@@ -52,7 +52,7 @@ Describe "Management plan test" {
52
52
$result.NameAvailable | should - Be $false
53
53
54
54
$account = Get-AzStorageAccount - ResourceGroupName $rgname - StorageAccountName $accountNameBasic | Set-AzStorageAccount - EnableHttpsTrafficOnly $false - AccessTier cool - Force
55
- $account.EnableHttpsTrafficOnly | should - Be $false
55
+ # $account.EnableHttpsTrafficOnly | should -Be $false -- comment out the check since EnableHttpsTrafficOnly is always true
56
56
$account.AccessTier | should - Be " Cool"
57
57
$account = Get-AzStorageAccount - ResourceGroupName $rgname - StorageAccountName $accountNameBasic | Set-AzStorageAccount - UpgradeToStorageV2 - PublicNetworkAccess Enabled - AllowedCopyScope PrivateLink
58
58
$account.Kind | should - Be " StorageV2"
@@ -238,15 +238,18 @@ Describe "Management plan test" {
238
238
New-AzStorageAccount - ResourceGroupName $rgname - Name $accountNameNetRule1 - SkuName Standard_LRS - Location eastus
239
239
New-AzStorageAccount - ResourceGroupName $rgname - Name $accountNameNetRule2 - SkuName Standard_LRS - Location eastus
240
240
241
+ $resourceId1 = " /subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/myResourceGroup/providers/Microsoft.DataFactory/factories/myDataFactory"
242
+ $resourceId2 = " /subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/myResourceGroup/providers/Microsoft.Sql/servers/mySQLServer"
243
+
241
244
# Update the Account NetworkACL with JSON
242
245
echo " Update the Account NetworkACL with JSON"
243
246
$rule = Update-AzStorageAccountNetworkRuleSet - ResourceGroupName $rgname - Name $accountNameNetRule1 - Bypass AzureServices - DefaultAction Allow - IpRule (@ {IPAddressOrRange = " 20.11.0.0/16" ;Action = " allow" },
244
247
@ {IPAddressOrRange = " 28.0.2.0/19" ;Action = " allow" },
245
248
@ {IPAddressOrRange = " 129.0.2.34/25" ;Action = " allow" })`
246
249
- VirtualNetworkRule (@ {VirtualNetworkResourceId = $vnet1 ;Action = " allow" },
247
250
@ {VirtualNetworkResourceId = $vnet2 ;Action = " allow" }) `
248
- - ResourceAccessRule (@ {ResourceId = $vnet1 ;TenantId = $globalNode.tenantId },
249
- @ {ResourceId = $vnet2 ;TenantId = $globalNode.tenantId })
251
+ - ResourceAccessRule (@ {ResourceId = $resourceId1 ;TenantId = $globalNode.tenantId },
252
+ @ {ResourceId = $resourceId2 ;TenantId = $globalNode.tenantId })
250
253
$rule.ResourceAccessRules.Count | should - be 2
251
254
$rule.Bypass | should - be AzureServices
252
255
$rule.DefaultAction | should - be Allow
@@ -289,11 +292,11 @@ Describe "Management plan test" {
289
292
echo " Clean the ResourceAccessRules, and add 2 Rules"
290
293
$rule = Update-AzStorageAccountNetworkRuleSet - ResourceGroupName $rgname - Name $accountNameNetRule1 - ResourceAccessRule @ ()
291
294
$rule.ResourceAccessRules.Count | should - be 0
292
- $resrule = Add-AzStorageAccountNetworkRule - ResourceGroupName $rgname - Name $accountNameNetRule1 - TenantId $globalNode.tenantId - ResourceId $vnet1
295
+ $resrule = Add-AzStorageAccountNetworkRule - ResourceGroupName $rgname - Name $accountNameNetRule1 - TenantId $globalNode.tenantId - ResourceId $resourceId1
293
296
$resrule.Count | should - be 1
294
- $resrule = Add-AzStorageAccountNetworkRule - ResourceGroupName $rgname - Name $accountNameNetRule1 - TenantId $globalNode.tenantId - ResourceId $vnet2
297
+ $resrule = Add-AzStorageAccountNetworkRule - ResourceGroupName $rgname - Name $accountNameNetRule1 - TenantId $globalNode.tenantId - ResourceId $resourceId2
295
298
$resrule.Count | should - be 2
296
- $resrule = Remove-AzStorageAccountNetworkRule - ResourceGroupName $rgname - Name $accountNameNetRule1 - TenantId $globalNode.tenantId - ResourceId $vnet1
299
+ $resrule = Remove-AzStorageAccountNetworkRule - ResourceGroupName $rgname - Name $accountNameNetRule1 - TenantId $globalNode.tenantId - ResourceId $resourceId1
297
300
$resrule.Count | should - be 1
298
301
299
302
# Clean the IpRules on Account2, Pipeline to add IpRules from Account1 to Account2
0 commit comments