Skip to content

Commit 82c509b

Browse files
committed
Revert "Add new parameter BypassObjectIdValidation for Set-AzureRmKeyVaultAccessPolicy to support CSP"
This reverts commit 6cf10fa.
1 parent 6cf10fa commit 82c509b

File tree

4 files changed

+4
-32
lines changed

4 files changed

+4
-32
lines changed

src/ResourceManager/KeyVault/Commands.KeyVault.Test/Scripts/ControlPlane/KeyVaultManagementTests.ps1

Lines changed: 3 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -278,22 +278,14 @@ function Test-SetRemoveAccessPolicyBySPN
278278

279279
function Test-SetRemoveAccessPolicyByObjectId
280280
{
281-
Param($existingVaultName, $rgName, $objId, [switch]$bypassObjectIdValidation)
281+
Param($existingVaultName, $rgName, $objId)
282282

283283
$PermToKeys = @("encrypt", "decrypt")
284284
$PermToSecrets = @()
285-
286-
$vault;
287-
if ($bypassObjectIdValidation.IsPresent)
288-
{
289-
$vault = Set-AzureRmKeyVaultAccessPolicy -VaultName $existingVaultName -ResourceGroupName $rgName -ObjectId $objId -PermissionsToKeys $PermToKeys -BypassObjectIdValidation -PassThru
290-
}
291-
else
292-
{
293-
$vault = Set-AzureRmKeyVaultAccessPolicy -VaultName $existingVaultName -ResourceGroupName $rgName -ObjectId $objId -PermissionsToKeys $PermToKeys -PassThru
294-
}
285+
$vault = Set-AzureRmKeyVaultAccessPolicy -VaultName $existingVaultName -ResourceGroupName $rgName -ObjectId $objId -PermissionsToKeys $PermToKeys -PassThru
295286

296287
CheckVaultAccessPolicy $vault $PermToKeys $PermToSecrets
288+
297289
Assert-AreEqual $objId $vault.AccessPolicies[0].ObjectId
298290

299291
$vault = Remove-AzureRmKeyVaultAccessPolicy -VaultName $existingVaultName -ResourceGroupName $rgName -ObjectId $objId -PassThru

src/ResourceManager/KeyVault/Commands.KeyVault.Test/Scripts/RunKeyVaultTests.ps1

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,6 @@ function Run-AllControlPlaneTests
129129
Run-TestProtected { Run-VaultTest { Test_SetRemoveAccessPolicyByUPN } "Test_SetRemoveAccessPolicyByUPN" } "Test_SetRemoveAccessPolicyByUPN"
130130
Run-TestProtected { Run-VaultTest { Test_SetRemoveAccessPolicyBySPN } "Test_SetRemoveAccessPolicyBySPN" } "Test_SetRemoveAccessPolicyBySPN"
131131
Run-TestProtected { Run-VaultTest { Test_SetRemoveAccessPolicyByObjectId } "Test_SetRemoveAccessPolicyByObjectId" } "Test_SetRemoveAccessPolicyByObjectId"
132-
Run-TestProtected { Run-VaultTest { Test_SetRemoveAccessPolicyByBypassObjectIdValidation } "Test_SetRemoveAccessPolicyByBypassObjectIdValidation" } "Test_SetRemoveAccessPolicyByBypassObjectIdValidation"
133132
Run-TestProtected { Run-VaultTest { Test_SetRemoveAccessPolicyByCompoundId } "Test_SetRemoveAccessPolicyByCompoundId" } "Test_SetRemoveAccessPolicyByCompoundId"
134133
Run-TestProtected { Run-VaultTest { Test_RemoveAccessPolicyWithCompoundIdPolicies } "Test_RemoveAccessPolicyWithCompoundIdPolicies" } "Test_RemoveAccessPolicyWithCompoundIdPolicies"
135134
Run-TestProtected { Run-VaultTest { Test_SetCompoundIdAccessPolicy } "Test_SetCompoundIdAccessPolicy" } "Test_SetCompoundIdAccessPolicy"

src/ResourceManager/KeyVault/Commands.KeyVault.Test/Scripts/VaultManagementTests.ps1

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -135,12 +135,6 @@ function Test_SetRemoveAccessPolicyByObjectId
135135
Test-SetRemoveAccessPolicyByObjectId $global:precreatedVaultName $global:resourceGroupName $global:objectId
136136
}
137137

138-
function Test_SetRemoveAccessPolicyByBypassObjectIdValidation
139-
{
140-
$securityGroupObjIdFromOtherTenant = [System.Guid]::NewGuid().toString()
141-
Reset-PreCreatedVault
142-
Test-SetRemoveAccessPolicyByObjectId $global:precreatedVaultName $global:resourceGroupName $securityGroupObjIdFromOtherTenant -bypassObjectIdValidation
143-
}
144138

145139
function Test_SetRemoveAccessPolicyByCompoundId
146140
{

src/ResourceManager/KeyVault/Commands.KeyVault/Commands/SetAzureKeyVaultAccessPolicy.cs

Lines changed: 1 addition & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -150,15 +150,6 @@ public class SetAzureKeyVaultAccessPolicy : KeyVaultManagementCmdletBase
150150
HelpMessage = "If specified, enables secrets to be retrieved from this key vault by Azure Disk Encryption.")]
151151
public SwitchParameter EnabledForDiskEncryption { get; set; }
152152

153-
/// <summary>
154-
/// Flag for bypassing object ID validation or not
155-
/// </summary>
156-
[Parameter(Mandatory = false,
157-
ParameterSetName = ByObjectId,
158-
ValueFromPipelineByPropertyName = true,
159-
HelpMessage = "Specifies whether the object ID needs to be validated or not.")]
160-
public SwitchParameter BypassObjectIdValidation { get; set; }
161-
162153
[Parameter(Mandatory = false,
163154
HelpMessage = "This Cmdlet does not return an object by default. If this switch is specified, it returns the updated key vault object.")]
164155
public SwitchParameter PassThru { get; set; }
@@ -190,11 +181,7 @@ public override void ExecuteCmdlet()
190181
PSKeyVaultModels.PSVaultAccessPolicy[] updatedListOfAccessPolicies = vault.AccessPolicies;
191182
if (!string.IsNullOrEmpty(UserPrincipalName) || !string.IsNullOrEmpty(ServicePrincipalName) || (ObjectId != Guid.Empty))
192183
{
193-
Guid objId = this.ObjectId;
194-
if (!this.BypassObjectIdValidation.IsPresent)
195-
{
196-
objId = GetObjectId(this.ObjectId, this.UserPrincipalName, this.ServicePrincipalName);
197-
}
184+
Guid objId = GetObjectId(this.ObjectId, this.UserPrincipalName, this.ServicePrincipalName);
198185

199186
if (ApplicationId.HasValue && ApplicationId.Value == Guid.Empty)
200187
throw new ArgumentException(PSKeyVaultProperties.Resources.InvalidApplicationId);

0 commit comments

Comments
 (0)