Skip to content

Commit 96fc69e

Browse files
Update tests
1 parent 988cab3 commit 96fc69e

File tree

3 files changed

+1446
-3345
lines changed

3 files changed

+1446
-3345
lines changed

src/Sql/Sql.Test/ScenarioTests/AuditPolicyTests.ps1

Lines changed: 0 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -501,9 +501,6 @@ function Test-BlobAuditPolicyOnDatabase
501501
$params = Get-SqlBlobAuditingTestEnvironmentParameters $testSuffix
502502
$dbName = $params.databaseName
503503

504-
# NEEDS TO BE FILLED OUT WITH A PRECREATED STORAGE ACCOUNT IN A DIFFERENT SUBSCRIPTION
505-
$storageAccountResourceId = "/subscriptions/a8c9a924-06c0-4bde-9788-e7b1370969e1/resourceGroups/Default-Storage-EastUS/providers/Microsoft.Storage/storageAccounts/auditcmdletssa"
506-
507504
try
508505
{
509506
# Test - Tests that when setting blob auditing policy on database without StorageKeyType parameter, it gets the default value - "Primary".
@@ -519,20 +516,6 @@ function Test-BlobAuditPolicyOnDatabase
519516
Assert-AreEqual $policy.RetentionInDays 8
520517
Assert-True { $policy.StorageKeyType -eq "Primary"}
521518

522-
# Test - Tests setting blob auditing policy on a database with a storage account in a subscription which is different than the database's subscription
523-
Set-AzSqlDatabaseAuditPolicy -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -StorageAccountResourceId $storageAccountResourceId -AuditActionGroup "SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP", "FAILED_DATABASE_AUTHENTICATION_GROUP" -RetentionInDays 8
524-
$policy = Get-AzSqlDatabaseAuditPolicy -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName
525-
526-
# Assert
527-
Assert-AreEqual $policy.BlobStorageTargetState "Enabled"
528-
Assert-AreEqual $policy.AuditActionGroup.Length 2
529-
Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)}
530-
Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)}
531-
Assert-AreEqual $policy.AuditAction.Length 0
532-
Assert-AreEqual $policy.RetentionInDays 8
533-
Assert-True { $policy.StorageKeyType -eq "Primary"}
534-
Assert-AreEqual $policy.StorageAccountResourceId $storageAccountResourceId
535-
536519
# Test
537520
Set-AzSqlDatabaseAuditPolicy -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -StorageAccountResourceId $params.storageAccountResourceId -StorageKeyType "Secondary" -AuditActionGroup "SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP", "FAILED_DATABASE_AUTHENTICATION_GROUP" -RetentionInDays 8 -AuditAction "UPDATE ON database::[$($params.databaseName)] BY [public]"
538521
$policy = Get-AzSqlDatabaseAuditPolicy -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName
@@ -582,9 +565,6 @@ function Test-BlobAuditPolicyOnServer
582565
Create-BlobAuditingTestEnvironment $testSuffix
583566
$params = Get-SqlBlobAuditingTestEnvironmentParameters $testSuffix
584567

585-
# NEEDS TO BE FILLED OUT WITH A PRECREATED STORAGE ACCOUNT IN A DIFFERENT SUBSCRIPTION
586-
$storageAccountResourceId = "/subscriptions/a8c9a924-06c0-4bde-9788-e7b1370969e1/resourceGroups/Default-Storage-EastUS/providers/Microsoft.Storage/storageAccounts/auditcmdletssa"
587-
588568
try
589569
{
590570
# Test - Tests that when setting blob auditing policy on server without StorageKeyType parameter, it gets the default value - "Primary".
@@ -599,19 +579,6 @@ function Test-BlobAuditPolicyOnServer
599579
Assert-AreEqual $policy.RetentionInDays 8
600580
Assert-AreEqual $policy.StorageKeyType "Primary"
601581

602-
# Test - Tests setting blob auditing policy on a server with a storage account in a subscription which is different than the server's subscription
603-
Set-AzSqlServerAuditPolicy -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -StorageAccountResourceId $storageAccountResourceId -AuditActionGroup "SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP", "FAILED_DATABASE_AUTHENTICATION_GROUP" -RetentionInDays 8
604-
$policy = Get-AzSqlServerAuditPolicy -ResourceGroupName $params.rgname -ServerName $params.serverName
605-
606-
# Assert
607-
Assert-AreEqual $policy.BlobStorageTargetState "Enabled"
608-
Assert-AreEqual $policy.AuditActionGroup.Length 2
609-
Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)}
610-
Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)}
611-
Assert-AreEqual $policy.RetentionInDays 8
612-
Assert-AreEqual $policy.StorageKeyType "Primary"
613-
Assert-AreEqual $policy.StorageAccountResourceId $storageAccountResourceId
614-
615582
# Test
616583
Set-AzSqlServerAuditPolicy -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -StorageAccountResourceId $params.storageAccountResourceId -StorageKeyType "Secondary" -AuditActionGroup "SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP", "FAILED_DATABASE_AUTHENTICATION_GROUP" -RetentionInDays 8
617584
$policy = Get-AzSqlServerAuditPolicy -ResourceGroupName $params.rgname -ServerName $params.serverName

0 commit comments

Comments
 (0)