Skip to content

Commit 6b28948

Browse files
authored
Merge pull request #3 from Azure/preview
Sync
2 parents e2835f9 + 12da7cd commit 6b28948

File tree

308 files changed

+63838
-583169
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

308 files changed

+63838
-583169
lines changed

src/ResourceManager/Compute/ChangeLog.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,11 @@
1818
- Additional information about change #1
1919
-->
2020
## Current Release
21+
* `Get-AzureRmVmDiskEncryptionStatus` fixes an issue observed for VMs with no data disks
22+
* Update Compute client library version to fix following cmdlets
23+
- Grant-AzureRmDiskAccess
24+
- Grant-AzureRmSnapshotAccess
25+
- Save-AzureRmVMImage
2126

2227
## Version 5.1.0
2328
* VMSS VM Update feature

src/ResourceManager/Compute/Commands.Compute.Test/Commands.Compute.Test.Netcore.csproj

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@
2727

2828
<ItemGroup>
2929
<PackageReference Include="Microsoft.Azure.Graph.RBAC" Version="3.4.0-preview" />
30-
<PackageReference Include="Microsoft.Azure.Management.Compute" Version="18.0.0" />
30+
<PackageReference Include="Microsoft.Azure.Management.Compute" Version="20.0.0" />
3131
<PackageReference Include="Microsoft.Azure.Management.KeyVault" Version="2.4.1-alpha" />
3232
<PackageReference Include="Microsoft.Azure.Management.Network" Version="19.0.2-preview" />
3333
<PackageReference Include="Moq" Version="4.7.145" />

src/ResourceManager/Compute/Commands.Compute.Test/Commands.Compute.Test.csproj

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@
6464
<HintPath>..\..\..\packages\Microsoft.Azure.Management.Authorization.2.0.0\lib\net40\Microsoft.Azure.Management.Authorization.dll</HintPath>
6565
</Reference>
6666
<Reference Include="Microsoft.Azure.Management.Compute">
67-
<HintPath>..\..\..\packages\Microsoft.Azure.Management.Compute.18.0.0\lib\net452\Microsoft.Azure.Management.Compute.dll</HintPath>
67+
<HintPath>..\..\..\packages\Microsoft.Azure.Management.Compute.20.0.0\lib\net452\Microsoft.Azure.Management.Compute.dll</HintPath>
6868
</Reference>
6969
<Reference Include="Microsoft.Azure.Management.Network, Version=19.0.2.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=MSIL">
7070
<HintPath>..\..\..\packages\Microsoft.Azure.Management.Network.19.0.2-preview\lib\net452\Microsoft.Azure.Management.Network.dll</HintPath>

src/ResourceManager/Compute/Commands.Compute.Test/ScenarioTests/AEMExtensionTests.cs

Lines changed: 18 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -24,8 +24,12 @@ public AEMExtensionTests(Xunit.Abstractions.ITestOutputHelper output)
2424
ServiceManagemenet.Common.Models.XunitTracingInterceptor.AddToContext(new ServiceManagemenet.Common.Models.XunitTracingInterceptor(output));
2525
}
2626

27-
[Fact(Skip = "Need service team to re-record test after changes to the ClientRuntime.")]
28-
[Trait("Re-record", "ClientRuntime changes")]
27+
#if NETSTANDARD
28+
[Fact(Skip = "Get-Location in Common.ps1 is not working correctly for NETSTANDARD")]
29+
[Trait(Category.RunType, Category.DesktopOnly)]
30+
#else
31+
[Fact]
32+
#endif
2933
[Trait(Category.AcceptanceType, Category.CheckIn)]
3034
public void TestAEMExtensionBasicWindowsWAD()
3135
{
@@ -80,8 +84,12 @@ public void TestAEMExtensionAdvancedWindowsWAD()
8084
ComputeTestController.NewInstance.RunPsTest("Test-AEMExtensionAdvancedWindowsWAD");
8185
}
8286

83-
[Fact(Skip = "Need service team to re-record test after changes to the ClientRuntime.")]
84-
[Trait("Re-record", "ClientRuntime changes")]
87+
#if NETSTANDARD
88+
[Fact(Skip = "Get-Location in Common.ps1 is not working correctly for NETSTANDARD")]
89+
[Trait(Category.RunType, Category.DesktopOnly)]
90+
#else
91+
[Fact]
92+
#endif
8593
[Trait(Category.AcceptanceType, Category.CheckIn)]
8694
public void TestAEMExtensionAdvancedWindows()
8795
{
@@ -107,8 +115,12 @@ public void TestAEMExtensionAdvancedLinux()
107115
ComputeTestController.NewInstance.RunPsTest("Test-AEMExtensionAdvancedLinux");
108116
}
109117

110-
[Fact(Skip = "Need service team to re-record test after changes to the ClientRuntime.")]
111-
[Trait("Re-record", "ClientRuntime changes")]
118+
#if NETSTANDARD
119+
[Fact(Skip = "Get-Location in Common.ps1 is not working correctly for NETSTANDARD")]
120+
[Trait(Category.RunType, Category.DesktopOnly)]
121+
#else
122+
[Fact]
123+
#endif
112124
[Trait(Category.AcceptanceType, Category.CheckIn)]
113125
public void TestAEMExtensionAdvancedWindowsMD()
114126
{

src/ResourceManager/Compute/Commands.Compute.Test/ScenarioTests/AvailabilitySetTests.ps1

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -70,6 +70,12 @@ function Test-AvailabilitySet
7070
$job = Remove-AzureRmAvailabilitySet -ResourceGroupName $rgname -Name $asetName -Force -AsJob;
7171
$result = $job | Wait-Job;
7272
Assert-AreEqual "Completed" $result.State;
73+
$st = $job | Receive-Job;
74+
$id = New-Object System.Guid;
75+
Assert-True { [System.Guid]::TryParse($st.RequestId, [REF] $id) };
76+
Assert-AreEqual "OK" $st.StatusCode;
77+
Assert-AreEqual "OK" $st.ReasonPhrase;
78+
Assert-True { $st.IsSuccessStatusCode };
7379

7480
$asets = Get-AzureRmAvailabilitySet -ResourceGroupName $rgname;
7581
Assert-AreEqual $asets $null;

src/ResourceManager/Compute/Commands.Compute.Test/ScenarioTests/ComputeTestCommon.ps1

Lines changed: 85 additions & 58 deletions
Original file line numberDiff line numberDiff line change
@@ -99,60 +99,60 @@ function Create-KeyVault
9999
{
100100
Param
101101
(
102-
[Parameter(Mandatory=$true, Position=0)]
103-
[string] $resourceGroupName,
104-
[Parameter(Mandatory=$true, Position=1)]
105-
[string] $location,
106-
[Parameter(Mandatory=$false, Position=2)]
107-
[string] $vaultName
102+
[Parameter(Mandatory=$true, Position=0)]
103+
[string] $resourceGroupName,
104+
[Parameter(Mandatory=$true, Position=1)]
105+
[string] $location,
106+
[Parameter(Mandatory=$false, Position=2)]
107+
[string] $vaultName
108108
)
109109

110-
# initialize parameters if needed
111-
if ([string]::IsNullOrEmpty($resourceGroupName)) { $resourceGroupName = Get-ComputeTestResourceName }
110+
# initialize parameters if needed
111+
if ([string]::IsNullOrEmpty($resourceGroupName)) { $resourceGroupName = Get-ComputeTestResourceName }
112112
if ([string]::IsNullOrEmpty($location)) { $location = Get-ComputeVMLocation }
113113
if ([string]::IsNullOrEmpty($vaultName)) { $vaultName = 'kv' + $resourceGroupName }
114114

115-
# create vault
116-
$vault = New-AzureRmKeyVault -VaultName $vaultName -ResourceGroupName $resourceGroupName -Location $location -Sku standard
117-
$vault = Get-AzureRmKeyVault -VaultName $vaultName -ResourceGroupName $resourceGroupName
118-
119-
# create access policy
120-
$servicePrincipalName = (Get-AzureRmContext).Account.Id
121-
Assert-NotNull $servicePrincipalName
122-
#Set-AzureRmKeyVaultAccessPolicy -VaultName $vaultName -ResourceGroupName $resourceGroupName -ServicePrincipalName $servicePrincipalName -PermissionsToKeys Create
123-
Set-AzureRmKeyVaultAccessPolicy -VaultName $vaultName -ResourceGroupName $resourceGroupName -EnabledForDiskEncryption -EnabledForDeployment -EnabledForTemplateDeployment
124-
125-
# create key encryption key
126-
#$kekName = 'kek' + $resourceGroupName
127-
#$kek = Add-AzureKeyVaultKey -VaultName $vaultName -Name $kekName -Destination "Software"
128-
129-
# return the newly created key vault properties
130-
$properties = New-Object PSObject -Property @{
131-
DiskEncryptionKeyVaultId = $vault.ResourceId
132-
DiskEncryptionKeyVaultUrl = $vault.VaultUri
133-
#KeyEncryptionKeyVaultId = $vault.ResourceId
134-
#KeyEncryptionKeyUrl = $kek.Key.kid
135-
}
136-
return $properties
115+
# create vault
116+
$vault = New-AzureRmKeyVault -VaultName $vaultName -ResourceGroupName $resourceGroupName -Location $location -Sku standard
117+
$vault = Get-AzureRmKeyVault -VaultName $vaultName -ResourceGroupName $resourceGroupName
118+
119+
# create access policy
120+
$servicePrincipalName = (Get-AzureRmContext).Account.Id
121+
Assert-NotNull $servicePrincipalName
122+
#Set-AzureRmKeyVaultAccessPolicy -VaultName $vaultName -ResourceGroupName $resourceGroupName -ServicePrincipalName $servicePrincipalName -PermissionsToKeys Create
123+
Set-AzureRmKeyVaultAccessPolicy -VaultName $vaultName -ResourceGroupName $resourceGroupName -EnabledForDiskEncryption -EnabledForDeployment -EnabledForTemplateDeployment
124+
125+
# create key encryption key
126+
#$kekName = 'kek' + $resourceGroupName
127+
#$kek = Add-AzureKeyVaultKey -VaultName $vaultName -Name $kekName -Destination "Software"
128+
129+
# return the newly created key vault properties
130+
$properties = New-Object PSObject -Property @{
131+
DiskEncryptionKeyVaultId = $vault.ResourceId
132+
DiskEncryptionKeyVaultUrl = $vault.VaultUri
133+
#KeyEncryptionKeyVaultId = $vault.ResourceId
134+
#KeyEncryptionKeyUrl = $kek.Key.kid
135+
}
136+
return $properties
137137
}
138138

139139
# Create a new virtual machine with other necessary resources configured
140140
function Create-VirtualMachine
141-
{
141+
{
142142
Param
143143
(
144-
[Parameter(Mandatory=$false, Position=0)]
145-
[string] $rgname,
146-
[Parameter(Mandatory=$false, Position=1)]
147-
[string] $vmname,
148-
[Parameter(Mandatory=$false, Position=2)]
149-
[string] $loc
144+
[Parameter(Mandatory=$false, Position=0)]
145+
[string] $rgname,
146+
[Parameter(Mandatory=$false, Position=1)]
147+
[string] $vmname,
148+
[Parameter(Mandatory=$false, Position=2)]
149+
[string] $loc
150150
)
151151

152152
# initialize parameters if needed
153-
if ([string]::IsNullOrEmpty($rgname)) { $rgname = Get-ComputeTestResourceName }
154-
if ([string]::IsNullOrEmpty($vmname)) { $vmname = 'vm' + $rgname }
155-
if ([string]::IsNullOrEmpty($loc)) { $loc = Get-ComputeVMLocation }
153+
if ([string]::IsNullOrEmpty($rgname)) { $rgname = Get-ComputeTestResourceName }
154+
if ([string]::IsNullOrEmpty($vmname)) { $vmname = 'vm' + $rgname }
155+
if ([string]::IsNullOrEmpty($loc)) { $loc = Get-ComputeVMLocation }
156156

157157
# Common
158158
$g = New-AzureRmResourceGroup -Name $rgname -Location $loc -Force;
@@ -556,65 +556,92 @@ function Get-ResourceProviderLocation
556556

557557
function Get-ComputeVMLocation
558558
{
559-
Get-Location "Microsoft.Compute" "virtualMachines" "East US";
559+
Get-Location "Microsoft.Compute" "virtualMachines" "East US";
560560
}
561561

562562
function Get-ComputeAvailabilitySetLocation
563563
{
564-
Get-Location "Microsoft.Compute" "availabilitySets" "West US";
564+
Get-Location "Microsoft.Compute" "availabilitySets" "West US";
565565
}
566566

567567
function Get-ComputeVMExtensionLocation
568568
{
569-
Get-Location "Microsoft.Compute" "virtualMachines/extensions" "West US";
569+
Get-Location "Microsoft.Compute" "virtualMachines/extensions" "West US";
570570
}
571571

572572
function Get-ComputeVMDiagnosticSettingLocation
573573
{
574-
Get-Location "Microsoft.Compute" "virtualMachines/diagnosticSettings" "West US";
574+
Get-Location "Microsoft.Compute" "virtualMachines/diagnosticSettings" "West US";
575575
}
576576

577577
function Get-ComputeVMMetricDefinitionLocation
578578
{
579-
Get-Location "Microsoft.Compute" "virtualMachines/metricDefinitions" "West US";
579+
Get-Location "Microsoft.Compute" "virtualMachines/metricDefinitions" "West US";
580580
}
581581

582582
function Get-ComputeOperationLocation
583583
{
584-
Get-Location "Microsoft.Compute" "locations/operations" "West US";
584+
Get-Location "Microsoft.Compute" "locations/operations" "West US";
585585
}
586586

587587
function Get-ComputeVMSizeLocation
588588
{
589-
Get-Location "Microsoft.Compute" "locations/vmSizes" "West US";
589+
Get-Location "Microsoft.Compute" "locations/vmSizes" "West US";
590590
}
591591

592592
function Get-ComputeUsageLocation
593593
{
594-
Get-Location "Microsoft.Compute" "locations/usages" "West US";
594+
Get-Location "Microsoft.Compute" "locations/usages" "West US";
595595
}
596596

597597
function Get-ComputePublisherLocation
598598
{
599-
Get-Location "Microsoft.Compute" "locations/publishers" "West US";
599+
Get-Location "Microsoft.Compute" "locations/publishers" "West US";
600600
}
601601

602602
function Get-SubscriptionIdFromResourceGroup
603603
{
604-
param ([string] $rgname)
604+
param ([string] $rgname)
605605

606-
$rg = Get-AzureRmResourceGroup -ResourceGroupName $rgname;
606+
$rg = Get-AzureRmResourceGroup -ResourceGroupName $rgname;
607607

608-
$rgid = $rg.ResourceId;
608+
$rgid = $rg.ResourceId;
609609

610-
# ResouceId is a form of "/subscriptions/<subId>/resourceGroups/<resourgGroupName>"
611-
# So return the second part to get subscription Id
612-
$first = $rgid.IndexOf('/', 1);
613-
$last = $rgid.IndexOf('/', $first + 1);
614-
return $rgid.Substring($first + 1, $last - $first - 1);
610+
# ResouceId is a form of "/subscriptions/<subId>/resourceGroups/<resourgGroupName>"
611+
# So return the second part to get subscription Id
612+
$first = $rgid.IndexOf('/', 1);
613+
$last = $rgid.IndexOf('/', $first + 1);
614+
return $rgid.Substring($first + 1, $last - $first - 1);
615615
}
616616

617617
function Get-ComputeVmssLocation
618618
{
619-
Get-ResourceProviderLocation "Microsoft.Compute/virtualMachineScaleSets"
619+
Get-ResourceProviderLocation "Microsoft.Compute/virtualMachineScaleSets"
620620
}
621+
622+
function Verify-PSComputeLongRunningOperation
623+
{
624+
param ($result)
625+
626+
Assert-NotNull $result;
627+
$id = New-Object System.Guid;
628+
Assert-True { [System.Guid]::TryParse($result.OperationId, [REF] $id) };
629+
Assert-AreEqual "Succeeded" $result.Status;
630+
Assert-NotNull $result.StartTime;
631+
Assert-NotNull $result.EndTime;
632+
Assert-Null $result.Error;
633+
}
634+
635+
function Verify-PSOperationStatusResponse
636+
{
637+
param ($result)
638+
639+
Assert-NotNull $result;
640+
$id = New-Object System.Guid;
641+
Assert-True { [System.Guid]::TryParse($result.Name, [REF] $id) };
642+
Assert-AreEqual "Succeeded" $result.Status;
643+
Assert-NotNull $result.StartTime;
644+
Assert-NotNull $result.EndTime;
645+
Assert-Null $result.Error;
646+
}
647+

src/ResourceManager/Compute/Commands.Compute.Test/ScenarioTests/ContainerServiceTests.cs

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -24,17 +24,15 @@ public ContainerServiceTests(Xunit.Abstractions.ITestOutputHelper output)
2424
ServiceManagemenet.Common.Models.XunitTracingInterceptor.AddToContext(new ServiceManagemenet.Common.Models.XunitTracingInterceptor(output));
2525
}
2626

27-
[Fact(Skip = "Need service team to re-record test after changes to the ClientRuntime.")]
27+
[Fact]
2828
[Trait(Category.AcceptanceType, Category.CheckIn)]
29-
[Trait("Re-record", "ClientRuntime changes")]
3029
public void TestContainerService()
3130
{
3231
ComputeTestController.NewInstance.RunPsTest("Test-ContainerService");
3332
}
3433

35-
[Fact(Skip = "Need service team to re-record test after changes to the ClientRuntime.")]
34+
[Fact]
3635
[Trait(Category.AcceptanceType, Category.CheckIn)]
37-
[Trait("Re-record", "ClientRuntime changes")]
3836
public void TestContainerServiceUpdate()
3937
{
4038
ComputeTestController.NewInstance.RunPsTest("Test-ContainerServiceUpdate");

src/ResourceManager/Compute/Commands.Compute.Test/ScenarioTests/ContainerServiceTests.ps1

Lines changed: 14 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -36,26 +36,13 @@ function Test-ContainerService
3636
$orchestratorType = 'DCOS';
3737
$adminUserName = 'acslinuxadmin';
3838
$sshPublicKey =
39-
"MIIDszCCApugAwIBAgIJALBV9YJCF/tAMA0GCSqGSIb3DQEBBQUAMEUxCzAJBgNV" +
40-
"BAYTAkFVMRMwEQYDVQQIEwpTb21lLVN0YXRlMSEwHwYDVQQKExhJbnRlcm5ldCBX" +
41-
"aWRnaXRzIFB0eSBMdGQwHhcNMTUwMzIyMjI1NDQ5WhcNMTYwMzIxMjI1NDQ5WjBF" +
42-
"MQswCQYDVQQGEwJBVTETMBEGA1UECBMKU29tZS1TdGF0ZTEhMB8GA1UEChMYSW50" +
43-
"ZXJuZXQgV2lkZ2l0cyBQdHkgTHRkMIIBIDANBgkqhkiG9w0BAQEFAAOCAQ0AMIIB" +
44-
"CAKCAQEAxDC+OfmB+tQ+P1MLmuuW2hJLdcK8m4DLgAk5l8bQDNBcVezt+bt/ZFMs" +
45-
"CHBhfTZG9O9yqMn8IRUh7/7jfQm6DmXCgtxj/uFiwT+F3out5uWvMV9SjFYvu9kJ" +
46-
"NXiDC2u3l4lHV8eHde6SbKiZB9Jji9FYQV4YiWrBa91j9I3hZzbTL0UCiJ+1PPoL" +
47-
"Rx/T1s9KT5Wn8m/z2EDrHWpetYu45OA7nzyIFOyQup5oWadWNnpk6HkCGutl9t9b" +
48-
"cLdjXjXPm9wcy1yxIB3Dj/Y8Hnulr80GJlUtUboDm8TExGc4YaPJxdn0u5igo5gZ" +
49-
"c6qnqH/BMd1nsyICx6AZnKBXBycoSQIBI6OBpzCBpDAdBgNVHQ4EFgQUzWhrCCDs" +
50-
"ClANCGlKZ64rHp2BDn0wdQYDVR0jBG4wbIAUzWhrCCDsClANCGlKZ64rHp2BDn2h" +
51-
"SaRHMEUxCzAJBgNVBAYTAkFVMRMwEQYDVQQIEwpTb21lLVN0YXRlMSEwHwYDVQQK" +
52-
"ExhJbnRlcm5ldCBXaWRnaXRzIFB0eSBMdGSCCQCwVfWCQhf7QDAMBgNVHRMEBTAD" +
53-
"AQH/MA0GCSqGSIb3DQEBBQUAA4IBAQCUaJnX0aBzwBkbJrBS5YvkZnNKLdc4oHgC" +
54-
"/Nsr/9pwXzFYYXkdqpTw2nygH0C0WuPVVrG3Y3EGx/UIGDtLbwMvZJhQN9mZH3oX" +
55-
"+c3HGqBnXGuDRrtsfsK1ywAofx9amZfKNk/04/Rt3POdbyD1/AOADw2zMokbIapX" +
56-
"+nMDUtD/Tew9+0qU9+dcFMrFE1N4utlrFHlrLFbiCA/eSegP6gOeu9mqZv7UHIz2" +
57-
"oe6IQTw7zJF7xuBIzTYwjOCM197GKW7xc4GU4JZIN+faZ7njl/fxfUNdlqvgZUUn" +
58-
"kfdrzU3PZPl0w9NuncgEje/PZ+YtZvIsnH7MLSPeIGNQwW6V2kc8";
39+
"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDorij8dGcKUBTbvHylBpm5NZ2" +
40+
"MtDgn1+jbyHE8N4dCS4ZoIl6Pdoa1At/GjXVhIRuz1hlyT2ey5BaC8iQnQTh/f2" +
41+
"oyNctQ5+2KX1sgFlvaQAJCVn0tN7yDT29ZiIE2kfL3RCV5HH7p+NjBQ/cvtaOgE" +
42+
"Sgoi/CI3S58w1XaRdDKo5Uz0U0DDuuB5lO5dq4nceAH8sx2bFTNjlgJcoyxi13h" +
43+
"9CYkymm0mVaZkwiIJY8cU+UrupZKCMboBbCM7Q2spmRQ1tGicT5g84PsCqUf417" +
44+
"u+Jvtf0kD1GdsCyMGALzBDS0scORhMiXHZ/vEM6rOPCIBpH7IzeULhWGXZfPdg4" +
45+
5946

6047
$job = New-AzureRmContainerServiceConfig -Location $loc -OrchestratorType $orchestratorType `
6148
-MasterDnsPrefix $masterDnsPrefixName -AdminUsername $adminUserName -SshPublicKey $sshPublicKey `
@@ -109,26 +96,13 @@ function Test-ContainerServiceUpdate
10996
$orchestratorType = 'DCOS';
11097
$adminUserName = 'acslinuxadmin';
11198
$sshPublicKey =
112-
"MIIDszCCApugAwIBAgIJALBV9YJCF/tAMA0GCSqGSIb3DQEBBQUAMEUxCzAJBgNV" +
113-
"BAYTAkFVMRMwEQYDVQQIEwpTb21lLVN0YXRlMSEwHwYDVQQKExhJbnRlcm5ldCBX" +
114-
"aWRnaXRzIFB0eSBMdGQwHhcNMTUwMzIyMjI1NDQ5WhcNMTYwMzIxMjI1NDQ5WjBF" +
115-
"MQswCQYDVQQGEwJBVTETMBEGA1UECBMKU29tZS1TdGF0ZTEhMB8GA1UEChMYSW50" +
116-
"ZXJuZXQgV2lkZ2l0cyBQdHkgTHRkMIIBIDANBgkqhkiG9w0BAQEFAAOCAQ0AMIIB" +
117-
"CAKCAQEAxDC+OfmB+tQ+P1MLmuuW2hJLdcK8m4DLgAk5l8bQDNBcVezt+bt/ZFMs" +
118-
"CHBhfTZG9O9yqMn8IRUh7/7jfQm6DmXCgtxj/uFiwT+F3out5uWvMV9SjFYvu9kJ" +
119-
"NXiDC2u3l4lHV8eHde6SbKiZB9Jji9FYQV4YiWrBa91j9I3hZzbTL0UCiJ+1PPoL" +
120-
"Rx/T1s9KT5Wn8m/z2EDrHWpetYu45OA7nzyIFOyQup5oWadWNnpk6HkCGutl9t9b" +
121-
"cLdjXjXPm9wcy1yxIB3Dj/Y8Hnulr80GJlUtUboDm8TExGc4YaPJxdn0u5igo5gZ" +
122-
"c6qnqH/BMd1nsyICx6AZnKBXBycoSQIBI6OBpzCBpDAdBgNVHQ4EFgQUzWhrCCDs" +
123-
"ClANCGlKZ64rHp2BDn0wdQYDVR0jBG4wbIAUzWhrCCDsClANCGlKZ64rHp2BDn2h" +
124-
"SaRHMEUxCzAJBgNVBAYTAkFVMRMwEQYDVQQIEwpTb21lLVN0YXRlMSEwHwYDVQQK" +
125-
"ExhJbnRlcm5ldCBXaWRnaXRzIFB0eSBMdGSCCQCwVfWCQhf7QDAMBgNVHRMEBTAD" +
126-
"AQH/MA0GCSqGSIb3DQEBBQUAA4IBAQCUaJnX0aBzwBkbJrBS5YvkZnNKLdc4oHgC" +
127-
"/Nsr/9pwXzFYYXkdqpTw2nygH0C0WuPVVrG3Y3EGx/UIGDtLbwMvZJhQN9mZH3oX" +
128-
"+c3HGqBnXGuDRrtsfsK1ywAofx9amZfKNk/04/Rt3POdbyD1/AOADw2zMokbIapX" +
129-
"+nMDUtD/Tew9+0qU9+dcFMrFE1N4utlrFHlrLFbiCA/eSegP6gOeu9mqZv7UHIz2" +
130-
"oe6IQTw7zJF7xuBIzTYwjOCM197GKW7xc4GU4JZIN+faZ7njl/fxfUNdlqvgZUUn" +
131-
"kfdrzU3PZPl0w9NuncgEje/PZ+YtZvIsnH7MLSPeIGNQwW6V2kc8";
99+
"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDorij8dGcKUBTbvHylBpm5NZ2" +
100+
"MtDgn1+jbyHE8N4dCS4ZoIl6Pdoa1At/GjXVhIRuz1hlyT2ey5BaC8iQnQTh/f2" +
101+
"oyNctQ5+2KX1sgFlvaQAJCVn0tN7yDT29ZiIE2kfL3RCV5HH7p+NjBQ/cvtaOgE" +
102+
"Sgoi/CI3S58w1XaRdDKo5Uz0U0DDuuB5lO5dq4nceAH8sx2bFTNjlgJcoyxi13h" +
103+
"9CYkymm0mVaZkwiIJY8cU+UrupZKCMboBbCM7Q2spmRQ1tGicT5g84PsCqUf417" +
104+
"u+Jvtf0kD1GdsCyMGALzBDS0scORhMiXHZ/vEM6rOPCIBpH7IzeULhWGXZfPdg4" +
105+
132106

133107
$container = New-AzureRmContainerServiceConfig -Location $loc `
134108
-OrchestratorType $orchestratorType `

0 commit comments

Comments
 (0)