- Click on the Search Bar on the left hand side of the Taskbar.
- Now type CMD, right click on it, and select Run as Administrator.
- Type in the following command: icacls "%ProgramFiles%\WindowsApps" /grant Administrators:F
- Once the above command is successfully executed run the following command: icacls "%ProgramFiles%\WindowsApps" /grant Administrators:F /t
- Type Exit and hit enter.
- Restart the PC.
- Pull this code down (downloading zip is fine) https://github.com/kkkgo/LTSC-Add-MicrosoftStore.
- Press Windows key and search for "developer settings"
- Enable "Developer mode" if it's disabled
- Run "Add-Store" as administrator
- There will be some red error text, usually about the fact that certain apps are already installed
- Restart the machine and bingo! You should now see the store.
https://ohmyposh.dev/docs/segments/git
For some reason, Oh my posh disable posh git by default. To re-enable it, you need to edit your profile (e.g. code $PROFILE). Add the following after the Oh my posh initialisation:
$env:POSH_GIT_ENABLED = $true
- Check to ensure that the producer app is not setting a queue name in its config
- Ensure the consumers that share the same queue name are listening for the same messages
- Ensure the concurrency limit is set. If it is set to 0 no messages are consumed.
https://brettmckenzie.net/2020/03/23/azure-pipelines-copy-files-task-authentication-failed/
- For authorization you will have to provide access to the Security Principal
- In Azure DevOps, go to the settings for your project, and click on Service Connections (the URL is something like https://dev.azure.com///_settings/adminservices)
- Select the Service Connection you are using for your pipeline task
- Click Manage Service Principal which will redirect you to the Application Registration of the Service Principal. All you need to do here is copy the name (the default format is --)
- Go back and click Manage service connection roles which will redirect you to the IAM blade of the Azure Subscription. Here you need to assign a role to the service principal of which you copied the name of in the previous step. The roles can either be:
- Storage Blob Data Contributor
- Storage Blob Data Owner