@@ -191,9 +191,9 @@ function Test-DatabaseUpdatePolicyWithEventTypes
191
191
192
192
# Assert
193
193
Assert-AreEqual $policy.EventType.Length 3
194
- Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Security .Model.AuditEventType ]::PlainSQL_Success)}
195
- Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Security .Model.AuditEventType ]::ParameterizedSQL_Success)}
196
- Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Security .Model.AuditEventType ]::ParameterizedSQL_Failure)}
194
+ Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Auditing .Model.AuditEventType ]::PlainSQL_Success)}
195
+ Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Auditing .Model.AuditEventType ]::ParameterizedSQL_Success)}
196
+ Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Auditing .Model.AuditEventType ]::ParameterizedSQL_Failure)}
197
197
198
198
# Test
199
199
Set-AzureSqlDatabaseAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName - StorageAccountName $params.storageAccount - EventType " None"
@@ -235,9 +235,9 @@ function Test-ServerUpdatePolicyWithEventTypes
235
235
236
236
# Assert
237
237
Assert-AreEqual $policy.EventType.Length 3
238
- Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Security .Model.AuditEventType ]::PlainSQL_Success)}
239
- Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Security .Model.AuditEventType ]::ParameterizedSQL_Success)}
240
- Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Security .Model.AuditEventType ]::ParameterizedSQL_Failure)}
238
+ Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Auditing .Model.AuditEventType ]::PlainSQL_Success)}
239
+ Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Auditing .Model.AuditEventType ]::ParameterizedSQL_Success)}
240
+ Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Auditing .Model.AuditEventType ]::ParameterizedSQL_Failure)}
241
241
242
242
243
243
# Test
@@ -451,7 +451,7 @@ function Test-DatabaseDisableEnableKeepProperties
451
451
Assert-AreEqual $policy.AuditState " Enabled"
452
452
Assert-AreEqual $policy.UseServerDefault " Disabled"
453
453
Assert-AreEqual $policy.EventType.Length 1
454
- Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Security .Model.AuditEventType ]::Login_Failure)}
454
+ Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Auditing .Model.AuditEventType ]::Login_Failure)}
455
455
}
456
456
finally
457
457
{
@@ -483,7 +483,7 @@ function Test-ServerDisableEnableKeepProperties
483
483
Assert-AreEqual $policy.StorageAccountName $params.storageAccount
484
484
Assert-AreEqual $policy.AuditState " Enabled"
485
485
Assert-AreEqual $policy.EventType.Length 1
486
- Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Security .Model.AuditEventType ]::TransactionManagement_Success)}
486
+ Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Auditing .Model.AuditEventType ]::TransactionManagement_Success)}
487
487
}
488
488
finally
489
489
{
0 commit comments