Skip to content

Commit 5782e7d

Browse files
author
maddieclayton
committed
Merge branch 'preview' of https://github.com/Azure/azure-powershell into clpsd1
2 parents 16a8d93 + ea26bbc commit 5782e7d

File tree

19 files changed

+2325
-1469
lines changed

19 files changed

+2325
-1469
lines changed

src/ResourceManager/Common/Commands.ScenarioTests.ResourceManager.Common/EnvironmentSetupHelper.cs

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -442,6 +442,8 @@ public void SetupAzureEnvironmentFromEnvironmentVariables(AzureModule mode)
442442
environment.GraphUrl = currentEnvironment.Endpoints.GraphUri.AbsoluteUri;
443443
environment.AzureDataLakeAnalyticsCatalogAndJobEndpointSuffix = currentEnvironment.Endpoints.DataLakeAnalyticsJobAndCatalogServiceUri.OriginalString.Replace("https://", ""); // because it is just a sufix
444444
environment.AzureDataLakeStoreFileSystemEndpointSuffix = currentEnvironment.Endpoints.DataLakeStoreServiceUri.OriginalString.Replace("https://", ""); // because it is just a sufix
445+
environment.StorageEndpointSuffix = AzureEnvironmentConstants.AzureStorageEndpointSuffix;
446+
445447
#if !NETSTANDARD
446448
if (!ProfileClient.Profile.EnvironmentTable.ContainsKey(testEnvironmentName))
447449
{

src/ResourceManager/Sql/Commands.Sql.Test/ScenarioTests/BlobAuditingTests.ps1

Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -516,6 +516,20 @@ function Test-BlobAuditingOnDatabase
516516
Assert-AreEqual $policy.RetentionInDays 8
517517
Assert-True { $policy.StorageKeyType -eq "Primary"}
518518

519+
# Test - Tests setting blob auditing policy on a database with a storage account in a subscription which is different than the database's subscription
520+
Set-AzureRmSqlDatabaseAuditing -State Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -StorageAccountName datasecpstests -AuditActionGroup "SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP", "FAILED_DATABASE_AUTHENTICATION_GROUP" -RetentionInDays 8 -StorageAccountSubscriptionId b403f7d6-87fb-4a39-8b34-b2172f985b78
521+
$policy = Get-AzureRmSqlDatabaseAuditing -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName
522+
523+
# Assert
524+
Assert-AreEqual $policy.AuditState "Enabled"
525+
Assert-AreEqual $policy.AuditActionGroup.Length 2
526+
Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)}
527+
Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)}
528+
Assert-AreEqual $policy.AuditAction.Length 0
529+
Assert-AreEqual $policy.RetentionInDays 8
530+
Assert-True { $policy.StorageKeyType -eq "Primary"}
531+
Assert-AreEqual $policy.StorageAccountSubscriptionId "b403f7d6-87fb-4a39-8b34-b2172f985b78"
532+
519533
# Test
520534
Set-AzureRmSqlDatabaseAuditing -State Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -StorageAccountName $params.storageAccount -StorageKeyType "Secondary" -AuditActionGroup "SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP", "FAILED_DATABASE_AUTHENTICATION_GROUP" -RetentionInDays 8 -AuditAction "UPDATE ON database::[$($params.databaseName)] BY [public]"
521535
$policy = Get-AzureRmSqlDatabaseAuditing -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName
@@ -579,6 +593,19 @@ function Test-BlobAuditingOnServer
579593
Assert-AreEqual $policy.RetentionInDays 8
580594
Assert-AreEqual $policy.StorageKeyType "Primary"
581595

596+
# Test - Tests setting blob auditing policy on a server with a storage account in a subscription which is different than the server's subscription
597+
Set-AzureRmSqlServerAuditing -State Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -StorageAccountName datasecpstests -AuditActionGroup "SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP", "FAILED_DATABASE_AUTHENTICATION_GROUP" -RetentionInDays 8 -StorageAccountSubscriptionId b403f7d6-87fb-4a39-8b34-b2172f985b78
598+
$policy = Get-AzureRmSqlServerAuditing -ResourceGroupName $params.rgname -ServerName $params.serverName
599+
600+
# Assert
601+
Assert-AreEqual $policy.AuditState "Enabled"
602+
Assert-AreEqual $policy.AuditActionGroup.Length 2
603+
Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)}
604+
Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)}
605+
Assert-AreEqual $policy.RetentionInDays 8
606+
Assert-AreEqual $policy.StorageKeyType "Primary"
607+
Assert-AreEqual $policy.StorageAccountSubscriptionId "b403f7d6-87fb-4a39-8b34-b2172f985b78"
608+
582609
# Test
583610
Set-AzureRmSqlServerAuditing -State Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -StorageAccountName $params.storageAccount -StorageKeyType "Secondary" -AuditActionGroup "SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP", "FAILED_DATABASE_AUTHENTICATION_GROUP" -RetentionInDays 8
584611
$policy = Get-AzureRmSqlServerAuditing -ResourceGroupName $params.rgname -ServerName $params.serverName

0 commit comments

Comments
 (0)