You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This reverse engineers the REST API for Application Insights so that
we no longer need to download / depend on the 3 .dll files that were
necessary to use the Application Insights .NET SDK.
This is directly benefitting from the work that was done for
PowerShellForGitHub (see microsoft/PowerShellForGitHub#186)
During execution of a command, when StoreBroker has need for an object from one of these dll's,
175
169
if it cannot find the dll, it will automatically download nuget.exe, then download the nuget
176
170
package that the assembly is in, and finally cache it for the duration of your PowerShell session.
@@ -205,7 +199,7 @@ To initially configure StoreBroker with your Developer Account:
205
199
206
200
2. You must [associate your AAD with your Dev Center account](https://msdn.microsoft.com/windows/uwp/monetize/create-and-manage-submissions-using-windows-store-services#associate-an-azure-ad-application-with-your-windows-dev-center-account)
207
201
to obtain the credentials to allow StoreBroker to access your account and perform actions on
208
-
your behalf.
202
+
your behalf.
209
203
210
204
3. The app you want to publish must already exist. The Windows Store Submission API can only
211
205
publish updates to existing applications. You can
@@ -217,7 +211,7 @@ To initially configure StoreBroker with your Developer Account:
> Refer to that documentation for additional prerequisites.
223
217
@@ -248,10 +242,10 @@ To get those values:
248
242
account, and assign it the **Manager** role. If this application already exists in your AAD,
249
243
you can select it on the **Add Azure AD applications** page to add it to your Dev Center account.
250
244
Otherwise, you can create a new AAD application on the **Add Azure AD applications** page.
251
-
For more information, see [Add and manage Azure AD applications](https://msdn.microsoft.com/windows/uwp/publish/manage-account-users#add-and-manage-azure-ad-applications).
245
+
For more information, see [Add and manage Azure AD applications](https://msdn.microsoft.com/windows/uwp/publish/manage-account-users#add-and-manage-azure-ad-applications).
252
246
253
247
3. Return to the **Manage users** page, click the name of your Azure AD application to go to the
254
-
application settings, and copy the **Tenant ID** and **Client ID** values.
248
+
application settings, and copy the **Tenant ID** and **Client ID** values.
255
249
256
250
4. Click **Add new key**. On the following screen, copy the **Key** value, which corresponds to the
257
251
**Client secret**. You *will not* be able to access this info again after you leave this page,
@@ -292,12 +286,12 @@ One way to do this would be the following:
292
286
3. Now you can store the password somewhere on disk securely. Doing this will encrypt the
293
287
password into a plain-text file, and only the same user logged-in to the exact same computer
0 commit comments