Skip to content

Commit be27293

Browse files
authored
Merge branch 'network-september' into PacketCaptureChanges
2 parents b8ee93a + cd54650 commit be27293

File tree

260 files changed

+203524
-217570
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

260 files changed

+203524
-217570
lines changed

src/CognitiveServices/CognitiveServices.Test/CognitiveServices.Test.csproj

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212

1313
<ItemGroup>
1414
<PackageReference Include="Microsoft.Azure.Management.CognitiveServices" Version="6.0.0-preview" />
15-
<PackageReference Include="Microsoft.Azure.Management.Network" Version="19.15.0-preview" />
15+
<PackageReference Include="Microsoft.Azure.Management.Network" Version="19.16.2-preview" />
1616
</ItemGroup>
1717

1818
</Project>

src/Compute/Compute.Test/Compute.Test.csproj

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@
1414
<PackageReference Include="Microsoft.Azure.Graph.RBAC" Version="3.4.0-preview" />
1515
<PackageReference Include="Microsoft.Azure.Management.Compute" Version="29.0.0" />
1616
<PackageReference Include="Microsoft.Azure.Management.KeyVault" Version="2.4.2" />
17-
<PackageReference Include="Microsoft.Azure.Management.Network" Version="19.15.0-preview" />
17+
<PackageReference Include="Microsoft.Azure.Management.Network" Version="19.16.2-preview" />
1818
</ItemGroup>
1919

2020
<ItemGroup>

src/DataLakeStore/DataLakeStore.Test/DataLakeStore.Test.csproj

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212

1313
<ItemGroup>
1414
<PackageReference Include="Microsoft.Azure.Management.DataLake.Store" Version="2.4.2-preview" />
15-
<PackageReference Include="Microsoft.Azure.Management.Network" Version="19.15.0-preview" />
15+
<PackageReference Include="Microsoft.Azure.Management.Network" Version="19.16.2-preview" />
1616
</ItemGroup>
1717

1818
<ItemGroup>

src/Dns/Dns.Test/Dns.Test.csproj

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212

1313
<ItemGroup>
1414
<PackageReference Include="Microsoft.Azure.Management.Dns" Version="3.0.1" />
15-
<PackageReference Include="Microsoft.Azure.Management.Network" Version="19.15.0-preview" />
15+
<PackageReference Include="Microsoft.Azure.Management.Network" Version="19.16.2-preview" />
1616
</ItemGroup>
1717

1818
</Project>

src/Dns/Dns.Test/SessionRecords/Microsoft.Azure.Commands.ScenarioTest.DnsTests.ZoneTests/TestPrivateZoneCrud.json

Lines changed: 319 additions & 490 deletions
Large diffs are not rendered by default.

src/Dns/Dns.Test/SessionRecords/Microsoft.Azure.Commands.ScenarioTest.DnsTests.ZoneTests/TestPrivateZoneCrudByVirtualNetworkIds.json

Lines changed: 314 additions & 542 deletions
Large diffs are not rendered by default.

src/Dns/Dns.Test/SessionRecords/Microsoft.Azure.Commands.ScenarioTest.DnsTests.ZoneTests/TestPrivateZoneCrudByVirtualNetworkObjects.json

Lines changed: 315 additions & 543 deletions
Large diffs are not rendered by default.

src/Dns/Dns.Test/SessionRecords/Microsoft.Azure.Commands.ScenarioTest.DnsTests.ZoneTests/TestPrivateZoneCrudRegistrationVirtualNetwork.json

Lines changed: 256 additions & 313 deletions
Large diffs are not rendered by default.

src/Dns/Dns.Test/SessionRecords/Microsoft.Azure.Commands.ScenarioTest.DnsTests.ZoneTests/TestPrivateZoneCrudResolutionVirtualNetwork.json

Lines changed: 258 additions & 543 deletions
Large diffs are not rendered by default.

src/KeyVault/KeyVault.Test/KeyVault.Test.csproj

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@
1414
<PackageReference Include="Microsoft.Azure.KeyVault" Version="3.0.1" />
1515
<PackageReference Include="Microsoft.Azure.KeyVault.WebKey" Version="3.0.1" />
1616
<PackageReference Include="Microsoft.Azure.Management.KeyVault" Version="2.4.2" />
17-
<PackageReference Include="Microsoft.Azure.Management.Network" Version="19.15.0-preview" />
17+
<PackageReference Include="Microsoft.Azure.Management.Network" Version="19.16.2-preview" />
1818
</ItemGroup>
1919

2020
<ItemGroup>

src/NetAppFiles/NetAppFiles.Test/NetAppFiles.Test.csproj

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212

1313
<ItemGroup>
1414
<PackageReference Include="Microsoft.Azure.Management.NetApp" Version="1.1.0" />
15-
<PackageReference Include="Microsoft.Azure.Management.Network" Version="19.15.0-preview" />
15+
<PackageReference Include="Microsoft.Azure.Management.Network" Version="19.16.2-preview" />
1616
</ItemGroup>
1717

1818
</Project>

src/NetAppFiles/NetAppFiles.Test/ScenarioTests/VolumeTests.ps1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ function Test-VolumeCrud
113113
Assert-AreEqual $retrievedVolume.ExportPolicy.Rules[0].AllowedClients '0.0.0.0/0'
114114
Assert-AreEqual $retrievedVolume.ExportPolicy.Rules[1].AllowedClients '1.2.3.0/24'
115115
Assert-AreEqual $retrievedVolume.ProtocolTypes[0] 'NFSv3'
116-
Assert-AreEqual $retrievedVolume.ProtocolTypes[1] 'NFSv4'
116+
Assert-AreEqual $retrievedVolume.ProtocolTypes[1] 'NFSv4.1'
117117
Assert-NotNull $retrievedVolume.MountTargets
118118

119119
# create second volume and check using the confirm flag

src/NetAppFiles/NetAppFiles.Test/SessionRecords/Microsoft.Azure.Commands.NetAppFiles.Test.ScenarioTests.ScenarioTest.SnapshotTests/TestSnapshotCrud.json

Lines changed: 749 additions & 991 deletions
Large diffs are not rendered by default.

src/NetAppFiles/NetAppFiles.Test/SessionRecords/Microsoft.Azure.Commands.NetAppFiles.Test.ScenarioTests.ScenarioTest.SnapshotTests/TestSnapshotPipelines.json

Lines changed: 714 additions & 1179 deletions
Large diffs are not rendered by default.

src/NetAppFiles/NetAppFiles.Test/SessionRecords/Microsoft.Azure.Commands.NetAppFiles.Test.ScenarioTests.ScenarioTest.VolumeTests/TestVolumeCrud.json

Lines changed: 954 additions & 1419 deletions
Large diffs are not rendered by default.

src/NetAppFiles/NetAppFiles.Test/SessionRecords/Microsoft.Azure.Commands.NetAppFiles.Test.ScenarioTests.ScenarioTest.VolumeTests/TestVolumePipelines.json

Lines changed: 611 additions & 1082 deletions
Large diffs are not rendered by default.

src/Network/Network.Test/Network.Test.csproj

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@
1414

1515
<ItemGroup>
1616
<PackageReference Include="Microsoft.Azure.Graph.RBAC" Version="3.4.0-preview" />
17-
<PackageReference Include="Microsoft.Azure.Management.Network" Version="19.15.0-preview" />
17+
<PackageReference Include="Microsoft.Azure.Management.Network" Version="19.16.2-preview" />
1818
<PackageReference Include="Microsoft.Azure.Insights" Version="0.16.0-preview" />
1919
<PackageReference Include="Microsoft.Azure.Management.Compute" Version="29.0.0" />
2020
<PackageReference Include="Microsoft.Azure.Management.ContainerInstance" Version="2.0.0" />

src/Network/Network.Test/ScenarioTests/ApplicationGatewayTests.ps1

Lines changed: 20 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -716,7 +716,7 @@ function Test-ApplicationGatewayCRUDRewriteRuleSet
716716

717717
# remove autoscale config
718718
$getgw = Remove-AzApplicationGatewayAutoscaleConfiguration -ApplicationGateway $getgw -Force
719-
$getgw = Set-AzApplicationGatewaySku -Name Standard_v2 -Tier Standard_v2 -Capacity 3 -ApplicationGateway $getgw
719+
$getgw = Set-AzApplicationGatewaySku -Name Standard_v2 -Tier Standard_v2 -Capacity 2 -ApplicationGateway $getgw
720720

721721
# Set
722722
$getgw01 = Set-AzApplicationGateway -ApplicationGateway $getgw
@@ -750,7 +750,7 @@ function Test-ApplicationGatewayCRUDRewriteRuleSet
750750
# check sku
751751
$sku01 = Get-AzApplicationGatewaySku -ApplicationGateway $getgw01
752752
Assert-NotNull $sku01
753-
Assert-AreEqual $sku01.Capacity 3
753+
Assert-AreEqual $sku01.Capacity 2
754754
Assert-AreEqual $sku01.Name Standard_v2
755755
Assert-AreEqual $sku01.Tier Standard_v2
756756

@@ -919,7 +919,7 @@ function Test-ApplicationGatewayCRUDRewriteRuleSetWithConditions
919919

920920
# remove autoscale config
921921
$getgw = Remove-AzApplicationGatewayAutoscaleConfiguration -ApplicationGateway $getgw -Force
922-
$getgw = Set-AzApplicationGatewaySku -Name Standard_v2 -Tier Standard_v2 -Capacity 3 -ApplicationGateway $getgw
922+
$getgw = Set-AzApplicationGatewaySku -Name Standard_v2 -Tier Standard_v2 -Capacity 2 -ApplicationGateway $getgw
923923

924924
# Set
925925
$getgw01 = Set-AzApplicationGateway -ApplicationGateway $getgw
@@ -954,7 +954,7 @@ function Test-ApplicationGatewayCRUDRewriteRuleSetWithConditions
954954
# check sku
955955
$sku01 = Get-AzApplicationGatewaySku -ApplicationGateway $getgw01
956956
Assert-NotNull $sku01
957-
Assert-AreEqual $sku01.Capacity 3
957+
Assert-AreEqual $sku01.Capacity 2
958958
Assert-AreEqual $sku01.Name Standard_v2
959959
Assert-AreEqual $sku01.Tier Standard_v2
960960

@@ -1088,15 +1088,15 @@ function Test-ApplicationGatewayCRUD3
10881088

10891089
# remove autoscale config
10901090
$getgw = Remove-AzApplicationGatewayAutoscaleConfiguration -ApplicationGateway $getgw -Force
1091-
$getgw = Set-AzApplicationGatewaySku -Name Standard_v2 -Tier Standard_v2 -Capacity 3 -ApplicationGateway $getgw
1091+
$getgw = Set-AzApplicationGatewaySku -Name Standard_v2 -Tier Standard_v2 -Capacity 2 -ApplicationGateway $getgw
10921092

10931093
# Set
10941094
$getgw01 = Set-AzApplicationGateway -ApplicationGateway $getgw
10951095

10961096
# check sku
10971097
$sku01 = Get-AzApplicationGatewaySku -ApplicationGateway $getgw01
10981098
Assert-NotNull $sku01
1099-
Assert-AreEqual $sku01.Capacity 3
1099+
Assert-AreEqual $sku01.Capacity 2
11001100
Assert-AreEqual $sku01.Name Standard_v2
11011101
Assert-AreEqual $sku01.Tier Standard_v2
11021102

@@ -1739,20 +1739,24 @@ function Test-ApplicationGatewayCRUDSubItems2
17391739
$appgw = Set-AzApplicationGateway -ApplicationGateway $appgw
17401740

17411741
# WAF Policy and Custom Rule
1742-
$variable = New-AzApplicationGatewayFirewallMatchVariable -VariableName RequestHeaders -Selector Content-Length
1742+
# Disabled until Firewall Policy cmdlets are updated
1743+
<#$variable = New-AzApplicationGatewayFirewallMatchVariable -VariableName RequestHeaders -Selector Content-Length
17431744
$condition = New-AzApplicationGatewayFirewallCondition -MatchVariable $variable -Operator GreaterThan -MatchValue 1000 -Transform Lowercase -NegationCondition $False
17441745
$rule = New-AzApplicationGatewayFirewallCustomRule -Name example -Priority 2 -RuleType MatchRule -MatchCondition $condition -Action Block
17451746
New-AzApplicationGatewayFirewallPolicy -Name $wafPolicy -ResourceGroupName $rgname -Location $location
17461747
$policy = Get-AzApplicationGatewayFirewallPolicy -Name $wafPolicy -ResourceGroupName $rgname
17471748
$policy.CustomRules = $rule
1748-
Set-AzApplicationGatewayFirewallPolicy -InputObject $policy
1749-
# Get Application Gateway
1749+
Set-AzApplicationGatewayFirewallPolicy -InputObject $policy#>
1750+
1751+
# Get Application Gateway
17501752
$appgw = Get-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname
1751-
$appgw.FirewallPolicy = $policy
1752-
$appgw = Set-AzApplicationGateway -ApplicationGateway $appgw
1753+
1754+
# Disabled until Firewall Policy cmdlets are updated
1755+
#$appgw.FirewallPolicy = $policy
1756+
#$appgw = Set-AzApplicationGateway -ApplicationGateway $appgw
17531757

17541758
$appgw = Get-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname
1755-
$policy = Get-AzApplicationGatewayFirewallPolicy -Name $wafPolicy -ResourceGroupName $rgname
1759+
#$policy = Get-AzApplicationGatewayFirewallPolicy -Name $wafPolicy -ResourceGroupName $rgname
17561760

17571761
# First Check firewall configuraiton
17581762
Assert-AreEqual $appgw.WebApplicationFirewallConfiguration.Enabled $true
@@ -1764,9 +1768,10 @@ function Test-ApplicationGatewayCRUDSubItems2
17641768
Assert-AreEqual $appgw.WebApplicationFirewallConfiguration.MaxRequestBodySizeInKb 80
17651769
Assert-AreEqual $appgw.WebApplicationFirewallConfiguration.FileUploadLimitInMb 70
17661770
Assert-AreEqual $appgw.WebApplicationFirewallConfiguration.Exclusions.Count 2
1767-
1771+
1772+
# Disabled until Firewall Policy cmdlets are updated
17681773
# Second check firewll policy
1769-
Assert-AreEqual $policy.Id $appgw.FirewallPolicy.Id
1774+
<#Assert-AreEqual $policy.Id $appgw.FirewallPolicy.Id
17701775
Assert-AreEqual $policy.CustomRules[0].Name $rule.Name
17711776
Assert-AreEqual $policy.CustomRules[0].RuleType $rule.RuleType
17721777
Assert-AreEqual $policy.CustomRules[0].Action $rule.Action
@@ -1776,7 +1781,7 @@ function Test-ApplicationGatewayCRUDSubItems2
17761781
Assert-AreEqual $policy.CustomRules[0].MatchConditions[0].NegationConditon $rule.MatchConditions[0].NegationConditon
17771782
Assert-AreEqual $policy.CustomRules[0].MatchConditions[0].MatchValues[0] $rule.MatchConditions[0].MatchValues[0]
17781783
Assert-AreEqual $policy.CustomRules[0].MatchConditions[0].MatchVariables[0].VariableName $rule.MatchConditions[0].MatchVariables[0].VariableName
1779-
Assert-AreEqual $policy.CustomRules[0].MatchConditions[0].MatchVariables[0].Selector $rule.MatchConditions[0].MatchVariables[0].Selector
1784+
Assert-AreEqual $policy.CustomRules[0].MatchConditions[0].MatchVariables[0].Selector $rule.MatchConditions[0].MatchVariables[0].Selector#>
17801785

17811786
# Set non-exiting
17821787
Assert-ThrowsLike { Set-AzApplicationGatewayHttpListenerCustomError -HttpListener $listener01 -StatusCode HttpStatus408 -CustomErrorPageUrl $customError403Url02 } "*does not exist*"

src/Network/Network.Test/ScenarioTests/NetworkSecurityGroupTests.ps1

Lines changed: 47 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -263,33 +263,37 @@ function Test-NetworkSecurityGroup-MultiValuedRules
263263
$securityRule1Name = Get-ResourceName
264264
$securityRule2Name = Get-ResourceName
265265
$securityRule3Name = Get-ResourceName
266+
$securityRule4Name = Get-ResourceName
267+
$securityRule5Name = Get-ResourceName
266268
$domainNameLabel = Get-ResourceName
267269
$rglocation = Get-ProviderLocation ResourceManagement
268270
$resourceTypeParent = "Microsoft.Network/NetworkSecurityGroups"
269271
$location = Get-ProviderLocation $resourceTypeParent
270-
272+
271273
try
272274
{
273275
# Create the resource group
274276
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval" }
275-
277+
276278
# Create SecurityRule
277279
$securityRule1 = New-AzNetworkSecurityRuleConfig -Name $securityRule1Name -Description "desciption" -Protocol Tcp -SourcePortRange 23-45,80-90 -DestinationPortRange 46-56,70-80 -SourceAddressPrefix 10.10.20.0/24,192.168.0.0/24 -DestinationAddressPrefix 10.10.30.0/24,192.168.2.0/24 -Access Allow -Priority 123 -Direction Inbound
278280
$securityRule2 = New-AzNetworkSecurityRuleConfig -Name $securityRule2Name -Description "desciption" -Protocol Tcp -SourcePortRange 10-20,30-40 -DestinationPortRange 10-20,30-40 -SourceAddressPrefix Storage -DestinationAddressPrefix Storage -Access Allow -Priority 120 -Direction Inbound
279281
$securityRule3 = New-AzNetworkSecurityRuleConfig -Name $securityRule3Name -Description "desciption" -Protocol Icmp -SourcePortRange 50-60,100-110 -DestinationPortRange 120-130,131-140 -SourceAddressPrefix Storage -DestinationAddressPrefix Storage -Access Allow -Priority 125 -Direction Inbound
282+
$securityRule4 = New-AzNetworkSecurityRuleConfig -Name $securityRule4Name -Description "desciption" -Protocol Esp -SourcePortRange 150-160,170-180 -DestinationPortRange 190-200,210-220 -SourceAddressPrefix Storage -DestinationAddressPrefix Storage -Access Allow -Priority 127 -Direction Inbound
283+
$securityRule5 = New-AzNetworkSecurityRuleConfig -Name $securityRule5Name -Description "desciption" -Protocol Ah -SourcePortRange 230-240,250-260 -DestinationPortRange 270-280,290-300 -SourceAddressPrefix Storage -DestinationAddressPrefix Storage -Access Allow -Priority 129 -Direction Inbound
280284

281285
# Create NetworkSecurityGroup
282-
$nsg = New-AzNetworkSecurityGroup -name $nsgName -ResourceGroupName $rgname -Location $location -SecurityRules $securityRule1,$securityRule2,$securityRule3
286+
$nsg = New-AzNetworkSecurityGroup -name $nsgName -ResourceGroupName $rgname -Location $location -SecurityRules $securityRule1,$securityRule2,$securityRule3,$securityRule4,$securityRule5
283287

284288
# Get NetworkSecurityGroup
285289
$getNsg = Get-AzNetworkSecurityGroup -name $nsgName -ResourceGroupName $rgName
286-
290+
287291
#verification
288292
Assert-AreEqual $rgName $getNsg.ResourceGroupName
289293
Assert-AreEqual $nsgName $getNsg.Name
290294
Assert-NotNull $getNsg.Location
291295
Assert-NotNull $getNsg.Etag
292-
Assert-AreEqual 3 @($getNsg.SecurityRules).Count
296+
Assert-AreEqual 5 @($getNsg.SecurityRules).Count
293297
Assert-AreEqual 6 @($getNsg.DefaultSecurityRules).Count
294298
Assert-AreEqual "AllowVnetInBound" $getNsg.DefaultSecurityRules[0].Name
295299
Assert-AreEqual "AllowAzureLoadBalancerInBound" $getNsg.DefaultSecurityRules[1].Name
@@ -298,7 +302,7 @@ function Test-NetworkSecurityGroup-MultiValuedRules
298302
Assert-AreEqual "AllowInternetOutBound" $getNsg.DefaultSecurityRules[4].Name
299303
Assert-AreEqual "DenyAllOutBound" $getNsg.DefaultSecurityRules[5].Name
300304

301-
# verify rule 1.
305+
# verify rule 1.
302306
Assert-AreEqual $securityRule1Name $getNsg.SecurityRules[0].Name
303307
Assert-NotNull $getNsg.SecurityRules[0].Etag
304308
Assert-AreEqual "desciption" $getNsg.SecurityRules[0].Description
@@ -319,8 +323,8 @@ function Test-NetworkSecurityGroup-MultiValuedRules
319323
Assert-AreEqual "123" $getNsg.SecurityRules[0].Priority
320324
Assert-AreEqual "Inbound" $getNsg.SecurityRules[0].Direction
321325

322-
# verify rule 2
323-
Assert-AreEqual "desciption" $getNsg.SecurityRules[1].Description
326+
# verify rule 2
327+
Assert-AreEqual "desciption" $getNsg.SecurityRules[1].Description
324328
Assert-AreEqual "Tcp" $getNsg.SecurityRules[1].Protocol
325329
Assert-AreEqual 2 @($getNsg.SecurityRules[1].SourcePortRange).Count
326330
Assert-AreEqual "10-20" $getNsg.SecurityRules[1].SourcePortRange[0]
@@ -353,6 +357,40 @@ function Test-NetworkSecurityGroup-MultiValuedRules
353357
Assert-AreEqual "125" $getNsg.SecurityRules[2].Priority
354358
Assert-AreEqual "Inbound" $getNsg.SecurityRules[2].Direction
355359

360+
# verify rule 4
361+
Assert-AreEqual "desciption" $getNsg.SecurityRules[3].Description
362+
Assert-AreEqual "Esp" $getNsg.SecurityRules[3].Protocol
363+
Assert-AreEqual 2 @($getNsg.SecurityRules[3].SourcePortRange).Count
364+
Assert-AreEqual "150-160" $getNsg.SecurityRules[3].SourcePortRange[0]
365+
Assert-AreEqual "170-180" $getNsg.SecurityRules[3].SourcePortRange[1]
366+
Assert-AreEqual 2 @($getNsg.SecurityRules[3].DestinationPortRange).Count
367+
Assert-AreEqual "190-200" $getNsg.SecurityRules[3].DestinationPortRange[0]
368+
Assert-AreEqual "210-220" $getNsg.SecurityRules[3].DestinationPortRange[1]
369+
Assert-AreEqual 1 @($getNsg.SecurityRules[3].SourceAddressPrefix).Count
370+
Assert-AreEqual "Storage" $getNsg.SecurityRules[3].SourceAddressPrefix[0]
371+
Assert-AreEqual 1 @($getNsg.SecurityRules[3].DestinationAddressPrefix).Count
372+
Assert-AreEqual "Storage" $getNsg.SecurityRules[3].DestinationAddressPrefix[0]
373+
Assert-AreEqual "Allow" $getNsg.SecurityRules[3].Access
374+
Assert-AreEqual "127" $getNsg.SecurityRules[3].Priority
375+
Assert-AreEqual "Inbound" $getNsg.SecurityRules[3].Direction
376+
377+
# verify rule 5
378+
Assert-AreEqual "desciption" $getNsg.SecurityRules[4].Description
379+
Assert-AreEqual "Ah" $getNsg.SecurityRules[4].Protocol
380+
Assert-AreEqual 2 @($getNsg.SecurityRules[4].SourcePortRange).Count
381+
Assert-AreEqual "230-240" $getNsg.SecurityRules[4].SourcePortRange[0]
382+
Assert-AreEqual "250-260" $getNsg.SecurityRules[4].SourcePortRange[1]
383+
Assert-AreEqual 2 @($getNsg.SecurityRules[4].DestinationPortRange).Count
384+
Assert-AreEqual "270-280" $getNsg.SecurityRules[4].DestinationPortRange[0]
385+
Assert-AreEqual "290-300" $getNsg.SecurityRules[4].DestinationPortRange[1]
386+
Assert-AreEqual 1 @($getNsg.SecurityRules[4].SourceAddressPrefix).Count
387+
Assert-AreEqual "Storage" $getNsg.SecurityRules[4].SourceAddressPrefix[0]
388+
Assert-AreEqual 1 @($getNsg.SecurityRules[4].DestinationAddressPrefix).Count
389+
Assert-AreEqual "Storage" $getNsg.SecurityRules[4].DestinationAddressPrefix[0]
390+
Assert-AreEqual "Allow" $getNsg.SecurityRules[4].Access
391+
Assert-AreEqual "129" $getNsg.SecurityRules[4].Priority
392+
Assert-AreEqual "Inbound" $getNsg.SecurityRules[4].Direction
393+
356394
# list
357395
$list = Get-AzNetworkSecurityGroup -ResourceGroupName $rgname
358396
Assert-AreEqual 1 @($list).Count
@@ -374,7 +412,7 @@ function Test-NetworkSecurityGroup-MultiValuedRules
374412
# Delete NetworkSecurityGroup
375413
$delete = Remove-AzNetworkSecurityGroup -ResourceGroupName $rgname -name $nsgName -PassThru -Force
376414
Assert-AreEqual true $delete
377-
415+
378416
$list = Get-AzNetworkSecurityGroup -ResourceGroupName $rgname
379417
Assert-AreEqual 0 @($list).Count
380418
}

src/Network/Network.Test/ScenarioTests/NetworkWatcherAPITests.ps1

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,6 +108,20 @@ function Get-NrpResourceGroupName
108108
Get-ResourceGroupName "psnrp";
109109
}
110110

111+
function Wait-Vm($vm)
112+
{
113+
# Don't wait more than N minutes to avoid getting stuck in a loop if VM can't recover
114+
$minutes = 30;
115+
while((Get-AzVM -ResourceGroupName $vm.ResourceGroupName -Name $vm.Name).ProvisioningState -ne "Succeeded")
116+
{
117+
Start-TestSleep 60;
118+
if(--$minutes -eq 0)
119+
{
120+
break;
121+
}
122+
}
123+
}
124+
111125
<#
112126
.SYNOPSIS
113127
Get existing Network Watcher.
@@ -1006,27 +1020,33 @@ function Test-ConnectionMonitor
10061020

10071021
#Remove connection monitor
10081022
Remove-AzNetworkWatcherConnectionMonitor -NetworkWatcher $nw -Name $cmName1
1023+
Wait-Vm $vm
10091024

10101025
#Create connection monitor
10111026
$job1 = New-AzNetworkWatcherConnectionMonitor -Location $locationMod -Name $cmName1 -SourceResourceId $vm.Id -DestinationAddress bing.com -DestinationPort 80 -ConfigureOnly -MonitoringIntervalInSeconds 30 -AsJob
10121027
$job1 | Wait-Job
1013-
###
10141028
$cm1 = $job1 | Receive-Job
1029+
10151030
Remove-AzNetworkWatcherConnectionMonitor -Location $locationMod -Name $cmName1
1031+
Wait-Vm $vm
10161032

1033+
#Create connection monitor
10171034
$job1 = New-AzNetworkWatcherConnectionMonitor -ResourceGroup $nw.ResourceGroupName -NetworkWatcherName $nw.Name -Name $cmName1 -SourceResourceId $vm.Id -DestinationAddress bing.com -DestinationPort 80 -ConfigureOnly -MonitoringIntervalInSeconds 30 -AsJob
10181035
$job1 | Wait-Job
10191036
$cm1 = $job1 | Receive-Job
10201037

10211038
Remove-AzNetworkWatcherConnectionMonitor -ResourceId $cm1.Id
1039+
Wait-Vm $vm
10221040

1041+
#Create connection monitor
10231042
$job1 = New-AzNetworkWatcherConnectionMonitor -ResourceGroup $nw.ResourceGroupName -NetworkWatcherName $nw.Name -Name $cmName1 -SourceResourceId $vm.Id -DestinationAddress bing.com -DestinationPort 80 -ConfigureOnly -MonitoringIntervalInSeconds 30 -AsJob
10241043
$job1 | Wait-Job
10251044
$cm1 = $job1 | Receive-Job
10261045

10271046
$rmJob = Remove-AzNetworkWatcherConnectionMonitor -InputObject $cm1 -AsJob -PassThru
10281047
$rmJob | Wait-Job
10291048
$result = $rmJob | Receive-Job
1049+
Wait-Vm $vm
10301050

10311051
Assert-ThrowsLike { Set-AzNetworkWatcherConnectionMonitor -NetworkWatcher $nw -Name "fakeName" -SourceResourceId $vm.Id -DestinationAddress test.com -DestinationPort 80 -MonitoringIntervalInSeconds 42 } "*not*found*"
10321052

0 commit comments

Comments
 (0)