From 4b55079e13fce1a8388649689fce29b72a3c7c58 Mon Sep 17 00:00:00 2001 From: Stephen Von Takach Date: Tue, 1 Apr 2025 12:36:19 +0000 Subject: [PATCH 1/5] GITBOOK-234: No subject --- tutorials/backend/write-a-driver/README.md | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/tutorials/backend/write-a-driver/README.md b/tutorials/backend/write-a-driver/README.md index af30470..687fa11 100644 --- a/tutorials/backend/write-a-driver/README.md +++ b/tutorials/backend/write-a-driver/README.md @@ -17,7 +17,7 @@ From a driver structure standpoint there is no difference between these types. * The same driver works over a TCP, UDP or SSH transport * All drivers support HTTP methods (except logic modules) * for example a websocket driver or tcp driver will also be provided a default HTTP client at the base URI of the websocket and IP address of the tcp driver. - * this default client URL can be overwritten, for example where the [HTTP port](https://github.com/PlaceOS/drivers/blob/master/drivers/aver/cam520\_pro.cr#L43-L45) is different to the websocket port\ + * this default client URL can be overwritten, for example where the [HTTP port](https://github.com/PlaceOS/drivers/blob/master/drivers/aver/cam520_pro.cr#L43-L45) is different to the websocket port\ `transport.http_uri_override = URI.new` * All drivers have access to logic helpers when associated with a System @@ -207,7 +207,9 @@ sys.count("Module") #=> 3 sys.implementing(PlaceOS::Driver::Interface::Powerable) #=> ["Camera", "Display"] # Look at status on a remote module -system[:Display][:power] #=> true +system[:Display][:power] #=> true (JSON::Any) +system[:Display].status(Bool, :power) #=> true (Bool) +system[:Display].status?(Bool, :power) #=> true (Bool | Nil) # Access a different module index system[:Display_2][:power] From f6bdbd52ad43ede1c340ebbd410d55266bf1d7ff Mon Sep 17 00:00:00 2001 From: Jeremy West Date: Tue, 17 Jun 2025 07:15:48 +0000 Subject: [PATCH 2/5] GITBOOK-235: No subject From 798fdcaade2034e298c72b16fe65622fbfa53bf3 Mon Sep 17 00:00:00 2001 From: William Le Date: Tue, 15 Jul 2025 21:29:10 +0800 Subject: [PATCH 3/5] docs(azure-app-reg): GroupMember.Read.All replaces Group.Read.all, as it's less invasive and fulfills our needs --- .../calendar-access/azure-app-registration.md | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-) diff --git a/how-to/configure-placeos-for-microsoft-365/calendar-access/azure-app-registration.md b/how-to/configure-placeos-for-microsoft-365/calendar-access/azure-app-registration.md index b47ff7a..cb20ee8 100644 --- a/how-to/configure-placeos-for-microsoft-365/calendar-access/azure-app-registration.md +++ b/how-to/configure-placeos-for-microsoft-365/calendar-access/azure-app-registration.md @@ -28,14 +28,15 @@ After completion of this step, we will apply a policy restriction so the applica 10. Click 'Application Permissions'. 11. Add the following permissions:\ \- `Calendars.ReadWrite`\ - \- `Group.Read.All`\ \- `User.Read.All`\ + \- `GroupMember.Read.All`\ + \- `Place.Read.All`\ ![](https://lh4.googleusercontent.com/XDYxU9SORBoh9sbS-TLeu-RCd0zBGP-4xQjqr7PE2O4a1DQFLj4Az1OXRRVhTPoxLrxjDxrGEd36urvVQIRGmEopr7TAltvIrTsUnewaH8LJumCjrSrYFwb5zTO2FdLkvbqELAYLy8lzZz04Jw) -12. Click 'Add permissions'. -13. Click ‘Grant admin consent for xyz’.\ +13. Click 'Add permissions'. +14. Click ‘Grant admin consent for xyz’.\ -14. Configuration of the Azure App is now complete. -15. Supply PlaceOS or your integration partner with (be aware that supplying these credentials to PlaceOS prior to configuring the application policy in exchange will allow PlaceOS to see ALL calendars in your organisation): +15. Configuration of the Azure App is now complete. +16. Supply PlaceOS or your integration partner with (be aware that supplying these credentials to PlaceOS prior to configuring the application policy in exchange will allow PlaceOS to see ALL calendars in your organisation): * Application ID * Tenant ID * Secret From a54bcad39fed108729af917cf3ab5dccc5247f60 Mon Sep 17 00:00:00 2001 From: "Viv B." Date: Wed, 16 Jul 2025 09:47:01 +1000 Subject: [PATCH 4/5] chore(k8s): update cluster requirements --- reference/system-requirements.md | 17 ++++++++--------- 1 file changed, 8 insertions(+), 9 deletions(-) diff --git a/reference/system-requirements.md b/reference/system-requirements.md index 0470cde..2b931a9 100644 --- a/reference/system-requirements.md +++ b/reference/system-requirements.md @@ -24,12 +24,12 @@ See [PlaceOS Kubernetes Terraform](https://github.com/place-labs/k8s-terraform/) * Availability Zones: 1 or more (3 recommended) * Nodes: 3 or more * Minimum node size: - * 4 cores - * 8 GB RAM + * 2 cores + * 16 GB RAM * Persistent Volumes utilized: - * 10 x 1 GB - * 1x 20GB - * 1x 100GB + * 7 x 8 GB + * 8 x 100 MB + * 2 x 50 GB ### Non-Production Environment @@ -40,12 +40,11 @@ See [PlaceOS Kubernetes Terraform](https://github.com/place-labs/k8s-terraform/) * Availability Zones: 1 or more * Nodes: 2 or more * Minimum node size: - * 4 cores + * 2 cores * 8 GB RAM * Persistent Volumes utilized: - * 10 x 1 GB - * 1x 20GB - * 1x 100GB + - 3 x 8 GB + - 3 x 100 MB #### OR Linux VM based Deploymentm for development/testing purposes From 2cfbad948da6f84ae94bc43ae63532d9112b3241 Mon Sep 17 00:00:00 2001 From: William Le Date: Wed, 16 Jul 2025 15:42:42 +0800 Subject: [PATCH 5/5] docs(azure-app-reg): send delegated creds to backoffice admin --- .../create-microsoft-azure-app-registration.md | 1 + 1 file changed, 1 insertion(+) diff --git a/how-to/configure-placeos-for-microsoft-365/user-authentication/create-microsoft-azure-app-registration.md b/how-to/configure-placeos-for-microsoft-365/user-authentication/create-microsoft-azure-app-registration.md index e701d13..4a4d4cb 100644 --- a/how-to/configure-placeos-for-microsoft-365/user-authentication/create-microsoft-azure-app-registration.md +++ b/how-to/configure-placeos-for-microsoft-365/user-authentication/create-microsoft-azure-app-registration.md @@ -36,6 +36,7 @@ * `profile` 13. Click 'Grant admin consent' 14. This completes the App Registration. +15. Securely send the Azure App Registration Tenant ID, Client ID, and Client Secret Value (from steps 5-7) to the PlaceOS Administrator who will be configuring the single-sign-on authentication integration. {% hint style="success" %} For more detailed information about the permissions required by PlaceOS, please reference the [Microsoft Azure Permissions Table.](../../../reference/microsoft-azure-permissions.md)