Skip to content

Commit 3f0f6c8

Browse files
author
Kamran Khan
committed
Merge remote-tracking branch 'upstream/dev' into disable_enc_fix
2 parents 7d3325b + 8465014 commit 3f0f6c8

File tree

43 files changed

+21665
-7507
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

43 files changed

+21665
-7507
lines changed

ChangeLog.md

Lines changed: 64 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,68 @@
11
## 2016.09.08 version 2.1.0
2-
* Data Factory
3-
- New cmdlet added to retrieve activity windows: Get-AzureRmDataFactoryActivityWindow
2+
* Compute
3+
* Add support for querying encryption status from the AzureDiskEncryptionForLinux extension
4+
* DataFactory
5+
* Added new cmdlet for listing activity windows
6+
- Get-AzureRmDataFactoryActivityWindow
7+
* DataLake
8+
* Changed parameter `Host` to `DatabaseHost` and added alias to `Host`
9+
- New-AzureRmDataLakeAnalyticsCatalogSecret
10+
- Set-AzureRmDataLakeAnalyticsCatalogSecret
11+
* Add support for ACL and Default ACL removal
12+
* Add support for getting and setting unnamed permissions on files and folders
13+
* KeyVault
14+
* Add support for certificates
15+
- Add-AzureRmKeyVaultCertificate
16+
- Add-AzureRmKeyVaultCertificateContact
17+
- Get-AzureRmKeyVaultCertificate
18+
- Get-AzureRmKeyVaultCertificateContact
19+
- Get-AzureRmKeyVaultCertificateIssuer
20+
- Get-AzureRmKeyVaultCertificateOperation
21+
- Get-AzureRmKeyVaultCertificatePolicy
22+
- Import-AzureRmKeyVaultCertificate
23+
- New-AzureRmKeyVaultCertificateAdministratorDetails
24+
- New-AzureRmKeyVaultCertificateOrganizationDetails
25+
- New-AzureRmKeyVaultCertificatePolicy
26+
- Remove-AzureRmKeyVaultCertificate
27+
- Remove-AzureRmKeyVaultCertificateContact
28+
- Remove-AzureRmKeyVaultCertificateIssuer
29+
- Remove-AzureRmKeyVaultCertificateOperation
30+
- Set-AzureRmKeyVaultCertificateAttribute
31+
- Set-AzureRmKeyVaultCertificateIssuer
32+
- Set-AzureRmKeyVaultCertificatePolicy
33+
- Stop-AzureRmKeyVaultCertificateOperation
34+
* Network
35+
* Enable Active-Active gateway feature PowerShell cmdlets
36+
- Add-AzureRmVirtualNetworkGatewayIpConfig
37+
- Remove-AzureRmVirtualNetworkGatewayIpConfig
38+
* Added new cmdlet
39+
- Test-AzureRmPrivateIpAddressAvailability
40+
* Resources
41+
* Support zones in provider and resource cmdlets
42+
- Get-AzureRmProvider
43+
- New-AzureRmResource
44+
- Set-AzureRmResource
45+
* Sql
46+
* Added new cmdlets for Azure SQL threat detection policy management at server level
47+
- Get-AzureRmSqlServerThreatDetectionPolicy
48+
- Remove-AzureRmSqlServerThreatDetectionPolicy
49+
- Set-AzureRmSqlServerThreatDetectionPolicy
50+
* Added new cmdlets to support enabling/disabling GeoBackupPolicy for Sql Azure DataWarehouses
51+
- Get-AzureRmSqlDatabaseGeoBackupPolicy
52+
- Set-AzureRmSqlDatabaseGeoBackupPolicy
53+
* Added new cmdlets for Azure Sql Advisors and Recommended Actions APIs
54+
- Get-AzureRmSqlDatabaseAdvisor
55+
- Get-AzureRmSqlElasticPoolAdvisor
56+
- Get-AzureRmSqlServerAdvisor
57+
- Get-AzureRmSqlDatabaseRecommendedActions
58+
- Get-AzureRmSqlElasticPoolRecommendedActions
59+
- Get-AzureRmSqlServerRecommendedActions
60+
- Set-AzureRmSqlDatabaseAdvisorAutoExecuteStatus
61+
- Set-AzureRmSqlElasticPoolAdvisorAutoExecuteStatus
62+
- Set-AzureRmSqlServerAdvisorAutoExecuteStatus
63+
- Set-AzureRmSqlDatabaseRecommendedActionState
64+
- Set-AzureRmSqlElasticPoolRecommendedActionState
65+
- Set-AzureRmSqlServerRecommendedActionState
466

567
## 2016.08.09 version 2.0.1
668
* Fixed assembly signing issue causing load problems in some PowerShell versions. (Issue #2747)

src/ResourceManager/KeyVault/Commands.KeyVault/Models/CertificateIdentityItem.cs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ internal CertificateIdentityItem(CertificateBundle certBundle)
6060
NotBefore = certBundle.Attributes.NotBefore;
6161
Created = certBundle.Attributes.Created;
6262
Updated = certBundle.Attributes.Updated;
63-
Tags = certBundle.Tags.ConvertToHashtable();
63+
Tags = (certBundle.Tags == null) ? null : certBundle.Tags.ConvertToHashtable();
6464
}
6565

6666
public bool? Enabled { get; set; }

src/ResourceManager/Network/Commands.Network/Microsoft.Azure.Commands.Network.dll-Help.xml

Lines changed: 35 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -36870,13 +36870,14 @@ PS C:> Remove-AzureRmLoadBalancerRuleConfig -Name "MyLBruleName" -
3687036870
</maml:alertSet>
3687136871
<command:examples>
3687236872
<command:example>
36873-
<maml:title>-------------------------- 1: --------------------------</maml:title>
36873+
<maml:title>-------------------------- Example 1 Deleting a network security group --------------------------</maml:title>
3687436874
<maml:introduction>
3687536875
<maml:paragraph>PS C:\&gt;</maml:paragraph>
3687636876
</maml:introduction>
36877-
<dev:code></dev:code>
36877+
<dev:code>PS C:\&gt; Remove-AzureRmNetworkSecurityGroup -Name &quot;NSG-FrontEnd&quot; -ResourceGroupName &quot;TestRG&quot;</dev:code>
3687836878
<dev:remarks>
36879-
<maml:para />
36879+
<maml:para>This command removes the network security group called &quot;NSG-Frontend&quot; within the resource group &quot;TestRG.&quot;</maml:para>
36880+
<maml:para>Note that a network security group must exist before it can be deleted.</maml:para>
3688036881
<maml:para />
3688136882
<maml:para />
3688236883
<maml:para></maml:para>
@@ -37053,13 +37054,20 @@ PS C:&gt; Remove-AzureRmLoadBalancerRuleConfig -Name &quot;MyLBruleName&quot; -
3705337054
</maml:alertSet>
3705437055
<command:examples>
3705537056
<command:example>
37056-
<maml:title>-------------------------- 1: --------------------------</maml:title>
37057+
<maml:title>-------------------------- Example 1: Deleting a network security rule configuration --------------------------</maml:title>
3705737058
<maml:introduction>
3705837059
<maml:paragraph>PS C:\&gt;</maml:paragraph>
3705937060
</maml:introduction>
37060-
<dev:code></dev:code>
37061+
<dev:code>PS C:\&gt; New-AzureRmNetworkSecurityRuleConfig -Name rdp-rule -Description &quot;Allow RDP&quot; -Access Allow -Protocol Tcp -Direction Inbound -Priority 100 -SourceAddressPrefix Internet -SourcePortRange * -DestinationAddressPrefix * -DestinationPortRange 3389
37062+
37063+
PS C:\&gt; $nsg = New-AzureRmNetworkSecurityGroup -ResourceGroupName TestRG -Location westus -Name &quot;NSG-FrontEnd&quot; -SecurityRules $rule1
37064+
37065+
PS C:\&gt; Remove-AzureRmNetworkSecurityRuleConfig -Name rdp-rule -NetworkSecurityGroup $nsg
37066+
37067+
</dev:code>
3706137068
<dev:remarks>
37062-
<maml:para />
37069+
<maml:para>The first command creates a network security rule called rdp-rule. The second command assigns this rule to a newly created network security group called &quot;NSG-FrontEnd&quot;. Finally, the third command removes this network security rule associated with the network security group stored in the variable $nsg.</maml:para>
37070+
<maml:para>Note that a rule must be associated with a network security group in order to successfully delete it.</maml:para>
3706337071
<maml:para />
3706437072
<maml:para />
3706537073
<maml:para></maml:para>
@@ -48029,13 +48037,17 @@ Set-AzureRmNetworkInterface -NetworkInterface $nic</dev:code>
4802948037
</maml:alertSet>
4803048038
<command:examples>
4803148039
<command:example>
48032-
<maml:title>-------------------------- 1: --------------------------</maml:title>
48040+
<maml:title>-------------------------- Example 1: Changing the Access configuration in a network security rule --------------------------</maml:title>
4803348041
<maml:introduction>
4803448042
<maml:paragraph>PS C:\&gt;</maml:paragraph>
4803548043
</maml:introduction>
48036-
<dev:code></dev:code>
48044+
<dev:code>PS C:\&gt; $nsg = Get-AzureRmNetworkSecurityGroup -Name NSG-FrontEnd -ResourceGroupName TestRG
48045+
48046+
PS C:\&gt; $nsg | Get-AzureRmNetworkSecurityRuleConfig -Name &quot;rdp-rule&quot;
48047+
48048+
PS C:\&gt; Set-AzureRmNetworkSecurityRuleConfig -Name rdp-rule -NetworkSecurityGroup $nsg -Access Deny</dev:code>
4803748049
<dev:remarks>
48038-
<maml:para />
48050+
<maml:para>The first command gets the network security group &quot;NSG-FrontEnd&quot; associated with the rule configuration you want to update and stores it in the variable $nsg. The second command gets the security rule configuration &quot;rdp-rule. The third command changes the Access configuration that was previously Allow to Deny.</maml:para>
4803948051
<maml:para />
4804048052
<maml:para />
4804148053
<maml:para></maml:para>
@@ -48553,7 +48565,12 @@ DnsSettings : {
4855348565
<maml:paragraph>PS C:\&gt;</maml:paragraph>
4855448566
</maml:introduction>
4855548567
<dev:code>PS C:\&gt;Get-AzureRmRouteTable -ResourceGroupName &quot;ResourceGroup11&quot; -Name &quot;routetable01&quot; | Set-AzureRmRouteConfig -Name &quot;route02&quot; -AddressPrefix 10.4.0.0/16 -NextHopType VnetLocal | Set-AzureRmRouteTable
48556-
Name : routetable01
48568+
</dev:code>
48569+
<dev:remarks>
48570+
<maml:para>This command gets the route table named routetable01 by using the Get-AzureRmRouteTable cmdlet. The command passes that table to the current cmdlet by using the pipeline operator.</maml:para>
48571+
<maml:para />
48572+
<maml:para />
48573+
<maml:para>Name : routetable01
4855748574
ResourceGroupName : ResourceGroup11
4855848575
Location : eastus
4855948576
Id : /subscriptions/xxxx-xxxx-xxxx-xxxx/resourceGroups/ResourceGroup11/providers/Microsoft.Networ
@@ -48583,12 +48600,7 @@ Routes : [
4858348600
&quot;ProvisioningState&quot;: &quot;Succeeded&quot;
4858448601
}
4858548602
]
48586-
Subnets : []</dev:code>
48587-
<dev:remarks>
48588-
<maml:para>This command gets the route table named routetable01 by using the Get-AzureRmRouteTable cmdlet. The command passes that table to the current cmdlet by using the pipeline operator.</maml:para>
48589-
<maml:para />
48590-
<maml:para />
48591-
<maml:para></maml:para>
48603+
Subnets : []</maml:para>
4859248604
</dev:remarks>
4859348605
<command:commandLines>
4859448606
<command:commandLine>
@@ -48760,7 +48772,12 @@ Subnets : []</dev:code>
4876048772
<maml:paragraph>PS C:\&gt;</maml:paragraph>
4876148773
</maml:introduction>
4876248774
<dev:code>PS C:\&gt;Get-AzureRmRouteTable -ResourceGroupName &quot;ResourceGroup11&quot; -Name &quot;routetable01&quot; | Add-AzureRmRouteConfig -Name &quot;route02&quot; -AddressPrefix 10.2.0.0/16 -NextHopType VnetLocal | Set-AzureRmRouteTable
48763-
Name : routetable01
48775+
</dev:code>
48776+
<dev:remarks>
48777+
<maml:para>This command gets the route table named routetable01 by using Get-AzureRmRouteTable cmdlet. The command passes that table to the Add-AzureRmRouteConfig cmdlet by using the pipeline operator.</maml:para>
48778+
<maml:para />
48779+
<maml:para />
48780+
<maml:para>Name : routetable01
4876448781
ResourceGroupName : ResourceGroup11
4876548782
Location : eastus
4876648783
Id : /subscriptions/xxxx-xxxx-xxxx-xxxx/resourceGroups/ResourceGroup11/providers/Microsoft.Networ
@@ -48799,12 +48816,7 @@ Routes : [
4879948816
&quot;ProvisioningState&quot;: null
4880048817
}
4880148818
]
48802-
Subnets : []</dev:code>
48803-
<dev:remarks>
48804-
<maml:para>This command gets the route table named routetable01 by using Get-AzureRmRouteTable cmdlet. The command passes that table to the Add-AzureRmRouteConfig cmdlet by using the pipeline operator.</maml:para>
48805-
<maml:para />
48806-
<maml:para />
48807-
<maml:para></maml:para>
48819+
Subnets : []</maml:para>
4880848820
</dev:remarks>
4880948821
<command:commandLines>
4881048822
<command:commandLine>

src/ResourceManager/Sql/Commands.Sql.Test/Commands.Sql.Test.csproj

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -479,6 +479,12 @@
479479
<None Include="SessionRecords\Microsoft.Azure.Commands.Sql.Test.ScenarioTests.AuditingTests\TestBlobAuditingOnServer.json">
480480
<CopyToOutputDirectory>PreserveNewest</CopyToOutputDirectory>
481481
</None>
482+
<None Include="SessionRecords\Microsoft.Azure.Commands.Sql.Test.ScenarioTests.AuditingTests\TestDatatabaseAuditingTypeMigration.json">
483+
<CopyToOutputDirectory>PreserveNewest</CopyToOutputDirectory>
484+
</None>
485+
<None Include="SessionRecords\Microsoft.Azure.Commands.Sql.Test.ScenarioTests.AuditingTests\TestServerAuditingTypeMigration.json">
486+
<CopyToOutputDirectory>PreserveNewest</CopyToOutputDirectory>
487+
</None>
482488
<None Include="SessionRecords\Microsoft.Azure.Commands.Sql.Test.ScenarioTests.DatabaseActivationTests\TestDatabasePauseResume.json">
483489
<CopyToOutputDirectory>PreserveNewest</CopyToOutputDirectory>
484490
</None>

0 commit comments

Comments
 (0)