@@ -268,7 +268,7 @@ function Test-NetworkManagerConnectivityConfigurationCRUD
268
268
$configids = @ ($newConnConfig.Id )
269
269
$regions = @ ($rglocation )
270
270
Deploy-AzNetworkManagerCommit - ResourceGroupName $rgname - Name $networkManagerName - TargetLocation $regions - ConfigurationId $configids - CommitType " Connectivity"
271
- Start-Sleep - Seconds 60
271
+ # Start-Sleep -Seconds 60
272
272
273
273
$deploymentStatus = Get-AzNetworkManagerDeploymentStatus - ResourceGroupName $rgname - NetworkManagerName $networkManagerName - Region $regions - DeploymentType " Connectivity"
274
274
Assert-NotNull $deploymentStatus ;
@@ -304,7 +304,7 @@ function Test-NetworkManagerConnectivityConfigurationCRUD
304
304
Assert-AreEqual " True" $effectiveConnectivityConfig.Value [0 ].DeleteExistingPeering;
305
305
306
306
$job = Remove-AzNetworkManagerConnectivityConfiguration - ResourceGroupName $rgname - NetworkManagerName $networkManagerName - Name $connectivityConfigurationName - ForceDelete - PassThru - Force - AsJob;
307
- Start-Sleep - Seconds 60
307
+ # Start-Sleep -Seconds 60
308
308
$job | Wait-Job ;
309
309
$removeResult = $job | Receive-Job ;
310
310
@@ -369,19 +369,22 @@ function Test-NetworkManagerSecurityAdminRuleCRUD
369
369
370
370
$networkGroup = Get-AzNetworkManagerGroup - ResourceGroupName $rgname - NetworkManagerName $networkManagerName - Name $networkGroupName
371
371
372
- $ApplyOnNetworkIntentPolicyBasedServices = @ (" None " )
372
+ $ApplyOnNetworkIntentPolicyBasedServices = @ (" none " )
373
373
New-AzNetworkManagerSecurityAdminConfiguration - ResourceGroupName $rgname - NetworkManagerName $networkManagerName - Name $SecurityConfigurationName - Description " DESCription" - DeleteExistingNSG - ApplyOnNetworkIntentPolicyBasedService $ApplyOnNetworkIntentPolicyBasedServices
374
374
375
375
$securityConfig = Get-AzNetworkManagerSecurityAdminConfiguration - ResourceGroupName $rgname - NetworkManagerName $networkManagerName - Name $SecurityConfigurationName
376
376
Assert-NotNull $securityConfig ;
377
377
Assert-AreEqual $SecurityConfigurationName $securityConfig.Name ;
378
378
Assert-AreEqual $ApplyOnNetworkIntentPolicyBasedServices $securityConfig.ApplyOnNetworkIntentPolicyBasedServices ;
379
379
380
+ $ApplyOnNetworkIntentPolicyBasedServices = @ ()
380
381
$securityConfig.Description = " A different description."
382
+ $securityConfig.ApplyOnNetworkIntentPolicyBasedServices = $ApplyOnNetworkIntentPolicyBasedServices
381
383
$securityConfig = Set-AzNetworkManagerSecurityAdminConfiguration - InputObject $securityConfig
382
384
Assert-NotNull $securityConfig ;
383
385
Assert-AreEqual " A different description." $securityConfig.Description ;
384
386
Assert-AreEqual $SecurityConfigurationName $securityConfig.Name ;
387
+ Assert-AreEqual $ApplyOnNetworkIntentPolicyBasedServices $securityConfig.ApplyOnNetworkIntentPolicyBasedServices ;
385
388
386
389
[System.Collections.Generic.List [Microsoft.Azure.Commands.Network.Models.NetworkManager.PSNetworkManagerSecurityGroupItem ]]$configGroup = @ ()
387
390
$groupItem = New-AzNetworkManagerSecurityGroupItem - NetworkGroupId $networkGroup.Id
@@ -427,7 +430,7 @@ function Test-NetworkManagerSecurityAdminRuleCRUD
427
430
$configids = @ ($securityConfig.Id )
428
431
$regions = @ ($rglocation )
429
432
Deploy-AzNetworkManagerCommit - ResourceGroupName $rgname - Name $networkManagerName - TargetLocation $regions - ConfigurationId $configids - CommitType " SecurityAdmin"
430
- Start-Sleep - Seconds 60
433
+ # Start-Sleep -Seconds 60
431
434
432
435
$deploymentStatus = Get-AzNetworkManagerDeploymentStatus - ResourceGroupName $rgname - NetworkManagerName $networkManagerName - Region $regions - DeploymentType " SecurityAdmin"
433
436
Assert-NotNull $deploymentStatus ;
@@ -468,29 +471,29 @@ function Test-NetworkManagerSecurityAdminRuleCRUD
468
471
break;
469
472
}
470
473
}
471
- Assert-NotNull $effectiveSecurityAdminRuleList ;
474
+ Assert-NotNull $effectiveSecurityAdminRule ;
472
475
#>
473
476
474
- Assert-AreEqual $newAdminRule.Id $effectiveSecurityAdminRuleList.Value [0 ].Id;
475
- Assert-AreEqual $networkGroup.Id $effectiveSecurityAdminRuleList.Value [0 ].RuleGroups[0 ].Id;
476
- Assert-AreEqual $networkGroup.Id $effectiveSecurityAdminRuleList.Value [0 ].RuleCollectionAppliesToGroups[0 ].NetworkGroupId;
477
+ Assert-AreEqual $newAdminRule.Id $effectiveSecurityAdminRuleList.Value [3 ].Id;
478
+ Assert-AreEqual $networkGroup.Id $effectiveSecurityAdminRuleList.Value [3 ].RuleGroups[0 ].Id;
479
+ Assert-AreEqual $networkGroup.Id $effectiveSecurityAdminRuleList.Value [3 ].RuleCollectionAppliesToGroups[0 ].NetworkGroupId;
477
480
478
481
479
- Assert-AreEqual $securityConfig.Description $effectiveSecurityAdminRuleList.Value [0 ].ConfigurationDescription;
480
- Assert-AreEqual $ruleCollection.Description $effectiveSecurityAdminRuleList.Value [0 ].RuleCollectionDescription;
482
+ Assert-AreEqual $securityConfig.Description $effectiveSecurityAdminRuleList.Value [3 ].ConfigurationDescription;
483
+ Assert-AreEqual $ruleCollection.Description $effectiveSecurityAdminRuleList.Value [3 ].RuleCollectionDescription;
481
484
482
- Assert-AreEqual " TCP" $effectiveSecurityAdminRuleList.Value [0 ].Protocol
483
- Assert-AreEqual " Inbound" $effectiveSecurityAdminRuleList.Value [0 ].Direction
484
- Assert-AreEqual " Allow" $effectiveSecurityAdminRuleList.Value [0 ].Access
485
- Assert-AreEqual 100 $effectiveSecurityAdminRuleList.Value [0 ].Priority
485
+ Assert-AreEqual " TCP" $effectiveSecurityAdminRuleList.Value [3 ].Protocol
486
+ Assert-AreEqual " Inbound" $effectiveSecurityAdminRuleList.Value [3 ].Direction
487
+ Assert-AreEqual " Allow" $effectiveSecurityAdminRuleList.Value [3 ].Access
488
+ Assert-AreEqual 100 $effectiveSecurityAdminRuleList.Value [3 ].Priority
486
489
487
- Assert-AreEqual " 100" $effectiveSecurityAdminRuleList.Value [0 ].SourcePortRanges[0 ]
488
- Assert-AreEqual " 99" $effectiveSecurityAdminRuleList.Value [0 ].DestinationPortRanges[0 ]
489
- Assert-AreEqual " 10.0.0.1" $effectiveSecurityAdminRuleList.Value [0 ].Destinations[0 ].AddressPrefix
490
- Assert-AreEqual " Internet" $effectiveSecurityAdminRuleList.Value [0 ].Sources[0 ].AddressPrefix
490
+ Assert-AreEqual " 100" $effectiveSecurityAdminRuleList.Value [3 ].SourcePortRanges[0 ]
491
+ Assert-AreEqual " 99" $effectiveSecurityAdminRuleList.Value [3 ].DestinationPortRanges[0 ]
492
+ Assert-AreEqual " 10.0.0.1" $effectiveSecurityAdminRuleList.Value [3 ].Destinations[0 ].AddressPrefix
493
+ Assert-AreEqual " Internet" $effectiveSecurityAdminRuleList.Value [3 ].Sources[0 ].AddressPrefix
491
494
492
495
Deploy-AzNetworkManagerCommit - ResourceGroupName $rgname - Name $networkManagerName - TargetLocation $regions - CommitType " SecurityAdmin"
493
- Start-Sleep - Seconds 60
496
+ # Start-Sleep -Seconds 60
494
497
495
498
$job = Remove-AzNetworkManagerSecurityAdminRule - ResourceGroupName $rgname - NetworkManagerName $networkManagerName - SecurityAdminConfigurationName $SecurityConfigurationName - RuleCollectionName $RuleCollectionName - Name $RuleName - ForceDelete - PassThru - Force - AsJob;
496
499
$job | Wait-Job ;
@@ -637,4 +640,72 @@ function Test-NetworkManagerManagementGroupConnectionCRUD
637
640
}
638
641
finally {
639
642
}
643
+ }
644
+
645
+ <#
646
+ . SYNOPSIS
647
+ Tests minimum parameter input for each resource results in successful create
648
+ #>
649
+ function Test-NetworkManagerResourceMinimumParameterCreate
650
+ {
651
+ # Setup
652
+ $rgName = Get-ResourceGroupName
653
+ $networkManagerName = Get-ResourceName
654
+ $networkGroupName = Get-ResourceName
655
+ $staticMemberName = Get-ResourceName
656
+ $connectivityConfigurationName = Get-ResourceName
657
+ $SecurityConfigurationName = Get-ResourceName
658
+ $RuleCollectionName = Get-ResourceName
659
+ $RuleName = Get-ResourceName
660
+ $scopeConnectionName = Get-ResourceName
661
+ $rglocation = " centraluseuap"
662
+ $subscriptionId = " /subscriptions/0fd190fa-dd1c-4724-b7f6-c5cc3ba5c884"
663
+ $vnetId = " /subscriptions/0fd190fa-dd1c-4724-b7f6-c5cc3ba5c884/resourceGroups/jaredgorthy-PowerShellTestResources/providers/Microsoft.Network/virtualNetworks/powerShellTestVnet"
664
+
665
+ try {
666
+ # Create the resource group
667
+ $resourceGroup = New-AzResourceGroup - Name $rgname - Location $rglocation - Tags @ { testtag = " testval" }
668
+
669
+ # Create Scope
670
+ $subscriptions = @ ($subscriptionId )
671
+ $managementGroups = @ ($managementGroupId )
672
+ $scope = New-AzNetworkManagerScope - Subscription $subscriptions
673
+
674
+ # Define access
675
+ $access = @ (" Connectivity" , " SecurityAdmin" )
676
+
677
+ # Create network manager
678
+ New-AzNetworkManager - ResourceGroupName $rgname - Name $networkManagerName - NetworkManagerScope $scope - NetworkManagerScopeAccess $access - Location $rglocation
679
+
680
+ # Create a network group
681
+ New-AzNetworkManagerGroup - ResourceGroupName $rgname - NetworkManagerName $networkManagerName - Name $networkGroupName
682
+
683
+ # Create a static member
684
+ New-AzNetworkManagerStaticMember - ResourceGroupName $rgname - NetworkManagerName $networkManagerName - NetworkGroupName $networkGroupName - Name $staticMemberName - ResourceId $vnetId
685
+
686
+ # Create connectivity group item and config
687
+ $networkGroup = Get-AzNetworkManagerGroup - ResourceGroupName $rgname - NetworkManagerName $networkManagerName - Name $networkGroupName
688
+ $connectivityGroupItem = New-AzNetworkManagerConnectivityGroupItem - NetworkGroupId $networkGroup.Id
689
+ $connectivityGroup = @ ($connectivityGroupItem )
690
+ New-AzNetworkManagerConnectivityConfiguration - ResourceGroupName $rgname - Name $connectivityConfigurationName - NetworkManagerName $networkManagerName - ConnectivityTopology " Mesh" - AppliesToGroup $connectivityGroup - DeleteExistingPeering
691
+
692
+ # Create a security admin config
693
+ New-AzNetworkManagerSecurityAdminConfiguration - ResourceGroupName $rgname - NetworkManagerName $networkManagerName - Name $SecurityConfigurationName
694
+
695
+ # Create a security admin rule collection
696
+ [System.Collections.Generic.List [Microsoft.Azure.Commands.Network.Models.NetworkManager.PSNetworkManagerSecurityGroupItem ]]$configGroup = @ ()
697
+ $groupItem = New-AzNetworkManagerSecurityGroupItem - NetworkGroupId $networkGroup.Id
698
+ $configGroup.Add ($groupItem )
699
+ New-AzNetworkManagerSecurityAdminRuleCollection - ResourceGroupName $rgname - NetworkManagerName $networkManagerName - ConfigName $SecurityConfigurationName - Name $RuleCollectionName - AppliesToGroup $configGroup
700
+
701
+ # Create a security admin rule
702
+ New-AzNetworkManagerSecurityAdminRule - ResourceGroupName $rgname - NetworkManagerName $networkManagerName - ConfigName $SecurityConfigurationName - RuleCollectionName $RuleCollectionName - Name $RuleName - Protocol " TCP" - Direction " Inbound" - Access " Allow" - Priority 100
703
+
704
+ # Create a scope connection
705
+ New-AzNetworkManagerScopeConnection - ResourceGroupName $rgname - NetworkManagerName $networkManagerName - Name $scopeConnectionName - TenantId " 72f988bf-86f1-41af-91ab-2d7cd011db47" - ResourceId $subscriptionId
706
+ }
707
+ finally {
708
+ # Cleanup
709
+ Clean - ResourceGroup $rgname
710
+ }
640
711
}
0 commit comments