Skip to content

Commit abd74b6

Browse files
committed
fix merge conflicts
2 parents 81ae335 + 3ea604f commit abd74b6

File tree

23 files changed

+10977
-4109
lines changed

23 files changed

+10977
-4109
lines changed

src/ResourceManager/Network/Commands.Network/help/AzureRM.Network.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -239,6 +239,12 @@ Lists network usages for a subscription
239239
### [Get-AzureRmNetworkWatcher](Get-AzureRmNetworkWatcher.md)
240240
Gets the properties of a Network Watcher
241241

242+
### [Get-AzureRmNetworkWatcherReachabilityProvidersList](Get-AzureRmNetworkWatcherReachabilityProvidersList.md)
243+
Lists all available internet service providers for a specified Azure region
244+
245+
### [Get-AzureRMNetworkWatcherReachabilityReport](Get-AzureRMNetworkWatcherReachabilityReport.md)
246+
Gets the relative latency score for internet service providers from a specified location to Azure regions
247+
242248
### [Get-AzureRmNetworkWatcherFlowLogStatus](Get-AzureRmNetworkWatcherFlowLogStatus.md)
243249
Gets the status of flow logging on a resource.
244250

src/ResourceManager/Resources/ChangeLog.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,8 @@
2222
- Users can now use Get-AzureRMRoleAssignment with assignments having roledefinition names irrespective of the type of role
2323
* Fixed issue where Set-AzureRMRoleRoleDefinition used to throw RD not found error when there was a new scope in assignablescopes
2424
- Users can now use Set-AzureRMRoleRoleDefinition with assignable scopes including new scopes irrespective of the position of the scope
25+
* Allow scopes to end with "/"
26+
- Users can now use RoleDefinition and RoleAssignment commandlets with scopes ending with "/" ,consistent with API and CLI
2527

2628
## Version 5.0.0
2729
* Add support for online help

src/ResourceManager/Resources/Commands.Resources.Test/RoleAssignment/RoleAssignmentUnitTests.cs

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ public void VerifyInvalidScopes()
3333
scopeAndErrors.Add("test", "Scope 'test' should begin with '/subscriptions' or '/providers'.");
3434
scopeAndErrors.Add("/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/Should be 'ResourceGroups'/any group name", "Scope '/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/Should be 'ResourceGroups'/any group name' should begin with '/subscriptions/<subid>/resourceGroups'.");
3535
scopeAndErrors.Add("/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups", "Scope '/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups' should have even number of parts.");
36-
scopeAndErrors.Add("/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups/", "Scope '/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups/' should not have any empty part.");
36+
scopeAndErrors.Add("/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups/", "Scope '/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups' should have even number of parts.");
3737
scopeAndErrors.Add("/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups/groupname/Should be 'Providers'/any provider name", "Scope '/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups/groupname/Should be 'Providers'/any provider name' should begin with '/subscriptions/<subid>/resourceGroups/<groupname>/providers'.");
3838
scopeAndErrors.Add("/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups/groupname/Providers/providername", "Scope '/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups/groupname/Providers/providername' should have at least one pair of resource type and resource name. e.g. '/subscriptions/<subid>/resourceGroups/<groupname>/providers/<providername>/<resourcetype>/<resourcename>'.");
3939
foreach (var kvp in scopeAndErrors)
@@ -52,6 +52,7 @@ public void VerifyValidScopes()
5252
validScopes.Add("/providers/providername");
5353
validScopes.Add("/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups/groupname");
5454
validScopes.Add("/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups/groupname/Providers/providername/type/typename");
55+
validScopes.Add("/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups/groupname/Providers/providername/type/typename/");
5556

5657
foreach (var scope in validScopes)
5758
{

src/ResourceManager/Resources/Commands.Resources.Test/ScenarioTests/RoleAssignmentTests.ps1

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ function Test-RaDeleteByPSRoleAssignment
7171
Assert-AreEqual 1 $users.Count "There should be at least one user to run the test."
7272

7373
# Test
74-
[Microsoft.Azure.Commands.Resources.Models.Authorization.AuthorizationClient]::RoleAssignmentNames.Enqueue("fa1a4d3b-2cca-406b-8956-6b6b32377641")
74+
[Microsoft.Azure.Commands.Resources.Models.Authorization.AuthorizationClient]::RoleAssignmentNames.Enqueue("f747531e-da33-43b9-b726-04675abf1939")
7575
$newAssignment = New-AzureRmRoleAssignment `
7676
-ObjectId $users[0].Id.Guid `
7777
-RoleDefinitionName $definitionName `
@@ -95,14 +95,15 @@ function Test-RaByScope
9595
$subscription = Get-AzureRmSubscription
9696
$resourceGroups = Get-AzureRmResourceGroup | Select-Object -Last 1 -Wait
9797
$scope = '/subscriptions/'+ $subscription[0].Id +'/resourceGroups/' + $resourceGroups[0].ResourceGroupName
98+
$assignmentScope = $scope +"/"
9899
Assert-AreEqual 1 $users.Count "There should be at least one user to run the test."
99100

100101
# Test
101102
[Microsoft.Azure.Commands.Resources.Models.Authorization.AuthorizationClient]::RoleAssignmentNames.Enqueue("f747531e-da33-43b9-b726-04675abf1939")
102103
$newAssignment = New-AzureRmRoleAssignment `
103104
-ObjectId $users[0].Id.Guid `
104105
-RoleDefinitionName $definitionName `
105-
-Scope $scope
106+
-Scope $assignmentScope
106107

107108
# cleanup
108109
DeleteRoleAssignment $newAssignment
@@ -208,7 +209,7 @@ function Test-RaValidateInputParameters ($cmdName)
208209
Assert-Throws { &$cmdName -Scope $scope -ObjectId $groups[0].Id.Guid -RoleDefinitionName $definitionName } $invalidScope
209210

210211
$scope = "/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups/"
211-
$invalidScope = "Scope '/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups/' should not have any empty part."
212+
$invalidScope = "Scope '/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups' should have even number of parts."
212213
Assert-Throws { &$cmdName -Scope $scope -ObjectId $groups[0].Id.Guid -RoleDefinitionName $definitionName } $invalidScope
213214

214215
$scope = "/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups/groupname/Should be 'Providers'/any provider name"
@@ -220,7 +221,7 @@ function Test-RaValidateInputParameters ($cmdName)
220221
Assert-Throws { &$cmdName -Scope $scope -ObjectId $groups[0].Id.Guid -RoleDefinitionName $definitionName } $invalidScope
221222

222223
# Check if ResourceType is valid
223-
Assert-AreEqual $resource.ResourceType "Microsoft.ServiceBus/namespaces"
224+
Assert-AreEqual $resource.ResourceType "Microsoft.Web/sites"
224225
$subscription = Get-AzureRmSubscription | Select-Object -Last 1 -Wait
225226
# Below invalid resource type should not return 'Not supported api version'.
226227
$resource.ResourceType = "Microsoft.KeyVault/"
@@ -326,7 +327,7 @@ function Test-RaDeletionByScope
326327
Assert-AreEqual 1 $users.Count "There should be at least one user to run the test."
327328

328329
# Test
329-
[Microsoft.Azure.Commands.Resources.Models.Authorization.AuthorizationClient]::RoleAssignmentNames.Enqueue("fa1a4d3b-2cca-406b-8956-6b6b32377641")
330+
[Microsoft.Azure.Commands.Resources.Models.Authorization.AuthorizationClient]::RoleAssignmentNames.Enqueue("f747531e-da33-43b9-b726-04675abf1939")
330331
$newAssignment = New-AzureRmRoleAssignment `
331332
-ObjectId $users[0].Id.Guid `
332333
-RoleDefinitionName $definitionName `
@@ -360,7 +361,7 @@ function Test-RaDeletionByScopeAtRootScope
360361
Assert-AreEqual 1 $users.Count "There should be at least one user to run the test."
361362

362363
# Test
363-
[Microsoft.Azure.Commands.Resources.Models.Authorization.AuthorizationClient]::RoleAssignmentNames.Enqueue("fa1a4d3b-2cca-406b-8956-6b6b32377641")
364+
[Microsoft.Azure.Commands.Resources.Models.Authorization.AuthorizationClient]::RoleAssignmentNames.Enqueue("f747531e-da33-43b9-b726-04675abf1939")
364365
$newAssignment = New-AzureRmRoleAssignment `
365366
-ObjectId $users[0].Id.Guid `
366367
-RoleDefinitionName $definitionName `

src/ResourceManager/Resources/Commands.Resources.Test/ScenarioTests/RoleDefinitionTests.ps1

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -25,24 +25,24 @@ function Test-RoleDefinitionCreateTests
2525
New-AzureRmRoleDefinition -InputFile .\Resources\NewRoleDefinition.json
2626

2727
$rd = Get-AzureRmRoleDefinition -Name $rdName
28-
Assert-AreEqual "Test role" $rd.Description
29-
Assert-AreEqual $true $rd.IsCustom
30-
Assert-NotNull $rd.Actions
31-
Assert-AreEqual "Microsoft.Authorization/*/read" $rd.Actions[0]
32-
Assert-AreEqual "Microsoft.Support/*" $rd.Actions[1]
33-
Assert-NotNull $rd.AssignableScopes
34-
35-
# Basic positive case - read from object
36-
$roleDef = Get-AzureRmRoleDefinition -Name "Reader"
37-
$roleDef.Id = $null
38-
$roleDef.Name = "New Custom Reader"
39-
$roleDef.Actions.Add("Microsoft.ClassicCompute/virtualMachines/restart/action")
40-
$roleDef.Description = "Read, monitor and restart virtual machines"
28+
Assert-AreEqual "Test role" $rd.Description
29+
Assert-AreEqual $true $rd.IsCustom
30+
Assert-NotNull $rd.Actions
31+
Assert-AreEqual "Microsoft.Authorization/*/read" $rd.Actions[0]
32+
Assert-AreEqual "Microsoft.Support/*" $rd.Actions[1]
33+
Assert-NotNull $rd.AssignableScopes
34+
35+
# Basic positive case - read from object
36+
$roleDef = Get-AzureRmRoleDefinition -Name "Reader"
37+
$roleDef.Id = $null
38+
$roleDef.Name = "New Custom Reader"
39+
$roleDef.Actions.Add("Microsoft.ClassicCompute/virtualMachines/restart/action")
40+
$roleDef.Description = "Read, monitor and restart virtual machines"
4141
$roleDef.AssignableScopes[0] = "/subscriptions/4004a9fd-d58e-48dc-aeb2-4a4aec58606f"
4242

4343
[Microsoft.Azure.Commands.Resources.Models.Authorization.AuthorizationClient]::RoleDefinitionNames.Enqueue("032F61D2-ED09-40C9-8657-26A273DA7BAE")
44-
New-AzureRmRoleDefinition -Role $roleDef
45-
$addedRoleDef = Get-AzureRmRoleDefinition -Name "New Custom Reader"
44+
New-AzureRmRoleDefinition -Role $roleDef
45+
$addedRoleDef = Get-AzureRmRoleDefinition -Name "New Custom Reader"
4646

4747
Assert-NotNull $addedRoleDef.Actions
4848
Assert-AreEqual $roleDef.Description $addedRoleDef.Description
@@ -290,7 +290,7 @@ function Test-RdValidateInputParameters ($cmdName)
290290
Assert-Throws { &$cmdName -Scope $scope -Id D46245F8-7E18-4499-8E1F-784A6DA5BE25} $invalidScope
291291

292292
$scope = "/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups/"
293-
$invalidScope = "Scope '/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups/' should not have any empty part."
293+
$invalidScope = "Scope '/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups' should have even number of parts."
294294
Assert-Throws { &$cmdName -Scope $scope -Id D46245F8-7E18-4499-8E1F-784A6DA5BE25} $invalidScope
295295

296296
$scope = "/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups/groupname/Should be 'Providers'/any provider name"
@@ -329,7 +329,7 @@ function Test-RdValidateInputParameters2 ($cmdName)
329329
Assert-Throws { &$cmdName -Role $roleDef } $invalidScope
330330

331331
$scope = "/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups/"
332-
$invalidScope = "Scope '/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups/' should not have any empty part."
332+
$invalidScope = "Scope '/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups' should have even number of parts."
333333
$roleDef.AssignableScopes[0] = $scope;
334334
Assert-Throws { &$cmdName -Role $roleDef } $invalidScope
335335

src/ResourceManager/Resources/Commands.Resources.Test/SessionRecords/Microsoft.Azure.Commands.Resources.Test.ScenarioTests.RoleAssignmentTests/RaByResource.json

Lines changed: 983 additions & 327 deletions
Large diffs are not rendered by default.

src/ResourceManager/Resources/Commands.Resources.Test/SessionRecords/Microsoft.Azure.Commands.Resources.Test.ScenarioTests.RoleAssignmentTests/RaByResourceGroup.json

Lines changed: 1195 additions & 369 deletions
Large diffs are not rendered by default.

src/ResourceManager/Resources/Commands.Resources.Test/SessionRecords/Microsoft.Azure.Commands.Resources.Test.ScenarioTests.RoleAssignmentTests/RaByScope.json

Lines changed: 1246 additions & 420 deletions
Large diffs are not rendered by default.

src/ResourceManager/Resources/Commands.Resources.Test/SessionRecords/Microsoft.Azure.Commands.Resources.Test.ScenarioTests.RoleAssignmentTests/RaByServicePrincipal.json

Lines changed: 193 additions & 193 deletions
Large diffs are not rendered by default.

src/ResourceManager/Resources/Commands.Resources.Test/SessionRecords/Microsoft.Azure.Commands.Resources.Test.ScenarioTests.RoleAssignmentTests/RaByUpn.json

Lines changed: 1210 additions & 384 deletions
Large diffs are not rendered by default.

0 commit comments

Comments
 (0)