Skip to content

Commit 443a3f2

Browse files
authored
add size property to firewall policy and rule collection group (#23355)
2 parents 3596fe2 + 7b9ad18 commit 443a3f2

File tree

10 files changed

+3405
-901
lines changed

10 files changed

+3405
-901
lines changed

src/Network/Network.Test/ScenarioTests/AzureFirewallPolicyTests.cs

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -188,5 +188,21 @@ public void TestAzureFirewallPolicyApplicationRuleCustomHttpHeader()
188188
{
189189
TestRunner.RunTestScript("Test-AzureFirewallPolicyApplicationRuleCustomHttpHeader");
190190
}
191+
192+
[Fact]
193+
[Trait(Category.AcceptanceType, Category.CheckIn)]
194+
[Trait(Category.Owner, NrpTeamAlias.azurefirewall)]
195+
public void TestAzureFirewallPolicySizeProperty()
196+
{
197+
TestRunner.RunTestScript("Test-AzureFirewallPolicySizeProperty");
198+
}
199+
200+
[Fact]
201+
[Trait(Category.AcceptanceType, Category.CheckIn)]
202+
[Trait(Category.Owner, NrpTeamAlias.azurefirewall)]
203+
public void TestAzureFirewallPolicyRuleCollectionGroupSizeProperty()
204+
{
205+
TestRunner.RunTestScript("Test-AzureFirewallPolicyRuleCollectionGroupSizeProperty");
206+
}
191207
}
192208
}

src/Network/Network.Test/ScenarioTests/AzureFirewallPolicyTests.ps1

Lines changed: 88 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,6 @@ function Test-AzureFirewallPolicyCRUD {
3030
$appRcName = "appRc"
3131
$appRcPriority = 400
3232
$appRcActionType = "Allow"
33-
3433
$pipelineRcPriority = 154
3534

3635
# AzureFirewallPolicyApplicationRule 1
@@ -1940,4 +1939,92 @@ function Test-AzureFirewallPolicyApplicationRuleCustomHttpHeader {
19401939
# Cleanup
19411940
Clean-ResourceGroup $rgname
19421941
}
1942+
}
1943+
1944+
function Test-AzureFirewallPolicySizeProperty {
1945+
# Setup
1946+
$rgname = Get-ResourceGroupName
1947+
$azureFirewallPolicyName = Get-ResourceName
1948+
$location = "westus2"
1949+
1950+
try {
1951+
# Create the resource group
1952+
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $location -Tags @{ testtag = "testval" }
1953+
1954+
# Create AzureFirewallPolicy (with no rules, ThreatIntel is in Alert mode by default)
1955+
$azureFirewallPolicy = New-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgname -Location $location
1956+
1957+
# Get AzureFirewallPolicy
1958+
$getAzureFirewallPolicy = Get-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgname
1959+
1960+
#verification
1961+
Assert-NotNull $getAzureFirewallPolicy.Size
1962+
}
1963+
finally {
1964+
# Cleanup
1965+
Clean-ResourceGroup $rgname
1966+
}
1967+
}
1968+
1969+
function Test-AzureFirewallPolicyRuleCollectionGroupSizeProperty {
1970+
# Setup
1971+
$rgname = Get-ResourceGroupName
1972+
$azureFirewallPolicyName = Get-ResourceName
1973+
$azureFirewallPolicyAsJobName = Get-ResourceName
1974+
$resourceTypeParent = "Microsoft.Network/FirewallPolicies"
1975+
$location = "westus2"
1976+
1977+
$ruleGroupName = Get-ResourceName
1978+
1979+
# AzureFirewallPolicyApplicationRuleCollection
1980+
$appRcName = "appRc"
1981+
$appRcPriority = 400
1982+
$appRcActionType = "Allow"
1983+
1984+
$pipelineRcPriority = 154
1985+
1986+
# AzureFirewallPolicyApplicationRule 1
1987+
$appRule1Name = "appRule"
1988+
$appRule1Desc = "desc1"
1989+
$appRule1Fqdn1 = "*google.com"
1990+
$appRule1Fqdn2 = "*microsoft.com"
1991+
$appRule1Protocol1 = "http:80"
1992+
$appRule1Port1 = 80
1993+
$appRule1ProtocolType1 = "http"
1994+
$appRule1Protocol2 = "https:443"
1995+
$appRule1Port2 = 443
1996+
$appRule1ProtocolType2 = "https"
1997+
$appRule1SourceAddress1 = "192.168.0.0/16"
1998+
1999+
try {
2000+
# Create the resource group
2001+
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $location -Tags @{ testtag = "testval" }
2002+
2003+
# Create AzureFirewallPolicy (with no rules, ThreatIntel is in Alert mode by default)
2004+
$azureFirewallPolicy = New-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgname -Location $location -SkuTier Premium
2005+
2006+
# Get AzureFirewallPolicy
2007+
$getAzureFirewallPolicy = Get-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgname
2008+
2009+
# Create Application Rules
2010+
$appRule = New-AzFirewallPolicyApplicationRule -Name $appRule1Name -Description $appRule1Desc -Protocol $appRule1Protocol1, $appRule1Protocol2 -TargetFqdn $appRule1Fqdn1, $appRule1Fqdn2 -SourceAddress $appRule1SourceAddress1 -TerminateTLS
2011+
2012+
# Create Filter Rule with 1 application rule
2013+
$appRc = New-AzFirewallPolicyFilterRuleCollection -Name $appRcName -Priority $appRcPriority -Rule $appRule -ActionType $appRcActionType
2014+
2015+
New-AzFirewallPolicyRuleCollectionGroup -Name $ruleGroupName -Priority 100 -RuleCollection $appRc -FirewallPolicyObject $azureFirewallPolicy
2016+
2017+
# Set AzureFirewallPolicy
2018+
Set-AzFirewallPolicy -InputObject $azureFirewallPolicy
2019+
# Get AzureFirewallPolicy
2020+
$getAzureFirewallPolicy = Get-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgName
2021+
2022+
$getRg = Get-AzFirewallPolicyRuleCollectionGroup -Name $ruleGroupName -AzureFirewallPolicy $getAzureFirewallPolicy
2023+
Assert-NotNull $getRg.properties.priority
2024+
Assert-NotNull $getRg.properties.size
2025+
}
2026+
finally {
2027+
# Cleanup
2028+
Clean-ResourceGroup $rgname
2029+
}
19432030
}

0 commit comments

Comments
 (0)