f-bd7e-475c-86db-fdb8c937548a --certificateFile /Users/user/dev/localhost.pfx --password 'pass@word1'
|
|
182
|
-
```
|
|
183
|
-
|
|
184
|
-
Log in to Microsoft 365 using the interactive browser authentication. Uses the identity of the current user.
|
|
185
|
+
Log in to Microsoft 365 using the interactive browser authentication with `clientId` set in the configuration. Uses the identity of the current user.
|
|
185
186
|
|
|
186
187
|
```sh
|
|
187
188
|
m365 login --authType browser
|
|
188
189
|
```
|
|
189
190
|
|
|
190
|
-
Log in to Microsoft 365 using a client secret.
|
|
191
|
+
Log in to Microsoft 365 using a client secret with `clientId` set in the configuration.
|
|
191
192
|
|
|
192
193
|
```sh
|
|
193
194
|
m365 login --authType secret --secret topSeCr3t@007
|
|
@@ -29,7 +29,7 @@ m365 pp managementapp add [options]
|
|
|
29
29
|
|
|
30
30
|
## Remarks
|
|
31
31
|
|
|
32
|
-
To execute this command the first time you'll need sign in using the Microsoft Azure PowerShell
|
|
32
|
+
To execute this command the first time you'll need sign in using the Microsoft Azure PowerShell application registration. You can do this by executing `m365 login --appId 1950a258-227b-4e31-a9cf-717495945fc2`. To register the Microsoft Entra application registration that CLI for Microsoft 365 uses by default, execute `m365 pp managementapp add--appId 31359c7f-bd7e-475c-86db-fdb8c937548e`.
|
|
33
33
|
|
|
34
34
|
For best performance use the `appId` option to reference the Microsoft Entra application registration to update. If you use `objectId` or `name`, this command will first need to find the corresponding `appId` for that application.
|
|
35
35
|
|
|
@@ -108,6 +108,12 @@ m365 spo contenttype get --webUrl https://contoso.sharepoint.com/sites/contoso-s
|
|
|
108
108
|
"NewFormTarget": 0,
|
|
109
109
|
"NewFormTemplateName": "ListForm",
|
|
110
110
|
"NewFormUrl": "",
|
|
111
|
+
"Parent": {
|
|
112
|
+
"StringId": "0x01000B1208C5D23DF",
|
|
113
|
+
"Name": "Item",
|
|
114
|
+
"Group": "List items",
|
|
115
|
+
"Id": { "StringId": "0x01000B1208C5D23DF" }
|
|
116
|
+
},
|
|
111
117
|
"ReadOnly": false,
|
|
112
118
|
"SchemaXml": "<ContentType ID=\"0x01007926A45D687BA842B947286090B8F67D\" Name=\"PnP Alert\" Group=\"PnP Content Types\" Description=\"Create a new list item.\" Version=\"0\"><Folder TargetName=\"_cts/PnP Alert\" /><Fields><Field ID=\"{c042a256-787d-4a6f-8a8a-cf6ab767f12d}\" Name=\"ContentType\" SourceID=\"http://schemas.microsoft.com/sharepoint/v3\" StaticName=\"ContentType\" Group=\"_Hidden\" Type=\"Computed\" DisplayName=\"Content Type\" Sealed=\"TRUE\" Sortable=\"FALSE\" RenderXMLUsingPattern=\"TRUE\" PITarget=\"MicrosoftWindowsSharePointServices\" PIAttribute=\"ContentTypeID\" DelayActivateTemplateBinding=\"GROUP,SPSPERS,SITEPAGEPUBLISHING\" Customization=\"\"><FieldRefs><FieldRef ID=\"{03e45e84-1992-4d42-9116-26f756012634}\" Name=\"ContentTypeId\" /></FieldRefs><DisplayPattern><MapToContentType><Column Name=\"ContentTypeId\" /></MapToContentType></DisplayPattern></Field><Field ID=\"{fa564e0f-0c70-4ab9-b863-0177e6ddd247}\" Name=\"Title\" SourceID=\"http://schemas.microsoft.com/sharepoint/v3\" StaticName=\"Title\" Group=\"_Hidden\" Type=\"Text\" DisplayName=\"Title\" Required=\"TRUE\" FromBaseType=\"TRUE\" DelayActivateTemplateBinding=\"GROUP,SPSPERS,SITEPAGEPUBLISHING\" Customization=\"\" ShowInNewForm=\"TRUE\" ShowInEditForm=\"TRUE\"></Field></Fields><XmlDocuments><XmlDocument NamespaceURI=\"http://schemas.microsoft.com/sharepoint/v3/contenttype/forms\"><FormTemplates xmlns=\"http://schemas.microsoft.com/sharepoint/v3/contenttype/forms\"><Display>ListForm</Display><Edit>ListForm</Edit><New>ListForm</New></FormTemplates></XmlDocument></XmlDocuments></ContentType>",
|
|
113
119
|
"Scope": "/sites/contoso-sales",
|
|
@@ -170,7 +176,7 @@ m365 spo contenttype get --webUrl https://contoso.sharepoint.com/sites/contoso-s
|
|
|
170
176
|
|
|
171
177
|
Date: 10/2/2023
|
|
172
178
|
|
|
173
|
-
## PnP Alert (
|
|
179
|
+
## PnP Alert (0x01007926A45D687BA842B947286090B8F67D)
|
|
174
180
|
|
|
175
181
|
Property | Value
|
|
176
182
|
---------|-------
|
|
@@ -75,6 +75,12 @@ m365 spo contenttype list --webUrl "https://contoso.sharepoint.com/sites/contoso
|
|
|
75
75
|
"NewFormTarget": 0,
|
|
76
76
|
"NewFormTemplateName": "ListForm",
|
|
77
77
|
"NewFormUrl": "",
|
|
78
|
+
"Parent": {
|
|
79
|
+
"StringId": "0x01000B1208C5D23DF",
|
|
80
|
+
"Name": "Item",
|
|
81
|
+
"Group": "List items",
|
|
82
|
+
"Id": { "StringId": "0x01000B1208C5D23DF" }
|
|
83
|
+
},
|
|
78
84
|
"ReadOnly": false,
|
|
79
85
|
"SchemaXml": "<ContentType ID=\"0x01007926A45D687BA842B947286090B8F67D\" Name=\"PnP Alert\" Group=\"PnP Content Types\" Description=\"Create a new list item.\" Version=\"0\"><Folder TargetName=\"_cts/PnP Alert\" /><Fields><Field ID=\"{c042a256-787d-4a6f-8a8a-cf6ab767f12d}\" Name=\"ContentType\" SourceID=\"http://schemas.microsoft.com/sharepoint/v3\" StaticName=\"ContentType\" Group=\"_Hidden\" Type=\"Computed\" DisplayName=\"Content Type\" Sealed=\"TRUE\" Sortable=\"FALSE\" RenderXMLUsingPattern=\"TRUE\" PITarget=\"MicrosoftWindowsSharePointServices\" PIAttribute=\"ContentTypeID\" DelayActivateTemplateBinding=\"GROUP,SPSPERS,SITEPAGEPUBLISHING\" Customization=\"\"><FieldRefs><FieldRef ID=\"{03e45e84-1992-4d42-9116-26f756012634}\" Name=\"ContentTypeId\" /></FieldRefs><DisplayPattern><MapToContentType><Column Name=\"ContentTypeId\" /></MapToContentType></DisplayPattern></Field><Field ID=\"{fa564e0f-0c70-4ab9-b863-0177e6ddd247}\" Name=\"Title\" SourceID=\"http://schemas.microsoft.com/sharepoint/v3\" StaticName=\"Title\" Group=\"_Hidden\" Type=\"Text\" DisplayName=\"Title\" Required=\"TRUE\" FromBaseType=\"TRUE\" DelayActivateTemplateBinding=\"GROUP,SPSPERS,SITEPAGEPUBLISHING\" Customization=\"\" ShowInNewForm=\"TRUE\" ShowInEditForm=\"TRUE\"></Field></Fields><XmlDocuments><XmlDocument NamespaceURI=\"http://schemas.microsoft.com/sharepoint/v3/contenttype/forms\"><FormTemplates xmlns=\"http://schemas.microsoft.com/sharepoint/v3/contenttype/forms\"><Display>ListForm</Display><Edit>ListForm</Edit><New>ListForm</New></FormTemplates></XmlDocument></XmlDocuments></ContentType>",
|
|
80
86
|
"Scope": "/sites/contoso-sales",
|
|
@@ -108,7 +114,7 @@ m365 spo contenttype list --webUrl "https://contoso.sharepoint.com/sites/contoso
|
|
|
108
114
|
# spo contenttype list --webUrl "https://contoso.sharepoint.com/sites/contoso-sales"
|
|
109
115
|
|
|
110
116
|
Date: 10/2/2023
|
|
111
|
-
## PnP Alert (
|
|
117
|
+
## PnP Alert (0x01007926A45D687BA842B947286090B8F67D)
|
|
112
118
|
|
|
113
119
|
Property | Value
|
|
114
120
|
---------|-------
|
|
@@ -87,6 +87,12 @@ m365 spo list contenttype list --webUrl https://contoso.sharepoint.com/sites/pro
|
|
|
87
87
|
"NewFormTarget": 0,
|
|
88
88
|
"NewFormTemplateName": "ListForm",
|
|
89
89
|
"NewFormUrl": "",
|
|
90
|
+
"Parent": {
|
|
91
|
+
"StringId": "0x01000B1208C5D23DF",
|
|
92
|
+
"Name": "Item",
|
|
93
|
+
"Group": "List items",
|
|
94
|
+
"Id": { "StringId": "0x01000B1208C5D23DF" }
|
|
95
|
+
},
|
|
90
96
|
"ReadOnly": false,
|
|
91
97
|
"SchemaXml": "<ContentType ID=\"0x01000B1208C5D23DF44B9F1AEE7373DE9D5E\" Name=\"Item\" Group=\"List Content Types\" Description=\"Create a new list item.\" Version=\"0\" FeatureId=\"{695b6570-a48b-4a8e-8ea5-26ea7fc1d162}\" FeatureIds=\"{695b6570-a48b-4a8e-8ea5-26ea7fc1d162};{c94c1702-30a7-454c-be15-5a895223428d}\"><Folder TargetName=\"Item\"/><Fields><Field ID=\"{c042a256-787d-4a6f-8a8a-cf6ab767f12d}\" Type=\"Computed\" DisplayName=\"Content Type\" Name=\"ContentType\" DisplaceOnUpgrade=\"TRUE\" RenderXMLUsingPattern=\"TRUE\" Sortable=\"FALSE\" SourceID=\"http://schemas.microsoft.com/sharepoint/v3\" StaticName=\"ContentType\" Group=\"_Hidden\" PITarget=\"MicrosoftWindowsSharePointServices\" PIAttribute=\"ContentTypeID\" FromBaseType=\"TRUE\"><FieldRefs><FieldRef Name=\"ContentTypeId\"/></FieldRefs><DisplayPattern><MapToContentType><Column Name=\"ContentTypeId\"/></MapToContentType></DisplayPattern></Field><Field ID=\"{fa564e0f-0c70-4ab9-b863-0177e6ddd247}\" Type=\"Text\" Name=\"Title\" DisplayName=\"Title\" Required=\"TRUE\" SourceID=\"http://schemas.microsoft.com/sharepoint/v3\" StaticName=\"Title\" FromBaseType=\"TRUE\" ColName=\"nvarchar1\" ShowInNewForm=\"TRUE\" ShowInEditForm=\"TRUE\"/></Fields><XmlDocuments><XmlDocument NamespaceURI=\"http://schemas.microsoft.com/sharepoint/v3/contenttype/forms\"><FormTemplates xmlns=\"http://schemas.microsoft.com/sharepoint/v3/contenttype/forms\"><Display>ListForm</Display><Edit>ListForm</Edit><New>ListForm</New></FormTemplates></XmlDocument></XmlDocuments></ContentType>",
|
|
92
98
|
"Scope": "/Lists/Test",
|
|
@@ -121,7 +127,7 @@ m365 spo list contenttype list --webUrl https://contoso.sharepoint.com/sites/pro
|
|
|
121
127
|
|
|
122
128
|
Date: 2/20/2023
|
|
123
129
|
|
|
124
|
-
## Document (
|
|
130
|
+
## Document (0x01000B1208C5D23DF44B9F1AEE7373DE9D5E)
|
|
125
131
|
|
|
126
132
|
Property | Value
|
|
127
133
|
---------|-------
|
|
@@ -0,0 +1,61 @@
|
|
|
1
|
+
import Global from '/docs/cmd/_global.mdx';
|
|
2
|
+
import Tabs from '@theme/Tabs';
|
|
3
|
+
import TabItem from '@theme/TabItem';
|
|
4
|
+
|
|
5
|
+
# viva engage community set
|
|
6
|
+
|
|
7
|
+
Updates an existing Viva Engage community
|
|
8
|
+
|
|
9
|
+
## Usage
|
|
10
|
+
|
|
11
|
+
```sh
|
|
12
|
+
m365 viva engage community set [options]
|
|
13
|
+
```
|
|
14
|
+
|
|
15
|
+
## Options
|
|
16
|
+
|
|
17
|
+
```md definition-list
|
|
18
|
+
`-i, --id [id]`
|
|
19
|
+
: The id of the community. Specify either `id`, `displayName` or `entraGroupId`, but not multiple.
|
|
20
|
+
|
|
21
|
+
`-d, --displayName [displayName]`
|
|
22
|
+
: The name of the community. Specify either `id`, `displayName` or `entraGroupId`, but not multiple.
|
|
23
|
+
|
|
24
|
+
`--entraGroupId [entraGroupId]`
|
|
25
|
+
: The id of the Microsoft Entra group associated with the community. Specify either `id`, `displayName` or `entraGroupId`, but not multiple.
|
|
26
|
+
|
|
27
|
+
`--newDisplayName [newDisplayName]`
|
|
28
|
+
: New name for the community. The maximum length is 255 characters.
|
|
29
|
+
|
|
30
|
+
`--description [description]`
|
|
31
|
+
: The description of the community. The maximum length is 1024 characters.
|
|
32
|
+
|
|
33
|
+
`--privacy [privacy]`
|
|
34
|
+
: Defines the privacy level of the community. The possible values are: `public`, and `private`.
|
|
35
|
+
```
|
|
36
|
+
|
|
37
|
+
<Global />
|
|
38
|
+
|
|
39
|
+
## Examples
|
|
40
|
+
|
|
41
|
+
Update info about the community specified by id
|
|
42
|
+
|
|
43
|
+
```sh
|
|
44
|
+
m365 viva engage community set --id eyJfdHlwZSI6Ikdyb3VwIiwiaWQiOiI0NzY5MTM1ODIwOSJ9 --newDisplayName 'Developers' --description 'Community for all devs' --privacy public
|
|
45
|
+
```
|
|
46
|
+
|
|
47
|
+
Update info about the community specified by name
|
|
48
|
+
|
|
49
|
+
```sh
|
|
50
|
+
m365 viva engage community set --displayName 'Developrs' --newDisplayName 'Developers'
|
|
51
|
+
```
|
|
52
|
+
|
|
53
|
+
Update info about the community specified by Entra group id
|
|
54
|
+
|
|
55
|
+
```sh
|
|
56
|
+
m365 viva engage community set --entraGroupId '0bed8b86-5026-4a93-ac7d-56750cc099f1' --newDisplayName 'Developers'
|
|
57
|
+
```
|
|
58
|
+
|
|
59
|
+
## Response
|
|
60
|
+
|
|
61
|
+
The command won't return a response on success.
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@pnp/cli-microsoft365",
|
|
3
|
-
"version": "10.1.0-beta.
|
|
3
|
+
"version": "10.1.0-beta.6c6be23",
|
|
4
4
|
"description": "Manage Microsoft 365 and SharePoint Framework projects on any platform",
|
|
5
5
|
"license": "MIT",
|
|
6
6
|
"main": "./dist/api.js",
|
|
@@ -28,7 +28,7 @@
|
|
|
28
28
|
"test:version": "node scripts/check-version.js",
|
|
29
29
|
"test:cov": "c8 npm run test:test",
|
|
30
30
|
"test:test": "mocha",
|
|
31
|
-
"lint": "eslint --ext .ts src"
|
|
31
|
+
"lint": "eslint --ext .ts src --cache --cache-strategy content"
|
|
32
32
|
},
|
|
33
33
|
"keywords": [
|
|
34
34
|
"adaptive card",
|