Skip to content

Commit eb45a74

Browse files
committed
Fix tests
1 parent f771a92 commit eb45a74

12 files changed

+128
-136
lines changed

src/Sql/Sql.Test/ScenarioTests/VulnerabilityAssessmentMiTests.ps1

Lines changed: 54 additions & 54 deletions
Large diffs are not rendered by default.

src/Sql/Sql.Test/ScenarioTests/VulnerabilityAssessmentTests.ps1

Lines changed: 54 additions & 54 deletions
Large diffs are not rendered by default.

src/Sql/Sql/Az.Sql.psd1

Lines changed: 7 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -271,21 +271,15 @@ AliasesToExport = 'Get-AzSqlDatabaseServerAuditingPolicy',
271271
'Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings',
272272
'Get-AzSqlDatabaseIndexRecommendations',
273273
'Get-AzSqlDatabaseRestorePoints',
274-
'Update-AzSqlInstanceVulnerabilityAssessmentSettings',
275-
'Get-AzSqlInstanceVulnerabilityAssessmentSettings',
276-
'Clear-AzSqlInstanceVulnerabilityAssessmentSettings',
277-
'Update-AzSqlServerVulnerabilityAssessmentSettings',
278-
'Get-AzSqlServerVulnerabilityAssessmentSettings',
279-
'Clear-AzSqlServerVulnerabilityAssessmentSettings',
280274
'Enable-AzSqlServerAdvancedThreatProtection',
281275
'Disable-AzSqlServerAdvancedThreatProtection',
282-
'Get-AzSqlServerAdvancedThreatProtectionPolicy',
283-
'Get-AzSqlServerThreatDetectionPolicy',
284-
'Remove-AzSqlServerThreatDetectionPolicy',
285-
'Set-AzSqlServerThreatDetectionPolicy',
286-
'Get-AzSqlDatabaseThreatDetectionPolicy',
287-
'Set-AzSqlDatabaseThreatDetectionPolicy',
288-
'Remove-AzSqlDatabaseThreatDetectionPolicy',
276+
'Get-AzSqlServerAdvancedThreatProtectionSetting',
277+
'Get-AzSqlServerThreatDetectionSetting',
278+
'Remove-AzSqlServerThreatDetectionSetting',
279+
'Set-AzSqlServerThreatDetectionSetting',
280+
'Get-AzSqlDatabaseThreatDetectionSetting',
281+
'Set-AzSqlDatabaseThreatDetectionSetting',
282+
'Remove-AzSqlDatabaseThreatDetectionSetting',
289283
'Set-AzSqlInstanceTDEProtector', 'Get-AzSqlInstanceTDEProtector'
290284

291285
# DSC resources to export from this module

src/Sql/Sql/Properties/Resources.Designer.cs

Lines changed: 3 additions & 3 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

src/Sql/Sql/Properties/Resources.resx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -417,8 +417,8 @@
417417
<data name="ServerAdvancedThreatProtectionIsNotDefined" xml:space="preserve">
418418
<value>Server Advanced Threat Protection is not defined. Please run Enable-AzSqlServerAdvancedThreatProtection first.</value>
419419
</data>
420-
<data name="RunSetVulnerabilityAssemenSettings" xml:space="preserve">
421-
<value>Vulnerability assessment settings are not defined. Please run Update-AzSqlServerVulnerabilityAssessmentSettings first.</value>
420+
<data name="RunSetVulnerabilityAssessmentSettings" xml:space="preserve">
421+
<value>Vulnerability assessment settings are not defined. Please run Update-AzSqlServerVulnerabilityAssessmentSetting first.</value>
422422
</data>
423423
<data name="InvalidBlobStorageSasUri" xml:space="preserve">
424424
<value>Invalid BlobStorageSasUri parameter value. The value should be in format of https://mystorage.blob.core.windows.net/vulnerability-assessment?st=XXXXXX."</value>

src/Sql/Sql/help/Clear-AzSqlDatabaseVulnerabilityAssessmentRuleBaseline.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Clear-AzSqlDatabaseVulnerabilityAssessmentRuleBaseline [-ServerName] <String> [-
2020

2121
## DESCRIPTION
2222
The **Clear-AzSqlDatabaseVulnerabilityAssessmentRuleBaseline** cmdlet removes the vulnerability assessment rule baseline.
23-
Note that you need to run *Enable-AzSqlServerAdvancedDataSecurity* and *Update-AzSqlServerVulnerabilityAssessmentSettings* cmdlet as a prerequisite for using this cmdlets.
23+
Note that you need to run *Enable-AzSqlServerAdvancedDataSecurity* and *Update-AzSqlServerVulnerabilityAssessmentSetting* cmdlet as a prerequisite for using this cmdlets.
2424

2525
## EXAMPLES
2626

src/Sql/Sql/help/Convert-AzSqlDatabaseVulnerabilityAssessmentScan.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Convert-AzSqlDatabaseVulnerabilityAssessmentScan [-ServerName] <String> [-Databa
2020

2121
## DESCRIPTION
2222
The **Convert-AzSqlDatabaseVulnerabilityAssessmentScan** cmdlet converts a scan results, that resides in the customer storage, identified by the ScanId parameter to an Excel format placed in the storage defined by the Set-AzSqlServerVulnerabilityAssessmentSettings cmdlet.
23-
Note that you need to run *Enable-AzSqlServerAdvancedDataSecurity* and *Update-AzSqlServerVulnerabilityAssessmentSettings* cmdlet as a prerequisite for using this cmdlets.
23+
Note that you need to run *Enable-AzSqlServerAdvancedDataSecurity* and *Update-AzSqlServerVulnerabilityAssessmentSetting* cmdlet as a prerequisite for using this cmdlets.
2424

2525
## EXAMPLES
2626

src/Sql/Sql/help/Get-AzSqlDatabaseVulnerabilityAssessmentRuleBaseline.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Get-AzSqlDatabaseVulnerabilityAssessmentRuleBaseline [-ServerName] <String> [-Da
2020

2121
## DESCRIPTION
2222
The **Get-AzSqlDatabaseVulnerabilityAssessmentRuleBaseline** cmdlet gets the vulnerability assessment rule baseline.
23-
Note that you need to run *Enable-AzSqlServerAdvancedDataSecurity* and *Update-AzSqlServerVulnerabilityAssessmentSettings* cmdlets as a prerequisite for using this cmdlet.
23+
Note that you need to run *Enable-AzSqlServerAdvancedDataSecurity* and *Update-AzSqlServerVulnerabilityAssessmentSetting* cmdlets as a prerequisite for using this cmdlet.
2424

2525
## EXAMPLES
2626

src/Sql/Sql/help/Get-AzSqlDatabaseVulnerabilityAssessmentScanRecord.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Get-AzSqlDatabaseVulnerabilityAssessmentScanRecord [-ServerName] <String> [-Data
2020

2121
## DESCRIPTION
2222
The **Get-AzSqlDatabaseVulnerabilityAssessmentScanRecord** cmdlet retrieves all vulnerability assessment scan record(s) associated with a given database.
23-
Note that you need to run *Enable-AzSqlServerAdvancedDataSecurity* and *Update-AzSqlServerVulnerabilityAssessmentSettings* cmdlet as a prerequisite for using this cmdlets.
23+
Note that you need to run *Enable-AzSqlServerAdvancedDataSecurity* and *Update-AzSqlServerVulnerabilityAssessmentSetting* cmdlet as a prerequisite for using this cmdlets.
2424

2525
## EXAMPLES
2626

src/Sql/Sql/help/Set-AzSqlDatabaseVulnerabilityAssessmentRuleBaseline.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Set-AzSqlDatabaseVulnerabilityAssessmentRuleBaseline [-ServerName] <String> [-Da
2222
## DESCRIPTION
2323
The **Set-AzureRmSqlDatabaseVulnerabilityAssessmentRuleBaseline** cmdlet sets the vulnerability assessment rule baseline.
2424
As you review your assessment results, you can mark specific results as being an acceptable Baseline in your environment. The baseline is essentially a customization of how the results are reported. Results that match the baseline are considered as passing in subsequent scans. Once you have established your baseline security state, vulnerability assessment only reports on deviations from the baseline, and you can focus your attention on the relevant issues.
25-
Note that you need to run *Enable-AzSqlServerAdvancedDataSecurity* and *Update-AzSqlServerVulnerabilityAssessmentSettings* cmdlet as a prerequisite for using this cmdlets.
25+
Note that you need to run *Enable-AzSqlServerAdvancedDataSecurity* and *Update-AzSqlServerVulnerabilityAssessmentSetting* cmdlet as a prerequisite for using this cmdlets.
2626

2727
## EXAMPLES
2828

src/Sql/Sql/help/Start-AzSqlDatabaseVulnerabilityAssessmentScan.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,9 +20,9 @@ Start-AzSqlDatabaseVulnerabilityAssessmentScan [-ServerName] <String> [-Database
2020

2121
## DESCRIPTION
2222
The **Start-AzSqlDatabaseVulnerabilityAssessmentScan** cmdlet triggers a scan with ScanId identifier.
23-
Scan results will be saved under the storage defined by the Update-AzSqlServerVulnerabilityAssessmentSettings cmdlet, under scans/{ServerName}/{DatabaseName}/scan_{ScanId}.json
23+
Scan results will be saved under the storage defined by the Update-AzSqlServerVulnerabilityAssessmentSetting cmdlet, under scans/{ServerName}/{DatabaseName}/scan_{ScanId}.json
2424
You can monitor the progress of the scan by using the *Get-AzSqlDatabaseVulnerabilityAssessmentScanRecord* cmdlet with the scanId parameter and look at the State returned parameter.
25-
Note that you need to run *Enable-AzSqlServerAdvancedDataSecurity* and *Update-AzSqlServerVulnerabilityAssessmentSettings* cmdlet as a prerequisite for using this cmdlets.
25+
Note that you need to run *Enable-AzSqlServerAdvancedDataSecurity* and *Update-AzSqlServerVulnerabilityAssessmentSetting* cmdlet as a prerequisite for using this cmdlets.
2626

2727
## EXAMPLES
2828

tools/Tools.Common/SerializedCmdlets/Microsoft.Azure.PowerShell.Cmdlets.Sql.dll.json

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10667,9 +10667,7 @@
1066710667
]
1066810668
}
1066910669
],
10670-
"AliasList": [
10671-
"Update-AzSqlServerVulnerabilityAssessmentSettings"
10672-
]
10670+
"AliasList": []
1067310671
},
1067410672
{
1067510673
"VerbName": "Convert",

0 commit comments

Comments
 (0)