Skip to content

Commit 099ffef

Browse files
committed
Merge branch 'yo-office-prerelease' into yo-office
2 parents 7ac0ac6 + 023ad32 commit 099ffef

File tree

11 files changed

+16467
-7400
lines changed

11 files changed

+16467
-7400
lines changed

.vscode/launch.json

Lines changed: 4 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,7 @@
2121
"${workspaceFolder}/test/end-to-end/*.ts"
2222
],
2323
"internalConsoleOptions": "openOnSessionStart",
24-
"runtimeArgs": [
25-
"--preserve-symlinks"
26-
]
24+
"runtimeArgs": ["--preserve-symlinks"]
2725
},
2826
{
2927
"name": "Debug Unit Tests",
@@ -42,9 +40,7 @@
4240
"${workspaceFolder}/test/unit/*.test.ts"
4341
],
4442
"internalConsoleOptions": "openOnSessionStart",
45-
"runtimeArgs": [
46-
"--preserve-symlinks"
47-
]
43+
"runtimeArgs": ["--preserve-symlinks"]
4844
},
4945
{
5046
"name": "Excel Desktop (Custom Functions)",
@@ -58,9 +54,8 @@
5854
},
5955
{
6056
"name": "Excel Desktop (Edge Chromium)",
61-
"type": "pwa-msedge",
57+
"type": "msedge",
6258
"request": "attach",
63-
"useWebView": true,
6459
"port": 9229,
6560
"timeout": 600000,
6661
"webRoot": "${workspaceRoot}",
@@ -91,7 +86,7 @@
9186
},
9287
{
9388
"name": "Office Online (Edge Chromium)",
94-
"type": "pwa-msedge",
89+
"type": "msedge",
9590
"request": "launch",
9691
"port": 9222,
9792
// To debug your Add-in:

.vscode/tasks.json

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -57,10 +57,7 @@
5757
"clear": true,
5858
"panel": "dedicated"
5959
},
60-
"problemMatcher": [],
61-
"runOptions": {
62-
"runOn": "folderOpen"
63-
}
60+
"problemMatcher": []
6461
},
6562
{
6663
"label": "Install",

SECURITY.md

Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
<!-- BEGIN MICROSOFT SECURITY.MD V0.0.8 BLOCK -->
2+
3+
## Security
4+
5+
Microsoft takes the security of our software products and services seriously, which includes all source code repositories managed through our GitHub organizations, which include [Microsoft](https://github.com/microsoft), [Azure](https://github.com/Azure), [DotNet](https://github.com/dotnet), [AspNet](https://github.com/aspnet), [Xamarin](https://github.com/xamarin), and [our GitHub organizations](https://opensource.microsoft.com/).
6+
7+
If you believe you have found a security vulnerability in any Microsoft-owned repository that meets [Microsoft's definition of a security vulnerability](https://aka.ms/opensource/security/definition), please report it to us as described below.
8+
9+
## Reporting Security Issues
10+
11+
**Please do not report security vulnerabilities through public GitHub issues.**
12+
13+
Instead, please report them to the Microsoft Security Response Center (MSRC) at [https://msrc.microsoft.com/create-report](https://aka.ms/opensource/security/create-report).
14+
15+
If you prefer to submit without logging in, send email to [secure@microsoft.com](mailto:secure@microsoft.com). If possible, encrypt your message with our PGP key; please download it from the [Microsoft Security Response Center PGP Key page](https://aka.ms/opensource/security/pgpkey).
16+
17+
You should receive a response within 24 hours. If for some reason you do not, please follow up via email to ensure we received your original message. Additional information can be found at [microsoft.com/msrc](https://aka.ms/opensource/security/msrc).
18+
19+
Please include the requested information listed below (as much as you can provide) to help us better understand the nature and scope of the possible issue:
20+
21+
* Type of issue (e.g. buffer overflow, SQL injection, cross-site scripting, etc.)
22+
* Full paths of source file(s) related to the manifestation of the issue
23+
* The location of the affected source code (tag/branch/commit or direct URL)
24+
* Any special configuration required to reproduce the issue
25+
* Step-by-step instructions to reproduce the issue
26+
* Proof-of-concept or exploit code (if possible)
27+
* Impact of the issue, including how an attacker might exploit the issue
28+
29+
This information will help us triage your report more quickly.
30+
31+
If you are reporting for a bug bounty, more complete reports can contribute to a higher bounty award. Please visit our [Microsoft Bug Bounty Program](https://aka.ms/opensource/security/bounty) page for more details about our active programs.
32+
33+
## Preferred Languages
34+
35+
We prefer all communications to be in English.
36+
37+
## Policy
38+
39+
Microsoft follows the principle of [Coordinated Vulnerability Disclosure](https://aka.ms/opensource/security/cvd).
40+
41+
<!-- END MICROSOFT SECURITY.MD BLOCK -->

manifest.xml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -89,9 +89,9 @@
8989
<bt:Image id="Icon.80x80" DefaultValue="https://localhost:3000/assets/icon-80.png"/>
9090
</bt:Images>
9191
<bt:Urls>
92-
<bt:Url id="Functions.Script.Url" DefaultValue="https://localhost:3000/dist/functions.js" />
93-
<bt:Url id="Functions.Metadata.Url" DefaultValue="https://localhost:3000/dist/functions.json" />
94-
<bt:Url id="Functions.Page.Url" DefaultValue="https://localhost:3000/dist/functions.html" />
92+
<bt:Url id="Functions.Script.Url" DefaultValue="https://localhost:3000/public/functions.js" />
93+
<bt:Url id="Functions.Metadata.Url" DefaultValue="https://localhost:3000/public/functions.json" />
94+
<bt:Url id="Functions.Page.Url" DefaultValue="https://localhost:3000/public/functions.html" />
9595
<bt:Url id="GetStarted.LearnMoreUrl" DefaultValue="https://go.microsoft.com/fwlink/?LinkId=276812" />
9696
<bt:Url id="Commands.Url" DefaultValue="https://localhost:3000/commands.html" />
9797
<bt:Url id="Taskpane.Url" DefaultValue="https://localhost:3000/taskpane.html" />

0 commit comments

Comments
 (0)