Skip to content

Commit fae57c3

Browse files
committed
Fix all CR comment + adding some minor change for DM rule removal with MS25 deployed worldwide
Fix all CR comment + adding some minor change for DM rule removal with MS25 deployed worldwide
1 parent ffa0643 commit fae57c3

20 files changed

+14302
-10961
lines changed

src/ResourceManager/Sql/Commands.Sql.Test/ScenarioTests/SqlTestsBase.cs

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -160,7 +160,9 @@ protected GraphRbacManagementClient GetGraphClient()
160160

161161
protected Management.Storage.StorageManagementClient GetStorageV2Client()
162162
{
163-
var client = TestBase.GetServiceClient<Management.Storage.StorageManagementClient>(new CSMTestEnvironmentFactory());
163+
var client =
164+
TestBase.GetServiceClient<Management.Storage.StorageManagementClient>(new CSMTestEnvironmentFactory());
165+
164166
if (HttpMockServer.Mode == HttpRecorderMode.Playback)
165167
{
166168
client.LongRunningOperationInitialTimeout = 0;

src/ResourceManager/Sql/Commands.Sql.Test/ScenarioTests/ThreatDetectionTests.cs

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,8 @@ protected override void SetupManagementClients()
2727
var storageV2Client = GetStorageV2Client();
2828
var resourcesClient = GetResourcesClient();
2929
var authorizationClient = GetAuthorizationManagementClient();
30-
helper.SetupSomeOfManagementClients(sqlCSMClient, storageClient, storageV2Client, resourcesClient, authorizationClient);
30+
helper.SetupSomeOfManagementClients(sqlCSMClient, storageClient, storageV2Client, resourcesClient,
31+
authorizationClient);
3132
}
3233

3334
[Fact]

src/ResourceManager/Sql/Commands.Sql.Test/ScenarioTests/ThreatDetectionTests.ps1

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ function Test-ThreatDetectionDatabaseGetDefualtPolicy
3131

3232
# Assert
3333
Assert-AreEqual $policy.ThreatDetectionState "New"
34-
Assert-AreEqual $policy.NotificationRecipientsEmail ""
34+
Assert-AreEqual $policy.NotificationRecipientsEmails ""
3535
Assert-True {$policy.EmailAdmins}
3636
Assert-AreEqual $policy.ExcludedDetectionTypes.Length 0
3737
}
@@ -57,12 +57,12 @@ function Test-ThreatDetectionDatabaseUpdatePolicy
5757
{
5858
# Test
5959
Set-AzureRmSqlDatabaseAuditingPolicy -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -StorageAccountName $params.storageAccount
60-
Set-AzureRmSqlDatabaseThreatDetectionPolicy -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -NotificationRecipientsEmail "[email protected];[email protected]" -EmailAdmins $false -ExcludedDetectionType "Successful_SQLi", "Attempted_SQLi"
60+
Set-AzureRmSqlDatabaseThreatDetectionPolicy -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -NotificationRecipientsEmails "[email protected];[email protected]" -EmailAdmins $false -ExcludedDetectionType "Successful_SQLi", "Attempted_SQLi"
6161
$policy = Get-AzureRmSqlDatabaseThreatDetectionPolicy -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName
6262

6363
# Assert
6464
Assert-AreEqual $policy.ThreatDetectionState "Enabled"
65-
Assert-AreEqual $policy.NotificationRecipientsEmail "[email protected];[email protected]"
65+
Assert-AreEqual $policy.NotificationRecipientsEmails "[email protected];[email protected]"
6666
Assert-False {$policy.EmailAdmins}
6767
Assert-AreEqual $policy.ExcludedDetectionTypes.Length 2
6868
Assert-True {$policy.ExcludedDetectionTypes.Contains([Microsoft.Azure.Commands.Sql.ThreatDetection.Model.DetectionType]::Successful_SQLi)}
@@ -75,7 +75,7 @@ function Test-ThreatDetectionDatabaseUpdatePolicy
7575

7676
# Assert
7777
Assert-AreEqual $policy.ThreatDetectionState "Enabled"
78-
Assert-AreEqual $policy.NotificationRecipientsEmail "[email protected];[email protected]"
78+
Assert-AreEqual $policy.NotificationRecipientsEmails "[email protected];[email protected]"
7979
Assert-False {$policy.EmailAdmins}
8080
Assert-AreEqual $policy.ExcludedDetectionTypes.Length 7
8181
Assert-True {$policy.ExcludedDetectionTypes.Contains([Microsoft.Azure.Commands.Sql.ThreatDetection.Model.DetectionType]::Successful_SQLi)}
@@ -93,7 +93,7 @@ function Test-ThreatDetectionDatabaseUpdatePolicy
9393

9494
# Assert
9595
Assert-AreEqual $policy.ThreatDetectionState "Disabled"
96-
Assert-AreEqual $policy.NotificationRecipientsEmail "[email protected];[email protected]"
96+
Assert-AreEqual $policy.NotificationRecipientsEmails "[email protected];[email protected]"
9797
Assert-False {$policy.EmailAdmins}
9898
Assert-AreEqual $policy.ExcludedDetectionTypes.Length 7
9999
Assert-True {$policy.ExcludedDetectionTypes.Contains([Microsoft.Azure.Commands.Sql.ThreatDetection.Model.DetectionType]::Successful_SQLi)}
@@ -176,13 +176,13 @@ function Test-InvalidArgumentsThreatDetection
176176
Remove-AzureRmSqlDatabaseServerAuditing -ResourceGroupName $params.rgname -ServerName $params.serverName
177177
Assert-Throws {Set-AzureRmSqlDatabaseThreatDetectionPolicy -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName}
178178

179-
# Check that NotificationRecipientsEmail are in correct format
179+
# Check that NotificationRecipientsEmails are in correct format
180180
Set-AzureRmSqlDatabaseAuditingPolicy -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -StorageAccountName $params.storageAccount
181-
Assert-Throws {Set-AzureRmSqlDatabaseThreatDetectionPolicy -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -NotificationRecipientsEmail "kokogmail.com"}
181+
Assert-Throws {Set-AzureRmSqlDatabaseThreatDetectionPolicy -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -NotificationRecipientsEmails "kokogmail.com"}
182182

183-
# Check that EmailAdmins is not False and NotificationRecipientsEmail is not empty
183+
# Check that EmailAdmins is not False and NotificationRecipientsEmails is not empty
184184
Assert-Throws {Set-AzureRmSqlDatabaseThreatDetectionPolicy -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -EmailAdmins $false}
185-
Assert-Throws {Set-AzureRmSqlDatabaseThreatDetectionPolicy -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -EmailAdmins $false -NotificationRecipientsEmail ""}
185+
Assert-Throws {Set-AzureRmSqlDatabaseThreatDetectionPolicy -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -EmailAdmins $false -NotificationRecipientsEmails ""}
186186
}
187187
finally
188188
{

0 commit comments

Comments
 (0)