@@ -150,24 +150,8 @@ function Test-VulnerabilityAssessmentSettingsTest
150
150
- BlobStorageSasUri " https://invalid.blob.core.windows.netXXXXXXXXXXXXXXX" } `
151
151
- message " Invalid BlobStorageSasUri parameter value. The value should be in format of https://mystorage.blob.core.windows.net/vulnerability-assessment?st=XXXXXX."
152
152
153
- # Update Vulnerability Assessment settings (UpdateSettingsWithStorageAccountNameParameterSet parameter set)
154
- try
155
- {
156
- Update-AzureRmSqlDatabaseVulnerabilityAssessmentSettings - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName `
153
+ Update-AzureRmSqlDatabaseVulnerabilityAssessmentSettings - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName `
157
154
- StorageAccountName $params.storageAccount
158
- }
159
- catch
160
- {
161
- if ((Get-SqlTestMode ) -eq ' Playback' )
162
- {
163
- # This command fails in Playback mode because the recorder do not record storage container creation command
164
- # Issue #6600 (https://github.com/Azure/azure-powershell/issues/6600)
165
- }
166
- else
167
- {
168
- throw ;
169
- }
170
- }
171
155
172
156
# Get Vulnerability Assessment settings
173
157
$settings = Get-AzureRmSqlDatabaseVulnerabilityAssessmentSettings - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName
@@ -179,34 +163,17 @@ function Test-VulnerabilityAssessmentSettingsTest
179
163
Assert-AreEqual " vulnerability-assessment" $settings.ScanResultsContainerName
180
164
Assert-AreEqual $params.storageAccount $settings.StorageAccountName
181
165
Assert-AreEqual None $settings.RecurringScansInterval
182
- Assert-AreEqual $false $settings.EmailAdmins
166
+ Assert-AreEqual $true $settings.EmailAdmins
183
167
Assert-AreEqualArray @ () $settings.NotificationEmail
184
168
185
169
# Set Vulnerability Assessment settings with all optional values (SetSettingsWithStorageAccountNameParameterSet parameter set)
186
- $testScanResultsContainerName = " test-scan-results-container-name"
187
170
$testEmailAdmins = $true
188
171
$testNotificationEmail = @ (
" [email protected] " , " [email protected] " )
189
172
$testRecurringScansInterval = [Microsoft.Azure.Commands.Sql.VulnerabilityAssessment.Model.RecurringScansInterval ]::Weekly
190
173
191
- # Update Vulnerability Assessment settings (UpdateSettingsWithStorageAccountNameParameterSet parameter set)
192
- try
193
- {
194
- Update-AzureRmSqlDatabaseVulnerabilityAssessmentSettings - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName `
174
+ Update-AzureRmSqlDatabaseVulnerabilityAssessmentSettings - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName `
195
175
- RecurringScansInterval $testRecurringScansInterval - EmailAdmins $testEmailAdmins `
196
176
- NotificationEmail $testNotificationEmail
197
- }
198
- catch
199
- {
200
- if ((Get-SqlTestMode ) -eq ' Playback' )
201
- {
202
- # This command fails in Playback mode because the recorder do not record storage container creation command
203
- # Issue #6600 (https://github.com/Azure/azure-powershell/issues/6600)
204
- }
205
- else
206
- {
207
- throw ;
208
- }
209
- }
210
177
211
178
# Get Vulnerability Assessment settings
212
179
$settings = Get-AzureRmSqlDatabaseVulnerabilityAssessmentSettings - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName
@@ -215,7 +182,7 @@ function Test-VulnerabilityAssessmentSettingsTest
215
182
Assert-AreEqual $params.rgname $settings.ResourceGroupName
216
183
Assert-AreEqual $params.serverName $settings.ServerName
217
184
Assert-AreEqual $params.databaseName $settings.DatabaseName
218
- Assert-AreEqual $testScanResultsContainerName $settings.ScanResultsContainerName
185
+ Assert-AreEqual " vulnerability-assessment " $settings.ScanResultsContainerName
219
186
Assert-AreEqual $params.storageAccount $settings.StorageAccountName
220
187
Assert-AreEqual $testRecurringScansInterval $settings.RecurringScansInterval
221
188
Assert-AreEqual $testEmailAdmins $settings.EmailAdmins
@@ -256,24 +223,8 @@ function Test-VulnerabilityAssessmentSettingsTest
256
223
- BlobStorageSasUri $testBlobStorageSasUri - RecurringScansInterval $testRecurringScansInterval - EmailAdmins $testEmailAdmins `
257
224
- NotificationEmail $testNewNotificationEmail
258
225
259
- try
260
- {
261
- Get-AzureRmSqlDatabaseVulnerabilityAssessmentSettings - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $newDatabaseName | Update-AzureRmSqlDatabaseVulnerabilityAssessmentSettings `
226
+ Get-AzureRmSqlDatabaseVulnerabilityAssessmentSettings - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $newDatabaseName | Update-AzureRmSqlDatabaseVulnerabilityAssessmentSettings `
262
227
- ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName
263
- }
264
- catch
265
- {
266
- if ((Get-SqlTestMode ) -eq ' Playback' )
267
- {
268
- # This command fails in Playback mode because the recorder do not record storage container creation command
269
- # Issue #6600 (https://github.com/Azure/azure-powershell/issues/6600)
270
- }
271
- else
272
- {
273
- throw ;
274
- }
275
- }
276
-
277
228
$settings = Get-AzureRmSqlDatabaseVulnerabilityAssessmentSettings - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName
278
229
279
230
Assert-AreEqual $params.rgname $settings.ResourceGroupName
@@ -346,25 +297,9 @@ function Test-VulnerabilityAssessmentBaselineTest
346
297
# Turn on ATP
347
298
Enable-AzureRmSqlServerAdvancedThreatProtection - ResourceGroupName $params.rgname - ServerName $params.serverName
348
299
349
- # Set Vulnerability Assessment settings (SetSettingsWithStorageAccountNameParameterSet parameter set)
350
- try
351
- {
352
- Update-AzureRmSqlDatabaseVulnerabilityAssessmentSettings - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName `
300
+ Update-AzureRmSqlDatabaseVulnerabilityAssessmentSettings - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName `
353
301
- StorageAccountName $params.storageAccount
354
- }
355
- catch
356
- {
357
- if ((Get-SqlTestMode ) -eq ' Playback' )
358
- {
359
- # This command fails in Playback mode because the recorder do not record storage container creation command
360
- # Issue #6600 (https://github.com/Azure/azure-powershell/issues/6600)
361
- }
362
- else
363
- {
364
- throw ;
365
- }
366
- }
367
-
302
+
368
303
$ruleId = " VA2108"
369
304
370
305
# Get and remove baseline for non existing baseline
@@ -511,24 +446,8 @@ function Test-VulnerabilityAssessmentScanRecordGetListTest
511
446
# Turn on ATP
512
447
Enable-AzureRmSqlServerAdvancedThreatProtection - ResourceGroupName $params.rgname - ServerName $params.serverName
513
448
514
- # Set Vulnerability Assessment settings (SetSettingsWithStorageAccountNameParameterSet parameter set)
515
- try
516
- {
517
- Update-AzureRmSqlDatabaseVulnerabilityAssessmentSettings - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName `
449
+ Update-AzureRmSqlDatabaseVulnerabilityAssessmentSettings - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName `
518
450
- StorageAccountName $params.storageAccount
519
- }
520
- catch
521
- {
522
- if ((Get-SqlTestMode ) -eq ' Playback' )
523
- {
524
- # This command fails in Playback mode because the recorder do not record storage container creation command
525
- # Issue #6600 (https://github.com/Azure/azure-powershell/issues/6600)
526
- }
527
- else
528
- {
529
- throw ;
530
- }
531
- }
532
451
533
452
# Trigger scan without scan ID
534
453
try
@@ -547,7 +466,7 @@ function Test-VulnerabilityAssessmentScanRecordGetListTest
547
466
throw ;
548
467
}
549
468
}
550
-
469
+
551
470
# Trigger scan as a Job with scan ID
552
471
$scanId1 = " cmdletGetListScan"
553
472
$scanJob = Start-AzureRmSqlDatabaseVulnerabilityAssessmentScan - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName - ScanId $scanId1 - AsJob
@@ -663,24 +582,8 @@ function Test-VulnerabilityAssessmentScanConvertTest
663
582
# Turn on ATP
664
583
Enable-AzureRmSqlServerAdvancedThreatProtection - ResourceGroupName $params.rgname - ServerName $params.serverName
665
584
666
- # Set Vulnerability Assessment settings (SetSettingsWithStorageAccountNameParameterSet parameter set)
667
- try
668
- {
669
- Update-AzureRmSqlDatabaseVulnerabilityAssessmentSettings - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName `
585
+ Update-AzureRmSqlDatabaseVulnerabilityAssessmentSettings - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName `
670
586
- StorageAccountName $params.storageAccount
671
- }
672
- catch
673
- {
674
- if ((Get-SqlTestMode ) -eq ' Playback' )
675
- {
676
- # This command fails in Playback mode because the recorder do not record storage container creation command
677
- # Issue #6600 (https://github.com/Azure/azure-powershell/issues/6600)
678
- }
679
- else
680
- {
681
- throw ;
682
- }
683
- }
684
587
685
588
# Convert scan without providing scan ID
686
589
Assert-ThrowsContains - script { Convert-AzureRmSqlDatabaseVulnerabilityAssessmentScan - ResourceGroupName $params.rgname - ServerName $params.serverName `
0 commit comments