From 096e62bcd4138292c278f7f000e5d989d04f1105 Mon Sep 17 00:00:00 2001 From: Adam Sandor Date: Tue, 25 Aug 2020 10:45:05 -0400 Subject: [PATCH 1/3] Improving default testing --- .../ScenarioTests/DiskRPTests.ps1 | 137 ++++++++++-------- 1 file changed, 79 insertions(+), 58 deletions(-) diff --git a/src/Compute/Compute.Test/ScenarioTests/DiskRPTests.ps1 b/src/Compute/Compute.Test/ScenarioTests/DiskRPTests.ps1 index c6ca052fcca2..ff0c267854b4 100644 --- a/src/Compute/Compute.Test/ScenarioTests/DiskRPTests.ps1 +++ b/src/Compute/Compute.Test/ScenarioTests/DiskRPTests.ps1 @@ -930,11 +930,11 @@ function Test-DiskEncryptionSetConfigEncryptionType { # Setup $loc = 'centraluseuap'; - $rgname = 'adamGroupDES5'; + $rgname = 'adamGroupDES7'; $encryptionName = "enc" + $rgname; - $vaultName1 = 'kv11' + $rgname ; - $vaultName2 = 'kv12' + $rgname ; + $vaultName1 = 'kv15' + $rgname ; + $vaultName2 = 'kv16' + $rgname ; try { @@ -943,16 +943,16 @@ function Test-DiskEncryptionSetConfigEncryptionType # Note: In order to record this test, you need to run the following commands to create KeyValut key and KeyVault secret in a separate Powershell window. # Note: In order to record this test, you need to run the following commands to create KeyValut key and KeyVault secret in a separate Powershell window. - $vaultName1 = 'kv11' + $rgname ; - $kekName1 = 'kek11' + $rgname; - $secretname1 = 'mysecret11'; - $secretdata1 = 'mysecretvalue11'; + $vaultName1 = 'kv15' + $rgname ; + $kekName1 = 'kek15' + $rgname; + $secretname1 = 'mysecret15'; + $secretdata1 = 'mysecretvalue15'; $securestring1 = ConvertTo-SecureString $secretdata1 -Force -AsPlainText; - $vaultName2 = 'kv12' + $rgname; - $kekName2 = 'kek11' + $rgname; #not a typo - $secretname2 = 'mysecret12'; - $secretdata2 = 'mysecretvalue12'; + $vaultName2 = 'kv16' + $rgname; + $kekName2 = 'kek15' + $rgname; #not a typo + $secretname2 = 'mysecret16'; + $secretdata2 = 'mysecretvalue16'; $securestring2 = ConvertTo-SecureString $secretdata1 -Force -AsPlainText; New-AzResourceGroup -Name $rgname -Location $loc -Force; @@ -971,20 +971,21 @@ function Test-DiskEncryptionSetConfigEncryptionType $mockkey2 = $kek2.Id #> - $mockkey1 = "https://kv11adamgroupdes5.vault.azure.net/keys/kek11adamGroupDES5/22120aaea54a4e929e4f44c17d27a72f"; - $mockkey2 = "https://kv12adamgroupdes5.vault.azure.net:443/keys/kek11adamGroupDES5/ac421d75276142d7be4714ba34966996"; + $mockkey1 = "https://kv15adamgroupdes7.vault.azure.net/keys/kek15adamGroupDES7/74332f302a0e48999415f6f9bbf7430c"; + $mockkey2 = "https://kv16adamgroupdes7.vault.azure.net/keys/kek15adamGroupDES7/84412eaa63f344bf8a1b15612f2b36cb"; $subId = Get-SubscriptionIdFromResourceGroup $rgname; $mocksourcevault1 = '/subscriptions/' + $subId + '/resourceGroups/' + $rgname + '/providers/Microsoft.KeyVault/vaults/' + $vaultName1; $mocksourcevault2 = '/subscriptions/' + $subId + '/resourceGroups/' + $rgname + '/providers/Microsoft.KeyVault/vaults/' + $vaultName2; $encryptionType = "EncryptionAtRestWithPlatformAndCustomerKeys"; - $encryptionTypeDefault = "EncryptionAtRestWithCustomerKey"; $encSetConfig = New-AzDiskEncryptionSetConfig -Location $loc -EncryptionType $encryptionType; + Assert-NotNull $encSetConfig; + Assert-AreEqual $encSetConfig.EncryptionType $encryptionType; $encSetConfigValues = New-AzDiskEncryptionSetConfig -Location $loc -KeyUrl $mockkey1 -SourceVaultId $mocksourcevault1 -EncryptionType $encryptionType -IdentityType "SystemAssigned" ` - $encSet = New-AzDiskEncryptionSet -ResourceGroupName $rgname -Name $encryptionName -InputObject $encSetConfigValues; + $encSet = New-AzDiskEncryptionSet -ResourceGroupName $rgname -Name $encryptionName -DiskEncryptionSet $encSetConfigValues; Assert-NotNull $encSet; Assert-AreEqual $encryptionType $encSet.EncryptionType; @@ -1010,67 +1011,87 @@ Testing diskAssess object #> function Test-DiskAccessObject { - $rgname = Get-ComputeTestResourceName; - $rgname2 = $rgname + '2'; - $diskname1Rg1 = 'diskaccess1' + $rgname; - $diskName2Rg1 = 'diskAccess2' + $rgname; - $diskName3Rg2 = 'diskAccess1' + $rgname2; - - try - { - # Common - $loc = "northcentralus"; - New-AzResourceGroup -Name $rgname -Location $loc -Force; - New-AzResourceGroup -Name $rgname2 -Location $loc -Force; + # Setup + $loc = 'centraluseuap'; + $rgname = 'adamGroupDES7'; + $encryptionName = "enc" + $rgname; - #Create DiskAccess1 in ResourceGroup1 - New-AzDiskAccess -ResourceGroupName $rgname -Name $diskname1Rg1 -location $loc + $vaultName1 = 'kv15' + $rgname ; + $vaultName2 = 'kv16' + $rgname ; - #Use Get-AzDiskAccess on DiskAccess1 using Default ParameterSet - $diskAccess1 = Get-AzDiskAccess -ResourceGroupName $rgname -Name $diskname1Rg1 - #Use Get-AzDiskAccess on DiskAccess1 using resourceId - $diskAccess1check = Get-AzDiskAccess -resourceId $diskAccess1.id + try + { + <# + # + # Note: In order to record this test, you need to run the following commands to create KeyValut key and KeyVault secret in a separate Powershell window. + # + Note: In order to record this test, you need to run the following commands to create KeyValut key and KeyVault secret in a separate Powershell window. + $vaultName1 = 'kv15' + $rgname ; + $kekName1 = 'kek15' + $rgname; + $secretname1 = 'mysecret15'; + $secretdata1 = 'mysecretvalue15'; + $securestring1 = ConvertTo-SecureString $secretdata1 -Force -AsPlainText; - #check if diskAccess1 is good - Assert-NotNull $diskAccess1 - Assert-AreEqual $diskAccess1.Name $diskname1Rg1 + $vaultName2 = 'kv16' + $rgname; + $kekName2 = 'kek15' + $rgname; #not a typo + $secretname2 = 'mysecret16'; + $secretdata2 = 'mysecretvalue16'; + $securestring2 = ConvertTo-SecureString $secretdata1 -Force -AsPlainText; - #ASSERT check if diskaccess1 and diskaccess1check are same - Assert-AreEqual $diskAccess1.id $diskAccess1check.id + New-AzResourceGroup -Name $rgname -Location $loc -Force; + $vault1 = New-AzKeyVault -VaultName $vaultName1 -ResourceGroupName $rgname -Location $loc -Sku Standard; + $vault2 = New-AzKeyVault -VaultName $vaultName2 -ResourceGroupName $rgname -Location $loc -Sku Standard; + $mocksourcevault1 = $vault1.ResourceId; + $mocksourcevault2 = $vault2.ResourceId; + $userPrincipalName = (Get-AzContext).Account.Id; + Set-AzKeyVaultAccessPolicy -VaultName $vaultName1 -ResourceGroupName $rgname -EnabledForDiskEncryption; + Set-AzKeyVaultAccessPolicy -VaultName $vaultName2 -ResourceGroupName $rgname -EnabledForDiskEncryption; + $kek1 = Add-AzKeyVaultKey -VaultName $vaultName1 -Name $kekName1 -Destination "Software"; + $kek2 = Add-AzKeyVaultKey -VaultName $vaultName2 -Name $kekName2 -Destination "Software"; + $secret1 = Set-AzKeyVaultSecret -VaultName $vaultName1 -Name $secretname1 -SecretValue $securestring1; + $secret2 = Set-AzKeyVaultSecret -VaultName $vaultName2 -Name $secretname2 -SecretValue $securestring2; + $mockkey1 = $kek1.Id + $mockkey2 = $kek2.Id + #> - #Create DiskAccess2 in ResourceGroup1 - New-AzDiskAccess -ResourceGroupName $rgname -Name $diskname2Rg1 -location $loc + $mockkey1 = "https://kv15adamgroupdes7.vault.azure.net/keys/kek15adamGroupDES7/74332f302a0e48999415f6f9bbf7430c"; + $mockkey2 = "https://kv16adamgroupdes7.vault.azure.net/keys/kek15adamGroupDES7/84412eaa63f344bf8a1b15612f2b36cb"; + $subId = Get-SubscriptionIdFromResourceGroup $rgname; + $mocksourcevault1 = '/subscriptions/' + $subId + '/resourceGroups/' + $rgname + '/providers/Microsoft.KeyVault/vaults/' + $vaultName1; + $mocksourcevault2 = '/subscriptions/' + $subId + '/resourceGroups/' + $rgname + '/providers/Microsoft.KeyVault/vaults/' + $vaultName2; - #Use Get-AzDiskAccess by resourceGroupName - $rg1Result = Get-AzDiskAccess -ResourceGroupName $rgname + $encryptionType = "EncryptionAtRestWithPlatformAndCustomerKeys"; - Assert-AreEqual $rg1Result.count 2 + $encSetConfig = New-AzDiskEncryptionSetConfig -Location $loc -EncryptionType $encryptionType; - #add DiskAccess3 to ResourceGroup2 - New-AzDiskAccess -ResourceGroupName $rgname2 -Name $diskname3Rg2 -location $loc + $encSetConfigValues = New-AzDiskEncryptionSetConfig -Location $loc -KeyUrl $mockkey1 -SourceVaultId $mocksourcevault1 -EncryptionType $encryptionType -IdentityType "SystemAssigned" ` - #use get-azdiskaccess with no parameters. count should be >= 3 - $allResult = Get-AzDiskAccess + $encSet = New-AzDiskEncryptionSet -ResourceGroupName $rgname -Name $encryptionName -DiskEncryptionSet $encSetConfigValues; - Assert-True {$allResult.Count -gt 2;} + Assert-NotNull $encSetConfig; + Assert-AreEqual $encSetConfig.EncryptionType $encryptionType; - #remove-AzDiskAccess to DiskAccess1 by resourceId - Remove-AzDiskAccess -resourceid $diskAccess1.id - - #Remove-AzDiskAccess to DiskAccess2 by default parameter set - Remove-AzDiskAccess -ResourceGroupName $rgname -Name $diskname2Rg1 + Assert-NotNull $encSet; + Assert-AreEqual $encryptionType $encSet.EncryptionType; - #Get-AzDiskAccess by resource group. Count should be 0 - $allResult = Get-AzDiskAccess -ResourceGroupName $rgname + # Test default EncryptionType value + $encSetConfigDefault = New-AzDiskEncryptionSetConfig -Location $loc -KeyUrl $mockkey2 -SourceVaultId $mocksourcevault2 -IdentityType "SystemAssigned"; + Assert-NotNull $encSetConfigDefault; + Assert-AreEqual $encSetDefaultConfig.EncryptionType $null; - Assert-AreEqual $allResult.count 0 + $encryptionNameDefault = $encryptionName + "Default"; + $encryptionTypeDefault = "EncryptionAtRestWithCustomerKey"; + $encSetDefault = New-AzDiskEncryptionSet -ResourceGroupName $rgname -Name $encryptionNameDefault -DiskEncryptionSet $encSetConfigDefault; + Assert-NotNull $encSetDefault; + Assert-AreEqual $encSetDefault.EncryptionType $encryptionTypeDefault; + } finally { # Cleanup - Clean-ResourceGroup $rgname - Clean-ResourceGroup $rgname2 + $encSet | Remove-AzDiskEncryptionSet -Force; + $encSetDefault | Remove-AzDiskEncryptionSet -Force; } } From fa1f3b96720fd4c93ccbe05d57e1512203a8a5c5 Mon Sep 17 00:00:00 2001 From: Adam Sandor Date: Tue, 25 Aug 2020 10:47:22 -0400 Subject: [PATCH 2/3] update recorded test file --- ...DiskEncryptionSetConfigEncryptionType.json | 560 +++++++++++++++--- 1 file changed, 484 insertions(+), 76 deletions(-) diff --git a/src/Compute/Compute.Test/SessionRecords/Microsoft.Azure.Commands.Compute.Test.ScenarioTests.DiskRPTests/TestDiskEncryptionSetConfigEncryptionType.json b/src/Compute/Compute.Test/SessionRecords/Microsoft.Azure.Commands.Compute.Test.ScenarioTests.DiskRPTests/TestDiskEncryptionSetConfigEncryptionType.json index e5f70989b4a8..7479539c4e23 100644 --- a/src/Compute/Compute.Test/SessionRecords/Microsoft.Azure.Commands.Compute.Test.ScenarioTests.DiskRPTests/TestDiskEncryptionSetConfigEncryptionType.json +++ b/src/Compute/Compute.Test/SessionRecords/Microsoft.Azure.Commands.Compute.Test.ScenarioTests.DiskRPTests/TestDiskEncryptionSetConfigEncryptionType.json @@ -1,13 +1,13 @@ { "Entries": [ { - "RequestUri": "/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/resourcegroups/adamGroupDES5?api-version=2016-09-01", - "EncodedRequestUri": "L3N1YnNjcmlwdGlvbnMvZTM3NTEwZDctMzNiNi00Njc2LTg4NmYtZWU3NWJjYzAxODcxL3Jlc291cmNlZ3JvdXBzL2FkYW1Hcm91cERFUzU/YXBpLXZlcnNpb249MjAxNi0wOS0wMQ==", + "RequestUri": "/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/resourcegroups/adamGroupDES7?api-version=2016-09-01", + "EncodedRequestUri": "L3N1YnNjcmlwdGlvbnMvZTM3NTEwZDctMzNiNi00Njc2LTg4NmYtZWU3NWJjYzAxODcxL3Jlc291cmNlZ3JvdXBzL2FkYW1Hcm91cERFUzc/YXBpLXZlcnNpb249MjAxNi0wOS0wMQ==", "RequestMethod": "GET", "RequestBody": "", "RequestHeaders": { "x-ms-client-request-id": [ - "bb395ba8-d73b-435a-8da6-47ae09102ecb" + "84af558b-8c56-46ee-9946-64d233c3f5c8" ], "Accept-Language": [ "en-US" @@ -15,7 +15,7 @@ "User-Agent": [ "FxVersion/4.6.29017.01", "OSName/Windows", - "OSVersion/Microsoft.Windows.10.0.18363.", + "OSVersion/Microsoft.Windows.10.0.19041.", "Microsoft.Azure.Management.Internal.Resources.ResourceManagementClient/1.3.21" ] }, @@ -27,16 +27,16 @@ "no-cache" ], "x-ms-ratelimit-remaining-subscription-reads": [ - "11999" + "11997" ], "x-ms-request-id": [ - "1644d313-0318-4914-96ed-358dc9c88670" + "8c84b69d-0400-449f-9077-f6626e27dbed" ], "x-ms-correlation-request-id": [ - "1644d313-0318-4914-96ed-358dc9c88670" + "8c84b69d-0400-449f-9077-f6626e27dbed" ], "x-ms-routing-request-id": [ - "CENTRALUS:20200813T213301Z:1644d313-0318-4914-96ed-358dc9c88670" + "CENTRALUS:20200825T143149Z:8c84b69d-0400-449f-9077-f6626e27dbed" ], "Strict-Transport-Security": [ "max-age=31536000; includeSubDomains" @@ -45,7 +45,7 @@ "nosniff" ], "Date": [ - "Thu, 13 Aug 2020 21:33:01 GMT" + "Tue, 25 Aug 2020 14:31:49 GMT" ], "Content-Type": [ "application/json; charset=utf-8" @@ -57,17 +57,17 @@ "186" ] }, - "ResponseBody": "{\r\n \"id\": \"/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/resourceGroups/adamGroupDES5\",\r\n \"name\": \"adamGroupDES5\",\r\n \"location\": \"centraluseuap\",\r\n \"properties\": {\r\n \"provisioningState\": \"Succeeded\"\r\n }\r\n}", + "ResponseBody": "{\r\n \"id\": \"/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/resourceGroups/adamGroupDES7\",\r\n \"name\": \"adamGroupDES7\",\r\n \"location\": \"centraluseuap\",\r\n \"properties\": {\r\n \"provisioningState\": \"Succeeded\"\r\n }\r\n}", "StatusCode": 200 }, { - "RequestUri": "/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/resourceGroups/adamGroupDES5/providers/Microsoft.Compute/diskEncryptionSets/encadamGroupDES5?api-version=2020-05-01", - "EncodedRequestUri": "L3N1YnNjcmlwdGlvbnMvZTM3NTEwZDctMzNiNi00Njc2LTg4NmYtZWU3NWJjYzAxODcxL3Jlc291cmNlR3JvdXBzL2FkYW1Hcm91cERFUzUvcHJvdmlkZXJzL01pY3Jvc29mdC5Db21wdXRlL2Rpc2tFbmNyeXB0aW9uU2V0cy9lbmNhZGFtR3JvdXBERVM1P2FwaS12ZXJzaW9uPTIwMjAtMDUtMDE=", + "RequestUri": "/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/resourceGroups/adamGroupDES7/providers/Microsoft.Compute/diskEncryptionSets/encadamGroupDES7?api-version=2020-05-01", + "EncodedRequestUri": "L3N1YnNjcmlwdGlvbnMvZTM3NTEwZDctMzNiNi00Njc2LTg4NmYtZWU3NWJjYzAxODcxL3Jlc291cmNlR3JvdXBzL2FkYW1Hcm91cERFUzcvcHJvdmlkZXJzL01pY3Jvc29mdC5Db21wdXRlL2Rpc2tFbmNyeXB0aW9uU2V0cy9lbmNhZGFtR3JvdXBERVM3P2FwaS12ZXJzaW9uPTIwMjAtMDUtMDE=", "RequestMethod": "PUT", - "RequestBody": "{\r\n \"identity\": {\r\n \"type\": \"SystemAssigned\"\r\n },\r\n \"properties\": {\r\n \"encryptionType\": \"EncryptionAtRestWithPlatformAndCustomerKeys\",\r\n \"activeKey\": {\r\n \"sourceVault\": {\r\n \"id\": \"/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/resourceGroups/adamGroupDES5/providers/Microsoft.KeyVault/vaults/kv11adamGroupDES5\"\r\n },\r\n \"keyUrl\": \"https://kv11adamgroupdes5.vault.azure.net/keys/kek11adamGroupDES5/22120aaea54a4e929e4f44c17d27a72f\"\r\n }\r\n },\r\n \"location\": \"centraluseuap\",\r\n \"tags\": {}\r\n}", + "RequestBody": "{\r\n \"identity\": {\r\n \"type\": \"SystemAssigned\"\r\n },\r\n \"properties\": {\r\n \"encryptionType\": \"EncryptionAtRestWithPlatformAndCustomerKeys\",\r\n \"activeKey\": {\r\n \"sourceVault\": {\r\n \"id\": \"/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/resourceGroups/adamGroupDES7/providers/Microsoft.KeyVault/vaults/kv15adamGroupDES7\"\r\n },\r\n \"keyUrl\": \"https://kv15adamgroupdes7.vault.azure.net/keys/kek15adamGroupDES7/74332f302a0e48999415f6f9bbf7430c\"\r\n }\r\n },\r\n \"location\": \"centraluseuap\",\r\n \"tags\": {}\r\n}", "RequestHeaders": { "x-ms-client-request-id": [ - "d2550dc2-872c-4d3b-9ac8-bd19d9c82cf8" + "6491ba36-ae88-4747-8e3d-9b6e123a870c" ], "Accept-Language": [ "en-US" @@ -75,7 +75,7 @@ "User-Agent": [ "FxVersion/4.6.29017.01", "OSName/Windows", - "OSVersion/Microsoft.Windows.10.0.18363.", + "OSVersion/Microsoft.Windows.10.0.19041.", "Microsoft.Azure.Management.Compute.ComputeManagementClient/38.0.0.0" ], "Content-Type": [ @@ -93,22 +93,22 @@ "no-cache" ], "Location": [ - "https://management.azure.com/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/providers/Microsoft.Compute/locations/centraluseuap/DiskOperations/d7911888-64b2-4dfc-b776-a479601d11ab?monitor=true&api-version=2020-05-01" + "https://management.azure.com/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/providers/Microsoft.Compute/locations/centraluseuap/DiskOperations/af7b71b9-80c5-4f92-8af4-2aa4cd28e387?monitor=true&api-version=2020-05-01" ], "Azure-AsyncOperation": [ - "https://management.azure.com/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/providers/Microsoft.Compute/locations/centraluseuap/DiskOperations/d7911888-64b2-4dfc-b776-a479601d11ab?api-version=2020-05-01" + "https://management.azure.com/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/providers/Microsoft.Compute/locations/centraluseuap/DiskOperations/af7b71b9-80c5-4f92-8af4-2aa4cd28e387?api-version=2020-05-01" ], "x-ms-ratelimit-remaining-resource": [ - "Microsoft.Compute/HighCostDiskEncryptionSet3Min;99,Microsoft.Compute/HighCostDiskEncryptionSet30Min;292" + "Microsoft.Compute/HighCostDiskEncryptionSet3Min;99,Microsoft.Compute/HighCostDiskEncryptionSet30Min;281" ], "Strict-Transport-Security": [ "max-age=31536000; includeSubDomains" ], "x-ms-served-by": [ - "c07e6767-d873-44ad-99cf-154e1889a7be_132367183388980862" + "c07e6767-d873-44ad-99cf-154e1889a7be_132398319464986428" ], "x-ms-request-id": [ - "d7911888-64b2-4dfc-b776-a479601d11ab" + "af7b71b9-80c5-4f92-8af4-2aa4cd28e387" ], "Server": [ "Microsoft-HTTPAPI/2.0", @@ -118,16 +118,16 @@ "1199" ], "x-ms-correlation-request-id": [ - "559c4418-0622-48df-aa06-6dbd1a76eebd" + "dafe7867-4586-4584-9e17-2b608b79eed0" ], "x-ms-routing-request-id": [ - "CENTRALUS:20200813T213306Z:559c4418-0622-48df-aa06-6dbd1a76eebd" + "CENTRALUS:20200825T143154Z:dafe7867-4586-4584-9e17-2b608b79eed0" ], "X-Content-Type-Options": [ "nosniff" ], "Date": [ - "Thu, 13 Aug 2020 21:33:06 GMT" + "Tue, 25 Aug 2020 14:31:54 GMT" ], "Content-Length": [ "567" @@ -139,19 +139,19 @@ "-1" ] }, - "ResponseBody": "{\r\n \"location\": \"centraluseuap\",\r\n \"tags\": {},\r\n \"identity\": {\r\n \"type\": \"SystemAssigned\"\r\n },\r\n \"properties\": {\r\n \"activeKey\": {\r\n \"sourceVault\": {\r\n \"id\": \"/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/resourceGroups/adamGroupDES5/providers/Microsoft.KeyVault/vaults/kv11adamGroupDES5\"\r\n },\r\n \"keyUrl\": \"https://kv11adamgroupdes5.vault.azure.net/keys/kek11adamGroupDES5/22120aaea54a4e929e4f44c17d27a72f\"\r\n },\r\n \"encryptionType\": \"EncryptionAtRestWithPlatformAndCustomerKeys\",\r\n \"provisioningState\": \"Updating\"\r\n }\r\n}", + "ResponseBody": "{\r\n \"location\": \"centraluseuap\",\r\n \"tags\": {},\r\n \"identity\": {\r\n \"type\": \"SystemAssigned\"\r\n },\r\n \"properties\": {\r\n \"activeKey\": {\r\n \"sourceVault\": {\r\n \"id\": \"/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/resourceGroups/adamGroupDES7/providers/Microsoft.KeyVault/vaults/kv15adamGroupDES7\"\r\n },\r\n \"keyUrl\": \"https://kv15adamgroupdes7.vault.azure.net/keys/kek15adamGroupDES7/74332f302a0e48999415f6f9bbf7430c\"\r\n },\r\n \"encryptionType\": \"EncryptionAtRestWithPlatformAndCustomerKeys\",\r\n \"provisioningState\": \"Updating\"\r\n }\r\n}", "StatusCode": 202 }, { - "RequestUri": "/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/providers/Microsoft.Compute/locations/centraluseuap/DiskOperations/d7911888-64b2-4dfc-b776-a479601d11ab?api-version=2020-05-01", - "EncodedRequestUri": "L3N1YnNjcmlwdGlvbnMvZTM3NTEwZDctMzNiNi00Njc2LTg4NmYtZWU3NWJjYzAxODcxL3Byb3ZpZGVycy9NaWNyb3NvZnQuQ29tcHV0ZS9sb2NhdGlvbnMvY2VudHJhbHVzZXVhcC9EaXNrT3BlcmF0aW9ucy9kNzkxMTg4OC02NGIyLTRkZmMtYjc3Ni1hNDc5NjAxZDExYWI/YXBpLXZlcnNpb249MjAyMC0wNS0wMQ==", + "RequestUri": "/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/providers/Microsoft.Compute/locations/centraluseuap/DiskOperations/af7b71b9-80c5-4f92-8af4-2aa4cd28e387?api-version=2020-05-01", + "EncodedRequestUri": "L3N1YnNjcmlwdGlvbnMvZTM3NTEwZDctMzNiNi00Njc2LTg4NmYtZWU3NWJjYzAxODcxL3Byb3ZpZGVycy9NaWNyb3NvZnQuQ29tcHV0ZS9sb2NhdGlvbnMvY2VudHJhbHVzZXVhcC9EaXNrT3BlcmF0aW9ucy9hZjdiNzFiOS04MGM1LTRmOTItOGFmNC0yYWE0Y2QyOGUzODc/YXBpLXZlcnNpb249MjAyMC0wNS0wMQ==", "RequestMethod": "GET", "RequestBody": "", "RequestHeaders": { "User-Agent": [ "FxVersion/4.6.29017.01", "OSName/Windows", - "OSVersion/Microsoft.Windows.10.0.18363.", + "OSVersion/Microsoft.Windows.10.0.19041.", "Microsoft.Azure.Management.Compute.ComputeManagementClient/38.0.0.0" ] }, @@ -163,16 +163,16 @@ "no-cache" ], "x-ms-ratelimit-remaining-resource": [ - "Microsoft.Compute/GetOperation3Min;49998,Microsoft.Compute/GetOperation30Min;399983" + "Microsoft.Compute/GetOperation3Min;49998,Microsoft.Compute/GetOperation30Min;399956" ], "Strict-Transport-Security": [ "max-age=31536000; includeSubDomains" ], "x-ms-served-by": [ - "c07e6767-d873-44ad-99cf-154e1889a7be_132367183388980862" + "c07e6767-d873-44ad-99cf-154e1889a7be_132398319464986428" ], "x-ms-request-id": [ - "11879272-cfb3-4e54-a999-a8f16712e830" + "1c8583e2-8209-4b0c-b1b4-1786b8aab9b6" ], "Server": [ "Microsoft-HTTPAPI/2.0", @@ -182,16 +182,16 @@ "11999" ], "x-ms-correlation-request-id": [ - "652cd174-e112-428f-8fd1-a96ac11772ef" + "b0be9968-5c35-418a-927f-fc9a94af9868" ], "x-ms-routing-request-id": [ - "CENTRALUS:20200813T213336Z:652cd174-e112-428f-8fd1-a96ac11772ef" + "CENTRALUS:20200825T143224Z:b0be9968-5c35-418a-927f-fc9a94af9868" ], "X-Content-Type-Options": [ "nosniff" ], "Date": [ - "Thu, 13 Aug 2020 21:33:36 GMT" + "Tue, 25 Aug 2020 14:32:23 GMT" ], "Content-Length": [ "1009" @@ -203,19 +203,19 @@ "-1" ] }, - "ResponseBody": "{\r\n \"startTime\": \"2020-08-13T17:33:06.2065536-04:00\",\r\n \"endTime\": \"2020-08-13T17:33:06.2534242-04:00\",\r\n \"status\": \"Succeeded\",\r\n \"properties\": {\r\n \"output\": {\r\n \"name\": \"encadamGroupDES5\",\r\n \"id\": \"/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/resourceGroups/adamGroupDES5/providers/Microsoft.Compute/diskEncryptionSets/encadamGroupDES5\",\r\n \"type\": \"Microsoft.Compute/diskEncryptionSets\",\r\n \"location\": \"centraluseuap\",\r\n \"identity\": {\r\n \"type\": \"SystemAssigned\",\r\n \"principalId\": \"07c28ee9-65df-437f-91e6-ea203df64f03\",\r\n \"tenantId\": \"72f988bf-86f1-41af-91ab-2d7cd011db47\"\r\n },\r\n \"properties\": {\r\n \"activeKey\": {\r\n \"sourceVault\": {\r\n \"id\": \"/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/resourceGroups/adamGroupDES5/providers/Microsoft.KeyVault/vaults/kv11adamGroupDES5\"\r\n },\r\n \"keyUrl\": \"https://kv11adamgroupdes5.vault.azure.net/keys/kek11adamGroupDES5/22120aaea54a4e929e4f44c17d27a72f\"\r\n },\r\n \"encryptionType\": \"EncryptionAtRestWithPlatformAndCustomerKeys\",\r\n \"provisioningState\": \"Succeeded\"\r\n }\r\n }\r\n },\r\n \"name\": \"d7911888-64b2-4dfc-b776-a479601d11ab\"\r\n}", + "ResponseBody": "{\r\n \"startTime\": \"2020-08-25T10:31:53.9065306-04:00\",\r\n \"endTime\": \"2020-08-25T10:31:53.9534157-04:00\",\r\n \"status\": \"Succeeded\",\r\n \"properties\": {\r\n \"output\": {\r\n \"name\": \"encadamGroupDES7\",\r\n \"id\": \"/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/resourceGroups/adamGroupDES7/providers/Microsoft.Compute/diskEncryptionSets/encadamGroupDES7\",\r\n \"type\": \"Microsoft.Compute/diskEncryptionSets\",\r\n \"location\": \"centraluseuap\",\r\n \"identity\": {\r\n \"type\": \"SystemAssigned\",\r\n \"principalId\": \"c8f9efbc-f166-4976-863d-117edda506b8\",\r\n \"tenantId\": \"72f988bf-86f1-41af-91ab-2d7cd011db47\"\r\n },\r\n \"properties\": {\r\n \"activeKey\": {\r\n \"sourceVault\": {\r\n \"id\": \"/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/resourceGroups/adamGroupDES7/providers/Microsoft.KeyVault/vaults/kv15adamGroupDES7\"\r\n },\r\n \"keyUrl\": \"https://kv15adamgroupdes7.vault.azure.net/keys/kek15adamGroupDES7/74332f302a0e48999415f6f9bbf7430c\"\r\n },\r\n \"encryptionType\": \"EncryptionAtRestWithPlatformAndCustomerKeys\",\r\n \"provisioningState\": \"Succeeded\"\r\n }\r\n }\r\n },\r\n \"name\": \"af7b71b9-80c5-4f92-8af4-2aa4cd28e387\"\r\n}", "StatusCode": 200 }, { - "RequestUri": "/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/resourceGroups/adamGroupDES5/providers/Microsoft.Compute/diskEncryptionSets/encadamGroupDES5?api-version=2020-05-01", - "EncodedRequestUri": "L3N1YnNjcmlwdGlvbnMvZTM3NTEwZDctMzNiNi00Njc2LTg4NmYtZWU3NWJjYzAxODcxL3Jlc291cmNlR3JvdXBzL2FkYW1Hcm91cERFUzUvcHJvdmlkZXJzL01pY3Jvc29mdC5Db21wdXRlL2Rpc2tFbmNyeXB0aW9uU2V0cy9lbmNhZGFtR3JvdXBERVM1P2FwaS12ZXJzaW9uPTIwMjAtMDUtMDE=", + "RequestUri": "/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/resourceGroups/adamGroupDES7/providers/Microsoft.Compute/diskEncryptionSets/encadamGroupDES7?api-version=2020-05-01", + "EncodedRequestUri": "L3N1YnNjcmlwdGlvbnMvZTM3NTEwZDctMzNiNi00Njc2LTg4NmYtZWU3NWJjYzAxODcxL3Jlc291cmNlR3JvdXBzL2FkYW1Hcm91cERFUzcvcHJvdmlkZXJzL01pY3Jvc29mdC5Db21wdXRlL2Rpc2tFbmNyeXB0aW9uU2V0cy9lbmNhZGFtR3JvdXBERVM3P2FwaS12ZXJzaW9uPTIwMjAtMDUtMDE=", "RequestMethod": "GET", "RequestBody": "", "RequestHeaders": { "User-Agent": [ "FxVersion/4.6.29017.01", "OSName/Windows", - "OSVersion/Microsoft.Windows.10.0.18363.", + "OSVersion/Microsoft.Windows.10.0.19041.", "Microsoft.Azure.Management.Compute.ComputeManagementClient/38.0.0.0" ] }, @@ -227,16 +227,16 @@ "no-cache" ], "x-ms-ratelimit-remaining-resource": [ - "Microsoft.Compute/LowCostGet3Min;4997,Microsoft.Compute/LowCostGet30Min;39976" + "Microsoft.Compute/LowCostGet3Min;4996,Microsoft.Compute/LowCostGet30Min;39938" ], "Strict-Transport-Security": [ "max-age=31536000; includeSubDomains" ], "x-ms-served-by": [ - "c07e6767-d873-44ad-99cf-154e1889a7be_132367183388980862" + "c07e6767-d873-44ad-99cf-154e1889a7be_132398319464986428" ], "x-ms-request-id": [ - "111ece2b-3988-44dc-83e7-167c13402d5c" + "c8384456-42f2-4e55-a8b5-10ce2b5bc597" ], "Server": [ "Microsoft-HTTPAPI/2.0", @@ -246,16 +246,16 @@ "11998" ], "x-ms-correlation-request-id": [ - "eee20d0e-8b83-4014-83e1-03073a7275ca" + "addf3dd1-fbc4-4acc-8ee8-454e7495b728" ], "x-ms-routing-request-id": [ - "CENTRALUS:20200813T213336Z:eee20d0e-8b83-4014-83e1-03073a7275ca" + "CENTRALUS:20200825T143224Z:addf3dd1-fbc4-4acc-8ee8-454e7495b728" ], "X-Content-Type-Options": [ "nosniff" ], "Date": [ - "Thu, 13 Aug 2020 21:33:36 GMT" + "Tue, 25 Aug 2020 14:32:23 GMT" ], "Content-Length": [ "909" @@ -267,17 +267,425 @@ "-1" ] }, - "ResponseBody": "{\r\n \"name\": \"encadamGroupDES5\",\r\n \"id\": \"/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/resourceGroups/adamGroupDES5/providers/Microsoft.Compute/diskEncryptionSets/encadamGroupDES5\",\r\n \"type\": \"Microsoft.Compute/diskEncryptionSets\",\r\n \"location\": \"centraluseuap\",\r\n \"identity\": {\r\n \"type\": \"SystemAssigned\",\r\n \"principalId\": \"07c28ee9-65df-437f-91e6-ea203df64f03\",\r\n \"tenantId\": \"72f988bf-86f1-41af-91ab-2d7cd011db47\"\r\n },\r\n \"properties\": {\r\n \"activeKey\": {\r\n \"sourceVault\": {\r\n \"id\": \"/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/resourceGroups/adamGroupDES5/providers/Microsoft.KeyVault/vaults/kv11adamGroupDES5\"\r\n },\r\n \"keyUrl\": \"https://kv11adamgroupdes5.vault.azure.net/keys/kek11adamGroupDES5/22120aaea54a4e929e4f44c17d27a72f\"\r\n },\r\n \"encryptionType\": \"EncryptionAtRestWithPlatformAndCustomerKeys\",\r\n \"provisioningState\": \"Succeeded\"\r\n }\r\n}", + "ResponseBody": "{\r\n \"name\": \"encadamGroupDES7\",\r\n \"id\": \"/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/resourceGroups/adamGroupDES7/providers/Microsoft.Compute/diskEncryptionSets/encadamGroupDES7\",\r\n \"type\": \"Microsoft.Compute/diskEncryptionSets\",\r\n \"location\": \"centraluseuap\",\r\n \"identity\": {\r\n \"type\": \"SystemAssigned\",\r\n \"principalId\": \"c8f9efbc-f166-4976-863d-117edda506b8\",\r\n \"tenantId\": \"72f988bf-86f1-41af-91ab-2d7cd011db47\"\r\n },\r\n \"properties\": {\r\n \"activeKey\": {\r\n \"sourceVault\": {\r\n \"id\": \"/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/resourceGroups/adamGroupDES7/providers/Microsoft.KeyVault/vaults/kv15adamGroupDES7\"\r\n },\r\n \"keyUrl\": \"https://kv15adamgroupdes7.vault.azure.net/keys/kek15adamGroupDES7/74332f302a0e48999415f6f9bbf7430c\"\r\n },\r\n \"encryptionType\": \"EncryptionAtRestWithPlatformAndCustomerKeys\",\r\n \"provisioningState\": \"Succeeded\"\r\n }\r\n}", + "StatusCode": 200 + }, + { + "RequestUri": "/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/resourceGroups/adamGroupDES7/providers/Microsoft.Compute/diskEncryptionSets/encadamGroupDES7Default?api-version=2020-05-01", + "EncodedRequestUri": "L3N1YnNjcmlwdGlvbnMvZTM3NTEwZDctMzNiNi00Njc2LTg4NmYtZWU3NWJjYzAxODcxL3Jlc291cmNlR3JvdXBzL2FkYW1Hcm91cERFUzcvcHJvdmlkZXJzL01pY3Jvc29mdC5Db21wdXRlL2Rpc2tFbmNyeXB0aW9uU2V0cy9lbmNhZGFtR3JvdXBERVM3RGVmYXVsdD9hcGktdmVyc2lvbj0yMDIwLTA1LTAx", + "RequestMethod": "PUT", + "RequestBody": "{\r\n \"identity\": {\r\n \"type\": \"SystemAssigned\"\r\n },\r\n \"properties\": {\r\n \"activeKey\": {\r\n \"sourceVault\": {\r\n \"id\": \"/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/resourceGroups/adamGroupDES7/providers/Microsoft.KeyVault/vaults/kv16adamGroupDES7\"\r\n },\r\n \"keyUrl\": \"https://kv16adamgroupdes7.vault.azure.net/keys/kek15adamGroupDES7/84412eaa63f344bf8a1b15612f2b36cb\"\r\n }\r\n },\r\n \"location\": \"centraluseuap\",\r\n \"tags\": {}\r\n}", + "RequestHeaders": { + "x-ms-client-request-id": [ + "a0f4a060-46a2-443b-8b85-5573eda08ca3" + ], + "Accept-Language": [ + "en-US" + ], + "User-Agent": [ + "FxVersion/4.6.29017.01", + "OSName/Windows", + "OSVersion/Microsoft.Windows.10.0.19041.", + "Microsoft.Azure.Management.Compute.ComputeManagementClient/38.0.0.0" + ], + "Content-Type": [ + "application/json; charset=utf-8" + ], + "Content-Length": [ + "459" + ] + }, + "ResponseHeaders": { + "Cache-Control": [ + "no-cache" + ], + "Pragma": [ + "no-cache" + ], + "Location": [ + "https://management.azure.com/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/providers/Microsoft.Compute/locations/centraluseuap/DiskOperations/f8eeb4ee-6464-4709-bb56-343069f3c5ce?monitor=true&api-version=2020-05-01" + ], + "Azure-AsyncOperation": [ + "https://management.azure.com/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/providers/Microsoft.Compute/locations/centraluseuap/DiskOperations/f8eeb4ee-6464-4709-bb56-343069f3c5ce?api-version=2020-05-01" + ], + "x-ms-ratelimit-remaining-resource": [ + "Microsoft.Compute/HighCostDiskEncryptionSet3Min;98,Microsoft.Compute/HighCostDiskEncryptionSet30Min;280" + ], + "Strict-Transport-Security": [ + "max-age=31536000; includeSubDomains" + ], + "x-ms-served-by": [ + "c07e6767-d873-44ad-99cf-154e1889a7be_132398319464986428" + ], + "x-ms-request-id": [ + "f8eeb4ee-6464-4709-bb56-343069f3c5ce" + ], + "Server": [ + "Microsoft-HTTPAPI/2.0", + "Microsoft-HTTPAPI/2.0" + ], + "x-ms-ratelimit-remaining-subscription-writes": [ + "1199" + ], + "x-ms-correlation-request-id": [ + "e2150a1e-4157-4125-be75-6560a089e1b2" + ], + "x-ms-routing-request-id": [ + "CENTRALUS:20200825T143225Z:e2150a1e-4157-4125-be75-6560a089e1b2" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "Date": [ + "Tue, 25 Aug 2020 14:32:25 GMT" + ], + "Content-Length": [ + "497" + ], + "Content-Type": [ + "application/json; charset=utf-8" + ], + "Expires": [ + "-1" + ] + }, + "ResponseBody": "{\r\n \"location\": \"centraluseuap\",\r\n \"tags\": {},\r\n \"identity\": {\r\n \"type\": \"SystemAssigned\"\r\n },\r\n \"properties\": {\r\n \"activeKey\": {\r\n \"sourceVault\": {\r\n \"id\": \"/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/resourceGroups/adamGroupDES7/providers/Microsoft.KeyVault/vaults/kv16adamGroupDES7\"\r\n },\r\n \"keyUrl\": \"https://kv16adamgroupdes7.vault.azure.net/keys/kek15adamGroupDES7/84412eaa63f344bf8a1b15612f2b36cb\"\r\n },\r\n \"provisioningState\": \"Updating\"\r\n }\r\n}", + "StatusCode": 202 + }, + { + "RequestUri": "/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/providers/Microsoft.Compute/locations/centraluseuap/DiskOperations/f8eeb4ee-6464-4709-bb56-343069f3c5ce?api-version=2020-05-01", + "EncodedRequestUri": "L3N1YnNjcmlwdGlvbnMvZTM3NTEwZDctMzNiNi00Njc2LTg4NmYtZWU3NWJjYzAxODcxL3Byb3ZpZGVycy9NaWNyb3NvZnQuQ29tcHV0ZS9sb2NhdGlvbnMvY2VudHJhbHVzZXVhcC9EaXNrT3BlcmF0aW9ucy9mOGVlYjRlZS02NDY0LTQ3MDktYmI1Ni0zNDMwNjlmM2M1Y2U/YXBpLXZlcnNpb249MjAyMC0wNS0wMQ==", + "RequestMethod": "GET", + "RequestBody": "", + "RequestHeaders": { + "User-Agent": [ + "FxVersion/4.6.29017.01", + "OSName/Windows", + "OSVersion/Microsoft.Windows.10.0.19041.", + "Microsoft.Azure.Management.Compute.ComputeManagementClient/38.0.0.0" + ] + }, + "ResponseHeaders": { + "Cache-Control": [ + "no-cache" + ], + "Pragma": [ + "no-cache" + ], + "x-ms-ratelimit-remaining-resource": [ + "Microsoft.Compute/GetOperation3Min;49996,Microsoft.Compute/GetOperation30Min;399954" + ], + "Strict-Transport-Security": [ + "max-age=31536000; includeSubDomains" + ], + "x-ms-served-by": [ + "c07e6767-d873-44ad-99cf-154e1889a7be_132398319464986428" + ], + "x-ms-request-id": [ + "f484bc24-0f87-416c-b945-14a349c3db07" + ], + "Server": [ + "Microsoft-HTTPAPI/2.0", + "Microsoft-HTTPAPI/2.0" + ], + "x-ms-ratelimit-remaining-subscription-reads": [ + "11999" + ], + "x-ms-correlation-request-id": [ + "cc2c2017-ce2b-487d-8bb3-460d379cc962" + ], + "x-ms-routing-request-id": [ + "CENTRALUS:20200825T143256Z:cc2c2017-ce2b-487d-8bb3-460d379cc962" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "Date": [ + "Tue, 25 Aug 2020 14:32:55 GMT" + ], + "Content-Length": [ + "1011" + ], + "Content-Type": [ + "application/json; charset=utf-8" + ], + "Expires": [ + "-1" + ] + }, + "ResponseBody": "{\r\n \"startTime\": \"2020-08-25T10:32:25.8349051-04:00\",\r\n \"endTime\": \"2020-08-25T10:32:25.8818004-04:00\",\r\n \"status\": \"Succeeded\",\r\n \"properties\": {\r\n \"output\": {\r\n \"name\": \"encadamGroupDES7Default\",\r\n \"id\": \"/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/resourceGroups/adamGroupDES7/providers/Microsoft.Compute/diskEncryptionSets/encadamGroupDES7Default\",\r\n \"type\": \"Microsoft.Compute/diskEncryptionSets\",\r\n \"location\": \"centraluseuap\",\r\n \"identity\": {\r\n \"type\": \"SystemAssigned\",\r\n \"principalId\": \"adec13e4-e916-4444-910b-e1dbbfa8490a\",\r\n \"tenantId\": \"72f988bf-86f1-41af-91ab-2d7cd011db47\"\r\n },\r\n \"properties\": {\r\n \"activeKey\": {\r\n \"sourceVault\": {\r\n \"id\": \"/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/resourceGroups/adamGroupDES7/providers/Microsoft.KeyVault/vaults/kv16adamGroupDES7\"\r\n },\r\n \"keyUrl\": \"https://kv16adamgroupdes7.vault.azure.net/keys/kek15adamGroupDES7/84412eaa63f344bf8a1b15612f2b36cb\"\r\n },\r\n \"encryptionType\": \"EncryptionAtRestWithCustomerKey\",\r\n \"provisioningState\": \"Succeeded\"\r\n }\r\n }\r\n },\r\n \"name\": \"f8eeb4ee-6464-4709-bb56-343069f3c5ce\"\r\n}", + "StatusCode": 200 + }, + { + "RequestUri": "/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/resourceGroups/adamGroupDES7/providers/Microsoft.Compute/diskEncryptionSets/encadamGroupDES7Default?api-version=2020-05-01", + "EncodedRequestUri": "L3N1YnNjcmlwdGlvbnMvZTM3NTEwZDctMzNiNi00Njc2LTg4NmYtZWU3NWJjYzAxODcxL3Jlc291cmNlR3JvdXBzL2FkYW1Hcm91cERFUzcvcHJvdmlkZXJzL01pY3Jvc29mdC5Db21wdXRlL2Rpc2tFbmNyeXB0aW9uU2V0cy9lbmNhZGFtR3JvdXBERVM3RGVmYXVsdD9hcGktdmVyc2lvbj0yMDIwLTA1LTAx", + "RequestMethod": "GET", + "RequestBody": "", + "RequestHeaders": { + "User-Agent": [ + "FxVersion/4.6.29017.01", + "OSName/Windows", + "OSVersion/Microsoft.Windows.10.0.19041.", + "Microsoft.Azure.Management.Compute.ComputeManagementClient/38.0.0.0" + ] + }, + "ResponseHeaders": { + "Cache-Control": [ + "no-cache" + ], + "Pragma": [ + "no-cache" + ], + "x-ms-ratelimit-remaining-resource": [ + "Microsoft.Compute/LowCostGet3Min;4993,Microsoft.Compute/LowCostGet30Min;39935" + ], + "Strict-Transport-Security": [ + "max-age=31536000; includeSubDomains" + ], + "x-ms-served-by": [ + "c07e6767-d873-44ad-99cf-154e1889a7be_132398319464986428" + ], + "x-ms-request-id": [ + "9feef154-c783-43a6-a7af-f123d49782cc" + ], + "Server": [ + "Microsoft-HTTPAPI/2.0", + "Microsoft-HTTPAPI/2.0" + ], + "x-ms-ratelimit-remaining-subscription-reads": [ + "11998" + ], + "x-ms-correlation-request-id": [ + "41be4467-b2e3-40cc-b777-cb80f85c9de8" + ], + "x-ms-routing-request-id": [ + "CENTRALUS:20200825T143256Z:41be4467-b2e3-40cc-b777-cb80f85c9de8" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "Date": [ + "Tue, 25 Aug 2020 14:32:55 GMT" + ], + "Content-Length": [ + "911" + ], + "Content-Type": [ + "application/json; charset=utf-8" + ], + "Expires": [ + "-1" + ] + }, + "ResponseBody": "{\r\n \"name\": \"encadamGroupDES7Default\",\r\n \"id\": \"/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/resourceGroups/adamGroupDES7/providers/Microsoft.Compute/diskEncryptionSets/encadamGroupDES7Default\",\r\n \"type\": \"Microsoft.Compute/diskEncryptionSets\",\r\n \"location\": \"centraluseuap\",\r\n \"identity\": {\r\n \"type\": \"SystemAssigned\",\r\n \"principalId\": \"adec13e4-e916-4444-910b-e1dbbfa8490a\",\r\n \"tenantId\": \"72f988bf-86f1-41af-91ab-2d7cd011db47\"\r\n },\r\n \"properties\": {\r\n \"activeKey\": {\r\n \"sourceVault\": {\r\n \"id\": \"/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/resourceGroups/adamGroupDES7/providers/Microsoft.KeyVault/vaults/kv16adamGroupDES7\"\r\n },\r\n \"keyUrl\": \"https://kv16adamgroupdes7.vault.azure.net/keys/kek15adamGroupDES7/84412eaa63f344bf8a1b15612f2b36cb\"\r\n },\r\n \"encryptionType\": \"EncryptionAtRestWithCustomerKey\",\r\n \"provisioningState\": \"Succeeded\"\r\n }\r\n}", + "StatusCode": 200 + }, + { + "RequestUri": "/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/resourceGroups/adamGroupDES7/providers/Microsoft.Compute/diskEncryptionSets/encadamGroupDES7?api-version=2020-05-01", + "EncodedRequestUri": "L3N1YnNjcmlwdGlvbnMvZTM3NTEwZDctMzNiNi00Njc2LTg4NmYtZWU3NWJjYzAxODcxL3Jlc291cmNlR3JvdXBzL2FkYW1Hcm91cERFUzcvcHJvdmlkZXJzL01pY3Jvc29mdC5Db21wdXRlL2Rpc2tFbmNyeXB0aW9uU2V0cy9lbmNhZGFtR3JvdXBERVM3P2FwaS12ZXJzaW9uPTIwMjAtMDUtMDE=", + "RequestMethod": "DELETE", + "RequestBody": "", + "RequestHeaders": { + "x-ms-client-request-id": [ + "f25935d8-2626-4162-8bd5-a2f21a416eee" + ], + "Accept-Language": [ + "en-US" + ], + "User-Agent": [ + "FxVersion/4.6.29017.01", + "OSName/Windows", + "OSVersion/Microsoft.Windows.10.0.19041.", + "Microsoft.Azure.Management.Compute.ComputeManagementClient/38.0.0.0" + ] + }, + "ResponseHeaders": { + "Cache-Control": [ + "no-cache" + ], + "Pragma": [ + "no-cache" + ], + "Location": [ + "https://management.azure.com/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/providers/Microsoft.Compute/locations/centraluseuap/DiskOperations/9c110be1-cb5f-490c-82a5-1e9416e4e44a?monitor=true&api-version=2020-05-01" + ], + "Azure-AsyncOperation": [ + "https://management.azure.com/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/providers/Microsoft.Compute/locations/centraluseuap/DiskOperations/9c110be1-cb5f-490c-82a5-1e9416e4e44a?api-version=2020-05-01" + ], + "x-ms-ratelimit-remaining-resource": [ + "Microsoft.Compute/HighCostDiskEncryptionSet3Min;97,Microsoft.Compute/HighCostDiskEncryptionSet30Min;279" + ], + "Strict-Transport-Security": [ + "max-age=31536000; includeSubDomains" + ], + "x-ms-served-by": [ + "c07e6767-d873-44ad-99cf-154e1889a7be_132398319464986428" + ], + "x-ms-request-id": [ + "9c110be1-cb5f-490c-82a5-1e9416e4e44a" + ], + "Server": [ + "Microsoft-HTTPAPI/2.0", + "Microsoft-HTTPAPI/2.0" + ], + "x-ms-ratelimit-remaining-subscription-deletes": [ + "14999" + ], + "x-ms-correlation-request-id": [ + "df8bdd06-5071-4fb7-b9bd-c954515f2ee3" + ], + "x-ms-routing-request-id": [ + "CENTRALUS:20200825T143256Z:df8bdd06-5071-4fb7-b9bd-c954515f2ee3" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "Date": [ + "Tue, 25 Aug 2020 14:32:56 GMT" + ], + "Expires": [ + "-1" + ], + "Content-Length": [ + "0" + ] + }, + "ResponseBody": "", + "StatusCode": 202 + }, + { + "RequestUri": "/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/providers/Microsoft.Compute/locations/centraluseuap/DiskOperations/9c110be1-cb5f-490c-82a5-1e9416e4e44a?api-version=2020-05-01", + "EncodedRequestUri": "L3N1YnNjcmlwdGlvbnMvZTM3NTEwZDctMzNiNi00Njc2LTg4NmYtZWU3NWJjYzAxODcxL3Byb3ZpZGVycy9NaWNyb3NvZnQuQ29tcHV0ZS9sb2NhdGlvbnMvY2VudHJhbHVzZXVhcC9EaXNrT3BlcmF0aW9ucy85YzExMGJlMS1jYjVmLTQ5MGMtODJhNS0xZTk0MTZlNGU0NGE/YXBpLXZlcnNpb249MjAyMC0wNS0wMQ==", + "RequestMethod": "GET", + "RequestBody": "", + "RequestHeaders": { + "User-Agent": [ + "FxVersion/4.6.29017.01", + "OSName/Windows", + "OSVersion/Microsoft.Windows.10.0.19041.", + "Microsoft.Azure.Management.Compute.ComputeManagementClient/38.0.0.0" + ] + }, + "ResponseHeaders": { + "Cache-Control": [ + "no-cache" + ], + "Pragma": [ + "no-cache" + ], + "x-ms-ratelimit-remaining-resource": [ + "Microsoft.Compute/GetOperation3Min;49994,Microsoft.Compute/GetOperation30Min;399952" + ], + "Strict-Transport-Security": [ + "max-age=31536000; includeSubDomains" + ], + "x-ms-served-by": [ + "c07e6767-d873-44ad-99cf-154e1889a7be_132398319464986428" + ], + "x-ms-request-id": [ + "94a87899-76ac-4cc1-9e78-134a6605bbd1" + ], + "Server": [ + "Microsoft-HTTPAPI/2.0", + "Microsoft-HTTPAPI/2.0" + ], + "x-ms-ratelimit-remaining-subscription-reads": [ + "11999" + ], + "x-ms-correlation-request-id": [ + "e262dd81-5f65-46ec-8868-1d886b5d169f" + ], + "x-ms-routing-request-id": [ + "CENTRALUS:20200825T143326Z:e262dd81-5f65-46ec-8868-1d886b5d169f" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "Date": [ + "Tue, 25 Aug 2020 14:33:25 GMT" + ], + "Content-Length": [ + "184" + ], + "Content-Type": [ + "application/json; charset=utf-8" + ], + "Expires": [ + "-1" + ] + }, + "ResponseBody": "{\r\n \"startTime\": \"2020-08-25T10:32:56.5117429-04:00\",\r\n \"endTime\": \"2020-08-25T10:32:56.5742717-04:00\",\r\n \"status\": \"Succeeded\",\r\n \"name\": \"9c110be1-cb5f-490c-82a5-1e9416e4e44a\"\r\n}", + "StatusCode": 200 + }, + { + "RequestUri": "/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/providers/Microsoft.Compute/locations/centraluseuap/DiskOperations/9c110be1-cb5f-490c-82a5-1e9416e4e44a?monitor=true&api-version=2020-05-01", + "EncodedRequestUri": "L3N1YnNjcmlwdGlvbnMvZTM3NTEwZDctMzNiNi00Njc2LTg4NmYtZWU3NWJjYzAxODcxL3Byb3ZpZGVycy9NaWNyb3NvZnQuQ29tcHV0ZS9sb2NhdGlvbnMvY2VudHJhbHVzZXVhcC9EaXNrT3BlcmF0aW9ucy85YzExMGJlMS1jYjVmLTQ5MGMtODJhNS0xZTk0MTZlNGU0NGE/bW9uaXRvcj10cnVlJmFwaS12ZXJzaW9uPTIwMjAtMDUtMDE=", + "RequestMethod": "GET", + "RequestBody": "", + "RequestHeaders": { + "User-Agent": [ + "FxVersion/4.6.29017.01", + "OSName/Windows", + "OSVersion/Microsoft.Windows.10.0.19041.", + "Microsoft.Azure.Management.Compute.ComputeManagementClient/38.0.0.0" + ] + }, + "ResponseHeaders": { + "Cache-Control": [ + "no-cache" + ], + "Pragma": [ + "no-cache" + ], + "x-ms-ratelimit-remaining-resource": [ + "Microsoft.Compute/GetOperation3Min;49993,Microsoft.Compute/GetOperation30Min;399951" + ], + "Strict-Transport-Security": [ + "max-age=31536000; includeSubDomains" + ], + "x-ms-served-by": [ + "c07e6767-d873-44ad-99cf-154e1889a7be_132398319464986428" + ], + "x-ms-request-id": [ + "b36b100f-b584-4e39-a0a4-53a9d3e743e5" + ], + "Server": [ + "Microsoft-HTTPAPI/2.0", + "Microsoft-HTTPAPI/2.0" + ], + "x-ms-ratelimit-remaining-subscription-reads": [ + "11998" + ], + "x-ms-correlation-request-id": [ + "6edf466f-69b1-4a9e-bdcc-bd05e6a28cf9" + ], + "x-ms-routing-request-id": [ + "CENTRALUS:20200825T143326Z:6edf466f-69b1-4a9e-bdcc-bd05e6a28cf9" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "Date": [ + "Tue, 25 Aug 2020 14:33:26 GMT" + ], + "Expires": [ + "-1" + ], + "Content-Length": [ + "0" + ] + }, + "ResponseBody": "", "StatusCode": 200 }, { - "RequestUri": "/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/resourceGroups/adamGroupDES5/providers/Microsoft.Compute/diskEncryptionSets/encadamGroupDES5?api-version=2020-05-01", - "EncodedRequestUri": "L3N1YnNjcmlwdGlvbnMvZTM3NTEwZDctMzNiNi00Njc2LTg4NmYtZWU3NWJjYzAxODcxL3Jlc291cmNlR3JvdXBzL2FkYW1Hcm91cERFUzUvcHJvdmlkZXJzL01pY3Jvc29mdC5Db21wdXRlL2Rpc2tFbmNyeXB0aW9uU2V0cy9lbmNhZGFtR3JvdXBERVM1P2FwaS12ZXJzaW9uPTIwMjAtMDUtMDE=", + "RequestUri": "/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/resourceGroups/adamGroupDES7/providers/Microsoft.Compute/diskEncryptionSets/encadamGroupDES7Default?api-version=2020-05-01", + "EncodedRequestUri": "L3N1YnNjcmlwdGlvbnMvZTM3NTEwZDctMzNiNi00Njc2LTg4NmYtZWU3NWJjYzAxODcxL3Jlc291cmNlR3JvdXBzL2FkYW1Hcm91cERFUzcvcHJvdmlkZXJzL01pY3Jvc29mdC5Db21wdXRlL2Rpc2tFbmNyeXB0aW9uU2V0cy9lbmNhZGFtR3JvdXBERVM3RGVmYXVsdD9hcGktdmVyc2lvbj0yMDIwLTA1LTAx", "RequestMethod": "DELETE", "RequestBody": "", "RequestHeaders": { "x-ms-client-request-id": [ - "12858618-939d-45ef-94af-91588b5b3160" + "6be0fe75-f134-4a52-846d-a9232e1e562c" ], "Accept-Language": [ "en-US" @@ -285,7 +693,7 @@ "User-Agent": [ "FxVersion/4.6.29017.01", "OSName/Windows", - "OSVersion/Microsoft.Windows.10.0.18363.", + "OSVersion/Microsoft.Windows.10.0.19041.", "Microsoft.Azure.Management.Compute.ComputeManagementClient/38.0.0.0" ] }, @@ -297,22 +705,22 @@ "no-cache" ], "Location": [ - "https://management.azure.com/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/providers/Microsoft.Compute/locations/centraluseuap/DiskOperations/d2217355-70bd-4964-8c85-b89ff64c17d2?monitor=true&api-version=2020-05-01" + "https://management.azure.com/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/providers/Microsoft.Compute/locations/centraluseuap/DiskOperations/9c4761ab-ff2d-426b-9f04-0d5ee80d5258?monitor=true&api-version=2020-05-01" ], "Azure-AsyncOperation": [ - "https://management.azure.com/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/providers/Microsoft.Compute/locations/centraluseuap/DiskOperations/d2217355-70bd-4964-8c85-b89ff64c17d2?api-version=2020-05-01" + "https://management.azure.com/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/providers/Microsoft.Compute/locations/centraluseuap/DiskOperations/9c4761ab-ff2d-426b-9f04-0d5ee80d5258?api-version=2020-05-01" ], "x-ms-ratelimit-remaining-resource": [ - "Microsoft.Compute/HighCostDiskEncryptionSet3Min;98,Microsoft.Compute/HighCostDiskEncryptionSet30Min;291" + "Microsoft.Compute/HighCostDiskEncryptionSet3Min;96,Microsoft.Compute/HighCostDiskEncryptionSet30Min;278" ], "Strict-Transport-Security": [ "max-age=31536000; includeSubDomains" ], "x-ms-served-by": [ - "c07e6767-d873-44ad-99cf-154e1889a7be_132367183388980862" + "c07e6767-d873-44ad-99cf-154e1889a7be_132398319464986428" ], "x-ms-request-id": [ - "d2217355-70bd-4964-8c85-b89ff64c17d2" + "9c4761ab-ff2d-426b-9f04-0d5ee80d5258" ], "Server": [ "Microsoft-HTTPAPI/2.0", @@ -322,16 +730,16 @@ "14999" ], "x-ms-correlation-request-id": [ - "2e37a5fb-2cdb-4954-8549-2942a71db5a4" + "5289c5d5-9aa0-430f-bfbf-c40ba8200b03" ], "x-ms-routing-request-id": [ - "CENTRALUS:20200813T213337Z:2e37a5fb-2cdb-4954-8549-2942a71db5a4" + "CENTRALUS:20200825T143327Z:5289c5d5-9aa0-430f-bfbf-c40ba8200b03" ], "X-Content-Type-Options": [ "nosniff" ], "Date": [ - "Thu, 13 Aug 2020 21:33:36 GMT" + "Tue, 25 Aug 2020 14:33:26 GMT" ], "Expires": [ "-1" @@ -344,15 +752,15 @@ "StatusCode": 202 }, { - "RequestUri": "/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/providers/Microsoft.Compute/locations/centraluseuap/DiskOperations/d2217355-70bd-4964-8c85-b89ff64c17d2?api-version=2020-05-01", - "EncodedRequestUri": "L3N1YnNjcmlwdGlvbnMvZTM3NTEwZDctMzNiNi00Njc2LTg4NmYtZWU3NWJjYzAxODcxL3Byb3ZpZGVycy9NaWNyb3NvZnQuQ29tcHV0ZS9sb2NhdGlvbnMvY2VudHJhbHVzZXVhcC9EaXNrT3BlcmF0aW9ucy9kMjIxNzM1NS03MGJkLTQ5NjQtOGM4NS1iODlmZjY0YzE3ZDI/YXBpLXZlcnNpb249MjAyMC0wNS0wMQ==", + "RequestUri": "/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/providers/Microsoft.Compute/locations/centraluseuap/DiskOperations/9c4761ab-ff2d-426b-9f04-0d5ee80d5258?api-version=2020-05-01", + "EncodedRequestUri": "L3N1YnNjcmlwdGlvbnMvZTM3NTEwZDctMzNiNi00Njc2LTg4NmYtZWU3NWJjYzAxODcxL3Byb3ZpZGVycy9NaWNyb3NvZnQuQ29tcHV0ZS9sb2NhdGlvbnMvY2VudHJhbHVzZXVhcC9EaXNrT3BlcmF0aW9ucy85YzQ3NjFhYi1mZjJkLTQyNmItOWYwNC0wZDVlZTgwZDUyNTg/YXBpLXZlcnNpb249MjAyMC0wNS0wMQ==", "RequestMethod": "GET", "RequestBody": "", "RequestHeaders": { "User-Agent": [ "FxVersion/4.6.29017.01", "OSName/Windows", - "OSVersion/Microsoft.Windows.10.0.18363.", + "OSVersion/Microsoft.Windows.10.0.19041.", "Microsoft.Azure.Management.Compute.ComputeManagementClient/38.0.0.0" ] }, @@ -364,16 +772,16 @@ "no-cache" ], "x-ms-ratelimit-remaining-resource": [ - "Microsoft.Compute/GetOperation3Min;49996,Microsoft.Compute/GetOperation30Min;399981" + "Microsoft.Compute/GetOperation3Min;49991,Microsoft.Compute/GetOperation30Min;399949" ], "Strict-Transport-Security": [ "max-age=31536000; includeSubDomains" ], "x-ms-served-by": [ - "c07e6767-d873-44ad-99cf-154e1889a7be_132367183388980862" + "c07e6767-d873-44ad-99cf-154e1889a7be_132398319464986428" ], "x-ms-request-id": [ - "099cfb23-b138-483e-ae48-743babafd8f8" + "4a35297a-1cd4-4e52-a299-adc37ead14ce" ], "Server": [ "Microsoft-HTTPAPI/2.0", @@ -383,16 +791,16 @@ "11999" ], "x-ms-correlation-request-id": [ - "3c2fbbdf-407c-42e6-b9f2-6a22e42b7f3c" + "9fadd8f3-1aad-4767-962c-5be3f3bbb483" ], "x-ms-routing-request-id": [ - "CENTRALUS:20200813T213407Z:3c2fbbdf-407c-42e6-b9f2-6a22e42b7f3c" + "CENTRALUS:20200825T143357Z:9fadd8f3-1aad-4767-962c-5be3f3bbb483" ], "X-Content-Type-Options": [ "nosniff" ], "Date": [ - "Thu, 13 Aug 2020 21:34:06 GMT" + "Tue, 25 Aug 2020 14:33:56 GMT" ], "Content-Length": [ "184" @@ -404,19 +812,19 @@ "-1" ] }, - "ResponseBody": "{\r\n \"startTime\": \"2020-08-13T17:33:37.2380052-04:00\",\r\n \"endTime\": \"2020-08-13T17:33:37.2848558-04:00\",\r\n \"status\": \"Succeeded\",\r\n \"name\": \"d2217355-70bd-4964-8c85-b89ff64c17d2\"\r\n}", + "ResponseBody": "{\r\n \"startTime\": \"2020-08-25T10:33:27.0549702-04:00\",\r\n \"endTime\": \"2020-08-25T10:33:27.1018143-04:00\",\r\n \"status\": \"Succeeded\",\r\n \"name\": \"9c4761ab-ff2d-426b-9f04-0d5ee80d5258\"\r\n}", "StatusCode": 200 }, { - "RequestUri": "/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/providers/Microsoft.Compute/locations/centraluseuap/DiskOperations/d2217355-70bd-4964-8c85-b89ff64c17d2?monitor=true&api-version=2020-05-01", - "EncodedRequestUri": "L3N1YnNjcmlwdGlvbnMvZTM3NTEwZDctMzNiNi00Njc2LTg4NmYtZWU3NWJjYzAxODcxL3Byb3ZpZGVycy9NaWNyb3NvZnQuQ29tcHV0ZS9sb2NhdGlvbnMvY2VudHJhbHVzZXVhcC9EaXNrT3BlcmF0aW9ucy9kMjIxNzM1NS03MGJkLTQ5NjQtOGM4NS1iODlmZjY0YzE3ZDI/bW9uaXRvcj10cnVlJmFwaS12ZXJzaW9uPTIwMjAtMDUtMDE=", + "RequestUri": "/subscriptions/e37510d7-33b6-4676-886f-ee75bcc01871/providers/Microsoft.Compute/locations/centraluseuap/DiskOperations/9c4761ab-ff2d-426b-9f04-0d5ee80d5258?monitor=true&api-version=2020-05-01", + "EncodedRequestUri": "L3N1YnNjcmlwdGlvbnMvZTM3NTEwZDctMzNiNi00Njc2LTg4NmYtZWU3NWJjYzAxODcxL3Byb3ZpZGVycy9NaWNyb3NvZnQuQ29tcHV0ZS9sb2NhdGlvbnMvY2VudHJhbHVzZXVhcC9EaXNrT3BlcmF0aW9ucy85YzQ3NjFhYi1mZjJkLTQyNmItOWYwNC0wZDVlZTgwZDUyNTg/bW9uaXRvcj10cnVlJmFwaS12ZXJzaW9uPTIwMjAtMDUtMDE=", "RequestMethod": "GET", "RequestBody": "", "RequestHeaders": { "User-Agent": [ "FxVersion/4.6.29017.01", "OSName/Windows", - "OSVersion/Microsoft.Windows.10.0.18363.", + "OSVersion/Microsoft.Windows.10.0.19041.", "Microsoft.Azure.Management.Compute.ComputeManagementClient/38.0.0.0" ] }, @@ -428,16 +836,16 @@ "no-cache" ], "x-ms-ratelimit-remaining-resource": [ - "Microsoft.Compute/GetOperation3Min;49995,Microsoft.Compute/GetOperation30Min;399980" + "Microsoft.Compute/GetOperation3Min;49990,Microsoft.Compute/GetOperation30Min;399948" ], "Strict-Transport-Security": [ "max-age=31536000; includeSubDomains" ], "x-ms-served-by": [ - "c07e6767-d873-44ad-99cf-154e1889a7be_132367183388980862" + "c07e6767-d873-44ad-99cf-154e1889a7be_132398319464986428" ], "x-ms-request-id": [ - "ad6f2d4b-ff56-4bdc-9541-79a3afe87b53" + "7511e8f5-cc72-43fb-85f5-30a0e173ffc1" ], "Server": [ "Microsoft-HTTPAPI/2.0", @@ -447,16 +855,16 @@ "11998" ], "x-ms-correlation-request-id": [ - "5a275479-d6f6-46e3-8207-68d4c5f56ac3" + "caa7ec9c-ef1a-4e91-b0ae-e87f5b8b72ed" ], "x-ms-routing-request-id": [ - "CENTRALUS:20200813T213407Z:5a275479-d6f6-46e3-8207-68d4c5f56ac3" + "CENTRALUS:20200825T143357Z:caa7ec9c-ef1a-4e91-b0ae-e87f5b8b72ed" ], "X-Content-Type-Options": [ "nosniff" ], "Date": [ - "Thu, 13 Aug 2020 21:34:06 GMT" + "Tue, 25 Aug 2020 14:33:56 GMT" ], "Expires": [ "-1" @@ -473,4 +881,4 @@ "Variables": { "SubscriptionId": "e37510d7-33b6-4676-886f-ee75bcc01871" } -} \ No newline at end of file +} From 9b55fab9faced61d286d19058082c4d9f9a7520a Mon Sep 17 00:00:00 2001 From: Adam Sandor Date: Tue, 25 Aug 2020 13:14:03 -0400 Subject: [PATCH 3/3] correcting incorrect copy and paste to Test-DiskAccessObject test --- .../ScenarioTests/DiskRPTests.ps1 | 131 ++++++++---------- 1 file changed, 59 insertions(+), 72 deletions(-) diff --git a/src/Compute/Compute.Test/ScenarioTests/DiskRPTests.ps1 b/src/Compute/Compute.Test/ScenarioTests/DiskRPTests.ps1 index ff0c267854b4..73633247a12e 100644 --- a/src/Compute/Compute.Test/ScenarioTests/DiskRPTests.ps1 +++ b/src/Compute/Compute.Test/ScenarioTests/DiskRPTests.ps1 @@ -922,7 +922,7 @@ function Test-DiskEncryptionSet } } - <# +<# .SYNOPSIS Testing the EncryptionType parameter passed to the Config obejct is inherited by an associated DiskEncryptionSet object. #> @@ -980,118 +980,105 @@ function Test-DiskEncryptionSetConfigEncryptionType $encryptionType = "EncryptionAtRestWithPlatformAndCustomerKeys"; $encSetConfig = New-AzDiskEncryptionSetConfig -Location $loc -EncryptionType $encryptionType; - Assert-NotNull $encSetConfig; - Assert-AreEqual $encSetConfig.EncryptionType $encryptionType; $encSetConfigValues = New-AzDiskEncryptionSetConfig -Location $loc -KeyUrl $mockkey1 -SourceVaultId $mocksourcevault1 -EncryptionType $encryptionType -IdentityType "SystemAssigned" ` $encSet = New-AzDiskEncryptionSet -ResourceGroupName $rgname -Name $encryptionName -DiskEncryptionSet $encSetConfigValues; + Assert-NotNull $encSetConfig; + Assert-AreEqual $encSetConfig.EncryptionType $encryptionType; + Assert-NotNull $encSet; Assert-AreEqual $encryptionType $encSet.EncryptionType; - Assert-NotNull $encSetConfig; - Assert-AreEqual $encSetConfig.EncryptionType $encryptionType; + # Test default EncryptionType value + $encSetConfigDefault = New-AzDiskEncryptionSetConfig -Location $loc -KeyUrl $mockkey2 -SourceVaultId $mocksourcevault2 -IdentityType "SystemAssigned"; + Assert-NotNull $encSetConfigDefault; + Assert-AreEqual $encSetDefaultConfig.EncryptionType $null; - $encSetConfigDefault = New-AzDiskEncryptionSetConfig -Location $loc; - Assert-AreEqual $encSetConfigDefault.EncryptionType $null; + $encryptionNameDefault = $encryptionName + "Default"; + $encryptionTypeDefault = "EncryptionAtRestWithCustomerKey"; + + $encSetDefault = New-AzDiskEncryptionSet -ResourceGroupName $rgname -Name $encryptionNameDefault -DiskEncryptionSet $encSetConfigDefault; + Assert-NotNull $encSetDefault; + Assert-AreEqual $encSetDefault.EncryptionType $encryptionTypeDefault; + } finally { # Cleanup $encSet | Remove-AzDiskEncryptionSet -Force; - Clean-ResourceGroup $rgname + $encSetDefault | Remove-AzDiskEncryptionSet -Force; } } - <# .SYNOPSIS Testing diskAssess object #> function Test-DiskAccessObject { - # Setup - $loc = 'centraluseuap'; - $rgname = 'adamGroupDES7'; - $encryptionName = "enc" + $rgname; - - $vaultName1 = 'kv15' + $rgname ; - $vaultName2 = 'kv16' + $rgname ; - + $rgname = Get-ComputeTestResourceName; + $rgname2 = $rgname + '2'; + $diskname1Rg1 = 'diskaccess1' + $rgname; + $diskName2Rg1 = 'diskAccess2' + $rgname; + $diskName3Rg2 = 'diskAccess1' + $rgname2; + try { - <# - # - # Note: In order to record this test, you need to run the following commands to create KeyValut key and KeyVault secret in a separate Powershell window. - # - Note: In order to record this test, you need to run the following commands to create KeyValut key and KeyVault secret in a separate Powershell window. - $vaultName1 = 'kv15' + $rgname ; - $kekName1 = 'kek15' + $rgname; - $secretname1 = 'mysecret15'; - $secretdata1 = 'mysecretvalue15'; - $securestring1 = ConvertTo-SecureString $secretdata1 -Force -AsPlainText; - - $vaultName2 = 'kv16' + $rgname; - $kekName2 = 'kek15' + $rgname; #not a typo - $secretname2 = 'mysecret16'; - $secretdata2 = 'mysecretvalue16'; - $securestring2 = ConvertTo-SecureString $secretdata1 -Force -AsPlainText; - + # Common + $loc = "northcentralus"; New-AzResourceGroup -Name $rgname -Location $loc -Force; - $vault1 = New-AzKeyVault -VaultName $vaultName1 -ResourceGroupName $rgname -Location $loc -Sku Standard; - $vault2 = New-AzKeyVault -VaultName $vaultName2 -ResourceGroupName $rgname -Location $loc -Sku Standard; - $mocksourcevault1 = $vault1.ResourceId; - $mocksourcevault2 = $vault2.ResourceId; - $userPrincipalName = (Get-AzContext).Account.Id; - Set-AzKeyVaultAccessPolicy -VaultName $vaultName1 -ResourceGroupName $rgname -EnabledForDiskEncryption; - Set-AzKeyVaultAccessPolicy -VaultName $vaultName2 -ResourceGroupName $rgname -EnabledForDiskEncryption; - $kek1 = Add-AzKeyVaultKey -VaultName $vaultName1 -Name $kekName1 -Destination "Software"; - $kek2 = Add-AzKeyVaultKey -VaultName $vaultName2 -Name $kekName2 -Destination "Software"; - $secret1 = Set-AzKeyVaultSecret -VaultName $vaultName1 -Name $secretname1 -SecretValue $securestring1; - $secret2 = Set-AzKeyVaultSecret -VaultName $vaultName2 -Name $secretname2 -SecretValue $securestring2; - $mockkey1 = $kek1.Id - $mockkey2 = $kek2.Id - #> + New-AzResourceGroup -Name $rgname2 -Location $loc -Force; - $mockkey1 = "https://kv15adamgroupdes7.vault.azure.net/keys/kek15adamGroupDES7/74332f302a0e48999415f6f9bbf7430c"; - $mockkey2 = "https://kv16adamgroupdes7.vault.azure.net/keys/kek15adamGroupDES7/84412eaa63f344bf8a1b15612f2b36cb"; - $subId = Get-SubscriptionIdFromResourceGroup $rgname; - $mocksourcevault1 = '/subscriptions/' + $subId + '/resourceGroups/' + $rgname + '/providers/Microsoft.KeyVault/vaults/' + $vaultName1; - $mocksourcevault2 = '/subscriptions/' + $subId + '/resourceGroups/' + $rgname + '/providers/Microsoft.KeyVault/vaults/' + $vaultName2; + #Create DiskAccess1 in ResourceGroup1 + New-AzDiskAccess -ResourceGroupName $rgname -Name $diskname1Rg1 -location $loc - $encryptionType = "EncryptionAtRestWithPlatformAndCustomerKeys"; + #Use Get-AzDiskAccess on DiskAccess1 using Default ParameterSet + $diskAccess1 = Get-AzDiskAccess -ResourceGroupName $rgname -Name $diskname1Rg1 + #Use Get-AzDiskAccess on DiskAccess1 using resourceId + $diskAccess1check = Get-AzDiskAccess -resourceId $diskAccess1.id - $encSetConfig = New-AzDiskEncryptionSetConfig -Location $loc -EncryptionType $encryptionType; + #check if diskAccess1 is good + Assert-NotNull $diskAccess1 + Assert-AreEqual $diskAccess1.Name $diskname1Rg1 - $encSetConfigValues = New-AzDiskEncryptionSetConfig -Location $loc -KeyUrl $mockkey1 -SourceVaultId $mocksourcevault1 -EncryptionType $encryptionType -IdentityType "SystemAssigned" ` + #ASSERT check if diskaccess1 and diskaccess1check are same + Assert-AreEqual $diskAccess1.id $diskAccess1check.id - $encSet = New-AzDiskEncryptionSet -ResourceGroupName $rgname -Name $encryptionName -DiskEncryptionSet $encSetConfigValues; + #Create DiskAccess2 in ResourceGroup1 + New-AzDiskAccess -ResourceGroupName $rgname -Name $diskname2Rg1 -location $loc - Assert-NotNull $encSetConfig; - Assert-AreEqual $encSetConfig.EncryptionType $encryptionType; + #Use Get-AzDiskAccess by resourceGroupName + $rg1Result = Get-AzDiskAccess -ResourceGroupName $rgname - Assert-NotNull $encSet; - Assert-AreEqual $encryptionType $encSet.EncryptionType; + Assert-AreEqual $rg1Result.count 2 - # Test default EncryptionType value - $encSetConfigDefault = New-AzDiskEncryptionSetConfig -Location $loc -KeyUrl $mockkey2 -SourceVaultId $mocksourcevault2 -IdentityType "SystemAssigned"; - Assert-NotNull $encSetConfigDefault; - Assert-AreEqual $encSetDefaultConfig.EncryptionType $null; + #add DiskAccess3 to ResourceGroup2 + New-AzDiskAccess -ResourceGroupName $rgname2 -Name $diskname3Rg2 -location $loc - $encryptionNameDefault = $encryptionName + "Default"; - $encryptionTypeDefault = "EncryptionAtRestWithCustomerKey"; + #use get-azdiskaccess with no parameters. count should be >= 3 + $allResult = Get-AzDiskAccess - $encSetDefault = New-AzDiskEncryptionSet -ResourceGroupName $rgname -Name $encryptionNameDefault -DiskEncryptionSet $encSetConfigDefault; - Assert-NotNull $encSetDefault; - Assert-AreEqual $encSetDefault.EncryptionType $encryptionTypeDefault; + Assert-True {$allResult.Count -gt 2;} + + #remove-AzDiskAccess to DiskAccess1 by resourceId + Remove-AzDiskAccess -resourceid $diskAccess1.id + #Remove-AzDiskAccess to DiskAccess2 by default parameter set + Remove-AzDiskAccess -ResourceGroupName $rgname -Name $diskname2Rg1 + + #Get-AzDiskAccess by resource group. Count should be 0 + $allResult = Get-AzDiskAccess -ResourceGroupName $rgname + + Assert-AreEqual $allResult.count 0 + } finally { # Cleanup - $encSet | Remove-AzDiskEncryptionSet -Force; - $encSetDefault | Remove-AzDiskEncryptionSet -Force; + Clean-ResourceGroup $rgname + Clean-ResourceGroup $rgname2 } }