-
Notifications
You must be signed in to change notification settings - Fork 38
Add New-EntraServicePrincipalKeyCredential #1487
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
KenitoInc
merged 25 commits into
main
from
dbutoyi/New-EntraServicePrincipalKeyCredential
Jul 16, 2025
Merged
Changes from all commits
Commits
Show all changes
25 commits
Select commit
Hold shift + click to select a range
c906d57
add New-EntraServicePrincipalKeyCredential
37be4b6
refactor and add tests for New-EntraServicePrincipalKeyCredentials
f8e26c2
refactors
cca8030
refactors add tests
47367dc
fix failing tests
d57bc74
fix response type entra beta key credential
eb436cb
restore add Password credential tests
722d14c
refactors
ecb7f5b
refactors
205e702
add New-EntraServicePrincipalKeyCredential
795020b
refactor and add tests for New-EntraServicePrincipalKeyCredentials
3da0889
refactors
4878083
refactors add tests
3154ee1
fix failing tests
08c88dd
fix response type entra beta key credential
335a780
restore add Password credential tests
8d45c2e
refactors
5344dc5
refactors
f05a8c8
work on PR feedbacks
b77ac96
merge master
3f27976
fix wrong date keys in KeyCredential
6cfcf8d
Merge branch 'main' into dbutoyi/New-EntraServicePrincipalKeyCredential
KenitoInc d8fcae6
add licence
b6d7593
Merge branch 'dbutoyi/New-EntraServicePrincipalKeyCredential' of http…
655c361
Merge branch 'main' into dbutoyi/New-EntraServicePrincipalKeyCredential
KenitoInc File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
92 changes: 92 additions & 0 deletions
92
module/Entra/Microsoft.Entra/Applications/New-EntraServicePrincipalKeyCredential.ps1
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,92 @@ | ||
| # ------------------------------------------------------------------------------ | ||
| # Copyright (c) Microsoft Corporation. All Rights Reserved. | ||
| # Licensed under the MIT License. See License in the project root for license information. | ||
| # ------------------------------------------------------------------------------ | ||
| function New-EntraServicePrincipalKeyCredential { | ||
| [CmdletBinding()] | ||
| param ( | ||
| [Parameter(Mandatory = $true, HelpMessage = "Specifies the unique identifier (ObjectId) of the service principal to which the key credential will be added.")] | ||
| [Alias("ObjectId")] | ||
| [ValidateNotNullOrEmpty()] | ||
| [System.String]$ServicePrincipalId, | ||
|
|
||
| [Parameter(Mandatory = $true, ValueFromPipeline = $true, ValueFromPipelineByPropertyName = $true, | ||
| HelpMessage = "Specifies the value for the public key encoded in Base64.")] | ||
| [System.String]$Value, | ||
|
|
||
| [Parameter(Mandatory = $true, ValueFromPipeline = $true, HelpMessage = "Specifies the type of key credential (e.g., AsymmetricX509Cert, Symmetric).")] | ||
| [ValidateSet('AsymmetricX509Cert', 'X509CertAndPassword')] | ||
KenitoInc marked this conversation as resolved.
Show resolved
Hide resolved
|
||
| [System.String]$Type, | ||
|
|
||
| [Parameter(Mandatory = $true, ValueFromPipeline = $true, HelpMessage = "Specifies the usage of the key credential (e.g., Sign, Verify).")] | ||
| [ValidateSet('Sign', 'Verify')] | ||
KenitoInc marked this conversation as resolved.
Show resolved
Hide resolved
|
||
| [System.String]$Usage, | ||
|
|
||
| [Parameter(Mandatory = $true, ValueFromPipeline = $true, HelpMessage = "A self-signed JWT token used as a proof of possession of the existing keys. This JWT token must be signed with a private key that corresponds to one of the existing valid certificates associated with the servicePrincipal.")] | ||
| [System.String]$Proof, | ||
DButoyez marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
|
||
| [Parameter(ValueFromPipeline = $true, ValueFromPipelineByPropertyName = $true, HelpMessage = "Specifies a custom identifier for the key credential.")] | ||
| [System.String] $CustomKeyIdentifier, | ||
|
|
||
| [Parameter(ValueFromPipeline = $true, ValueFromPipelineByPropertyName = $true, HelpMessage = "Specifies the time when the key becomes valid as a DateTime object.")] | ||
| [System.Nullable[System.DateTime]] $StartDate, | ||
|
|
||
| [Parameter(ValueFromPipeline = $true, ValueFromPipelineByPropertyName = $true, | ||
| HelpMessage = "Specifies the time when the key becomes invalid as a DateTime object.")] | ||
| [System.Nullable[System.DateTime]] $EndDate | ||
| ) | ||
|
|
||
| begin { | ||
| # Ensure connection to Microsoft Entra | ||
| if (-not (Get-EntraContext)) { | ||
| $errorMessage = "Not connected to Microsoft Graph. Use 'Connect-Entra -Scopes User.Read.All' to authenticate." | ||
| Write-Error -Message $errorMessage -ErrorAction Stop | ||
| return | ||
| } | ||
| } | ||
|
|
||
| PROCESS { | ||
|
|
||
| $customHeaders = New-EntraCustomHeaders -Command $MyInvocation.MyCommand | ||
| $customHeaders['Content-Type'] = 'application/json' | ||
| $baseUri = '/v1.0/servicePrincipals' | ||
| $URI = "$baseUri/$ServicePrincipalId/addKey" | ||
|
|
||
| $params = @{ | ||
| keyCredential = @{ | ||
| type = $Type | ||
| usage = $Usage | ||
| key = $Value | ||
| startDateTime = $StartDate | ||
| endDateTime = $EndDate | ||
| customKeyIdentifier = $CustomKeyIdentifier | ||
| } | ||
| passwordCredential = $null | ||
| proof = $Proof | ||
| } | ||
|
|
||
| Write-Debug("============================ TRANSFORMATIONS ============================") | ||
| $params.Keys | ForEach-Object { "$_ : $($params[$_])" } | Write-Debug | ||
| Write-Debug("=========================================================================`n") | ||
| $tesy = ($params | ConvertTo-Json -Depth 4) | ||
|
|
||
| try { | ||
| $response = Invoke-GraphRequest -Headers $customHeaders -Uri $URI -Method "POST" -Body ($params | ConvertTo-Json -Depth 4) | ||
|
|
||
| $targetTypeList = @() | ||
| foreach ($data in $response) { | ||
| $target = New-Object Microsoft.Graph.PowerShell.Models.MicrosoftGraphKeyCredential | ||
| $data.PSObject.Properties | ForEach-Object { | ||
| $propertyName = $_.Name.Substring(0, 1).ToUpper() + $_.Name.Substring(1) | ||
| $propertyValue = $_.Value | ||
| $target | Add-Member -MemberType NoteProperty -Name $propertyName -Value $propertyValue -Force | ||
| } | ||
| $targetTypeList += $target | ||
| } | ||
| $targetTypeList | ||
| } | ||
| catch { | ||
| Write-Error "Failed to add key credential: $($_)" | ||
| } | ||
| } | ||
| } | ||
90 changes: 90 additions & 0 deletions
90
...ntraBeta/Microsoft.Entra.Beta/Applications/New-EntraBetaServicePrincipalKeyCredential.ps1
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,90 @@ | ||
| # ------------------------------------------------------------------------------ | ||
| # Copyright (c) Microsoft Corporation. All Rights Reserved. | ||
| # Licensed under the MIT License. See License in the project root for license information. | ||
| # ------------------------------------------------------------------------------ | ||
| function New-EntraBetaServicePrincipalKeyCredential { | ||
DButoyez marked this conversation as resolved.
Show resolved
Hide resolved
|
||
| [CmdletBinding()] | ||
| param ( | ||
| [Parameter(Mandatory = $true, HelpMessage = "Specifies the unique identifier (ObjectId) of the service principal to which the key credential will be added.")] | ||
| [Alias("ObjectId")] | ||
| [ValidateNotNullOrEmpty()] | ||
| [System.String]$ServicePrincipalId, | ||
|
|
||
| [Parameter(Mandatory = $true, ValueFromPipeline = $true, ValueFromPipelineByPropertyName = $true, | ||
| HelpMessage = "Specifies the value for the public key encoded in Base64.")] | ||
| [System.String]$Value, | ||
|
|
||
| [Parameter(Mandatory = $true, ValueFromPipeline = $true, HelpMessage = "Specifies the type of key credential (e.g., AsymmetricX509Cert, Symmetric).")] | ||
| [ValidateSet('AsymmetricX509Cert', 'X509CertAndPassword')] | ||
| [System.String]$Type, | ||
|
|
||
| [Parameter(Mandatory = $true, ValueFromPipeline = $true, HelpMessage = "Specifies the usage of the key credential (e.g., Sign, Verify).")] | ||
| [ValidateSet('Sign', 'Verify')] | ||
| [System.String]$Usage, | ||
|
|
||
| [Parameter(Mandatory = $true, ValueFromPipeline = $true, HelpMessage = "A self-signed JWT token used as a proof of possession of the existing keys. This JWT token must be signed with a private key that corresponds to one of the existing valid certificates associated with the servicePrincipal.")] | ||
| [System.String]$Proof, | ||
|
|
||
| [Parameter(ValueFromPipeline = $true, ValueFromPipelineByPropertyName = $true, HelpMessage = "Specifies a custom identifier for the key credential.")] | ||
| [System.String] $CustomKeyIdentifier, | ||
|
|
||
| [Parameter(ValueFromPipeline = $true, ValueFromPipelineByPropertyName = $true, HelpMessage = "Specifies the time when the key becomes valid as a DateTime object.")] | ||
| [System.Nullable[System.DateTime]] $StartDate, | ||
|
|
||
| [Parameter(ValueFromPipeline = $true, ValueFromPipelineByPropertyName = $true, | ||
| HelpMessage = "Specifies the time when the key becomes invalid as a DateTime object.")] | ||
| [System.Nullable[System.DateTime]] $EndDate | ||
| ) | ||
|
|
||
| begin { | ||
| # Ensure connection to Microsoft Entra | ||
| if (-not (Get-EntraContext)) { | ||
| $errorMessage = "Not connected to Microsoft Graph. Use 'Connect-Entra -Scopes User.Read.All' to authenticate." | ||
| Write-Error -Message $errorMessage -ErrorAction Stop | ||
| return | ||
| } | ||
| } | ||
|
|
||
| PROCESS { | ||
|
|
||
| $customHeaders = New-EntraBetaCustomHeaders -Command $MyInvocation.MyCommand | ||
| $customHeaders['Content-Type'] = 'application/json' | ||
| $baseUri = '/beta/servicePrincipals' | ||
| $URI = "$baseUri/$ServicePrincipalId/addKey" | ||
|
|
||
| $params = @{ | ||
| keyCredential = @{ | ||
| type = $Type | ||
| usage = $Usage | ||
| key = $Value | ||
| startDateTime = $StartDate | ||
| endDateTime = $EndDate | ||
| customKeyIdentifier = $CustomKeyIdentifier | ||
| } | ||
| passwordCredential = $null | ||
| proof = $Proof | ||
| } | ||
|
|
||
| Write-Debug("============================ TRANSFORMATIONS ============================") | ||
| $params.Keys | ForEach-Object { "$_ : $($params[$_])" } | Write-Debug | ||
| Write-Debug("=========================================================================`n") | ||
|
|
||
| try { | ||
| $response = Invoke-GraphRequest -Headers $customHeaders -Uri $URI -Method "POST" -Body ($params | ConvertTo-Json -Depth 4) | ||
| $targetTypeList = @() | ||
| foreach ($data in $response) { | ||
| $target = New-Object Microsoft.Graph.Beta.PowerShell.Models.MicrosoftGraphKeyCredential | ||
| $data.PSObject.Properties | ForEach-Object { | ||
| $propertyName = $_.Name.Substring(0, 1).ToUpper() + $_.Name.Substring(1) | ||
| $propertyValue = $_.Value | ||
| $target | Add-Member -MemberType NoteProperty -Name $propertyName -Value $propertyValue -Force | ||
| } | ||
| $targetTypeList += $target | ||
| } | ||
| $targetTypeList | ||
| } | ||
| catch { | ||
| Write-Error "Failed to add key credential: $($_)" | ||
| } | ||
| } | ||
| } | ||
73 changes: 73 additions & 0 deletions
73
test/Entra/Applications/New-EntraServicePrincipalKeyCredential.Tests.ps1
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,73 @@ | ||
| # ------------------------------------------------------------------------------ | ||
| # Copyright (c) Microsoft Corporation. All Rights Reserved. Licensed under the MIT License. See License in the project root for license information. | ||
| # ------------------------------------------------------------------------------ | ||
| BeforeAll { | ||
| if ((Get-Module -Name Microsoft.Entra.Applications) -eq $null) { | ||
| Import-Module Microsoft.Entra.Applications | ||
| } | ||
| Import-Module (Join-Path $PSScriptRoot "..\..\Common-Functions.ps1") -Force | ||
|
|
||
| $response = @{ | ||
| "@odata.context" = 'https://graph.microsoft.com/v1.0/$metadata#microsoft.graph.keyCredential' | ||
| "customKeyIdentifier" = $null | ||
| "endDateTime" = "01/15/2027 14:22:00" | ||
| "key" = $null | ||
| "keyId" = "aaaaaaaa-0b0b-1c1c-2d2d-333333" | ||
| "startDateTime" = "01/15/2025 14:22:00" | ||
| "type" = "AsymmetricX509Cert" | ||
| "usage" = "Verify" | ||
| } | ||
|
|
||
| Mock -CommandName Invoke-MgGraphRequest -MockWith { $response } -ModuleName Microsoft.Entra.Applications | ||
| Mock -CommandName Get-EntraContext -MockWith { @{Scopes = @("Application.ReadWrite.All") } } -ModuleName Microsoft.Entra.Applications | ||
| } | ||
|
|
||
| Describe "New-EntraServicePrincipalKeyCredential" { | ||
| Context "Test for New-EntraServicePrincipalKeyCredential" { | ||
|
|
||
| It "Should fail when ServicePrincipalId is null" { | ||
| { New-EntraServicePrincipalKeyCredential -ServicePrincipalId -Value "U29mdHdhcmU=" -Type "AsymmetricX509Cert" -Usage "Verify" -Proof "c29tZVByb29m" } | Should -Throw "Missing an argument for parameter 'ServicePrincipalId'*" | ||
| } | ||
|
|
||
| It "Should fail when ServicePrincipalId is empty" { | ||
| { New-EntraServicePrincipalKeyCredential -ServicePrincipalId ""} | Should -Throw "Cannot validate argument on parameter 'ServicePrincipalId'. The argument is null or empty. Provide an argument that is not null or empty, and then try the command again." | ||
| } | ||
|
|
||
| It "Should fail when proof is empty" { | ||
| { New-EntraServicePrincipalKeyCredential -ServicePrincipalId "aaaaaaaa-2222-1111-1111-cccccccccccc" -Value "U29mdHdhcmU=" -Type "AsymmetricX509Cert" -Usage "Verify" -Proof ""} | Should -Throw "Cannot bind argument to parameter 'Proof' because it is an empty string." | ||
| } | ||
|
|
||
| It "Should return created service principal key credential when ServicePrincipalId is valid and all required parameters are provided" { | ||
| $result = New-EntraServicePrincipalKeyCredential -ServicePrincipalId "aaaaaaaa-2222-1111-1111-cccccccccccc" -Value "U29mdHdhcmU=" -Type "AsymmetricX509Cert" -Usage "Verify" -Proof "c29tZVByb29m" | ||
| $result | Should -Not -BeNullOrEmpty | ||
|
|
||
| Should -Invoke -CommandName Invoke-MgGraphRequest -ModuleName Microsoft.Entra.Applications -Times 1 | ||
| } | ||
|
|
||
| It "Should contain 'User-Agent' header" { | ||
| $userAgentHeaderValue = "PowerShell/$psVersion EntraPowershell/$entraVersion New-EntraServicePrincipalKeyCredential" | ||
| $result = New-EntraServicePrincipalKeyCredential -ServicePrincipalId "aaaaaaaa-2222-1111-1111-cccccccccccc" -Value "U29mdHdhcmU=" -Type "AsymmetricX509Cert" -Usage "Verify" -Proof "c29tZVByb29m" | ||
| $result | Should -Not -BeNullOrEmpty | ||
| $userAgentHeaderValue = "PowerShell/$psVersion EntraPowershell/$entraVersion New-EntraServicePrincipalKeyCredential" | ||
| Should -Invoke -CommandName Invoke-GraphRequest -ModuleName Microsoft.Entra.Applications -Times 1 -ParameterFilter { | ||
| $Headers.'User-Agent' | Should -Be $userAgentHeaderValue | ||
| $true | ||
| } | ||
| } | ||
|
|
||
| It "Should execute successfully without throwing an error" { | ||
| # Disable confirmation prompts | ||
| $originalDebugPreference = $DebugPreference | ||
| $DebugPreference = 'Continue' | ||
| try { | ||
| # Act & Assert: Ensure the function doesn't throw an exception | ||
| { New-EntraServicePrincipalKeyCredential -ServicePrincipalId "aaaaaaaa-2222-1111-1111-cccccccccccc" -Value "U29mdHdhcmU=" -Type "AsymmetricX509Cert" -Usage "Verify" -Proof "c29tZVByb29m" -Debug } | Should -Not -Throw | ||
| } | ||
| finally { | ||
| # Restore original confirmation preference | ||
| $DebugPreference = $originalDebugPreference | ||
| } | ||
| } | ||
| } | ||
|
|
||
| } |
73 changes: 73 additions & 0 deletions
73
test/EntraBeta/Applications/New-EntraBetaServicePrincipalKeyCredentials.Tests.ps1
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,73 @@ | ||
| # ------------------------------------------------------------------------------ | ||
| # Copyright (c) Microsoft Corporation. All Rights Reserved. Licensed under the MIT License. See License in the project root for license information. | ||
| # ------------------------------------------------------------------------------ | ||
| BeforeAll { | ||
| if ((Get-Module -Name Microsoft.Entra.Beta.Applications) -eq $null) { | ||
| Import-Module Microsoft.Entra.Beta.Applications | ||
| } | ||
| Import-Module (Join-Path $PSScriptRoot "..\..\Common-Functions.ps1") -Force | ||
|
|
||
| $response = @{ | ||
| "@odata.context" = 'https://graph.microsoft.com/v1.0/$metadata#microsoft.graph.keyCredential' | ||
| "customKeyIdentifier" = $null | ||
| "endDateTime" = "01/15/2027 14:22:00" | ||
| "key" = $null | ||
| "keyId" = "aaaaaaaa-0b0b-1c1c-2d2d-333333" | ||
| "startDateTime" = "01/15/2025 14:22:00" | ||
| "type" = "AsymmetricX509Cert" | ||
| "usage" = "Verify" | ||
| } | ||
|
|
||
| Mock -CommandName Invoke-MgGraphRequest -MockWith { $response } -ModuleName Microsoft.Entra.Beta.Applications | ||
| Mock -CommandName Get-EntraContext -MockWith { @{Scopes = @("Application.ReadWrite.All") } } -ModuleName Microsoft.Entra.Beta.Applications | ||
| } | ||
|
|
||
| Describe "New-EntraBetaServicePrincipalKeyCredential" { | ||
| Context "Test for New-EntraBetaServicePrincipalKeyCredential" { | ||
|
|
||
| It "Should fail when ServicePrincipalId is null" { | ||
| { New-EntraBetaServicePrincipalKeyCredential -ServicePrincipalId -Value "U29mdHdhcmU=" -Type "AsymmetricX509Cert" -Usage "Verify" -Proof "c29tZVByb29m" } | Should -Throw "Missing an argument for parameter 'ServicePrincipalId'*" | ||
| } | ||
|
|
||
| It "Should fail when ServicePrincipalId is empty" { | ||
| { New-EntraBetaServicePrincipalKeyCredential -ServicePrincipalId ""} | Should -Throw "Cannot validate argument on parameter 'ServicePrincipalId'. The argument is null or empty. Provide an argument that is not null or empty, and then try the command again." | ||
| } | ||
|
|
||
| It "Should fail when proof is empty" { | ||
| { New-EntraBetaServicePrincipalKeyCredential -ServicePrincipalId "aaaaaaaa-2222-1111-1111-cccccccccccc" -Value "U29mdHdhcmU=" -Type "AsymmetricX509Cert" -Usage "Verify" -Proof ""} | Should -Throw "Cannot bind argument to parameter 'Proof' because it is an empty string." | ||
| } | ||
|
|
||
| It "Should return created service principal key credential when ServicePrincipalId is valid and all required parameters are provided" { | ||
| $result = New-EntraBetaServicePrincipalKeyCredential -ServicePrincipalId "aaaaaaaa-2222-1111-1111-cccccccccccc" -Value "U29mdHdhcmU=" -Type "AsymmetricX509Cert" -Usage "Verify" -Proof "c29tZVByb29m" | ||
| $result | Should -Not -BeNullOrEmpty | ||
|
|
||
| Should -Invoke -CommandName Invoke-MgGraphRequest -ModuleName Microsoft.Entra.Beta.Applications -Times 1 | ||
| } | ||
|
|
||
| It "Should contain 'User-Agent' header" { | ||
| $userAgentHeaderValue = "PowerShell/$psVersion EntraPowershell/$entraVersion New-EntraBetaServicePrincipalKeyCredential" | ||
| $result = New-EntraBetaServicePrincipalKeyCredential -ServicePrincipalId "aaaaaaaa-2222-1111-1111-cccccccccccc" -Value "U29mdHdhcmU=" -Type "AsymmetricX509Cert" -Usage "Verify" -Proof "c29tZVByb29m" | ||
| $result | Should -Not -BeNullOrEmpty | ||
| $userAgentHeaderValue = "PowerShell/$psVersion EntraPowershell/$entraVersion New-EntraBetaServicePrincipalKeyCredential" | ||
| Should -Invoke -CommandName Invoke-GraphRequest -ModuleName Microsoft.Entra.Beta.Applications -Times 1 -ParameterFilter { | ||
| $Headers.'User-Agent' | Should -Be $userAgentHeaderValue | ||
| $true | ||
| } | ||
| } | ||
|
|
||
| It "Should execute successfully without throwing an error" { | ||
| # Disable confirmation prompts | ||
| $originalDebugPreference = $DebugPreference | ||
| $DebugPreference = 'Continue' | ||
| try { | ||
| # Act & Assert: Ensure the function doesn't throw an exception | ||
| { New-EntraBetaServicePrincipalKeyCredential -ServicePrincipalId "aaaaaaaa-2222-1111-1111-cccccccccccc" -Value "U29mdHdhcmU=" -Type "AsymmetricX509Cert" -Usage "Verify" -Proof "c29tZVByb29m" -Debug } | Should -Not -Throw | ||
| } | ||
| finally { | ||
| # Restore original confirmation preference | ||
| $DebugPreference = $originalDebugPreference | ||
| } | ||
| } | ||
| } | ||
|
|
||
| } |
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.