From 2abc8f8e93c68e325d73f241f38cb20928ed866d Mon Sep 17 00:00:00 2001 From: Beisi Zhou Date: Thu, 18 Apr 2024 13:40:18 +0800 Subject: [PATCH 1/6] wip --- .../KeyVault/Commands/{ => KeyVault}/GetAzureKeyVault.cs | 0 .../KeyVault/Commands/{ => KeyVault}/NewAzureKeyVault.cs | 7 +++---- .../Commands/{ => KeyVault}/RemoveAzureKeyVault.cs | 0 .../Commands/{ => KeyVault}/UndoAzureKeyVaultRemoval.cs | 0 .../Commands/{ => KeyVault}/UpdateAzureKeyVault.cs | 0 5 files changed, 3 insertions(+), 4 deletions(-) rename src/KeyVault/KeyVault/Commands/{ => KeyVault}/GetAzureKeyVault.cs (100%) rename src/KeyVault/KeyVault/Commands/{ => KeyVault}/NewAzureKeyVault.cs (92%) rename src/KeyVault/KeyVault/Commands/{ => KeyVault}/RemoveAzureKeyVault.cs (100%) rename src/KeyVault/KeyVault/Commands/{ => KeyVault}/UndoAzureKeyVaultRemoval.cs (100%) rename src/KeyVault/KeyVault/Commands/{ => KeyVault}/UpdateAzureKeyVault.cs (100%) diff --git a/src/KeyVault/KeyVault/Commands/GetAzureKeyVault.cs b/src/KeyVault/KeyVault/Commands/KeyVault/GetAzureKeyVault.cs similarity index 100% rename from src/KeyVault/KeyVault/Commands/GetAzureKeyVault.cs rename to src/KeyVault/KeyVault/Commands/KeyVault/GetAzureKeyVault.cs diff --git a/src/KeyVault/KeyVault/Commands/NewAzureKeyVault.cs b/src/KeyVault/KeyVault/Commands/KeyVault/NewAzureKeyVault.cs similarity index 92% rename from src/KeyVault/KeyVault/Commands/NewAzureKeyVault.cs rename to src/KeyVault/KeyVault/Commands/KeyVault/NewAzureKeyVault.cs index e2724f6363b8..927e6be9140c 100644 --- a/src/KeyVault/KeyVault/Commands/NewAzureKeyVault.cs +++ b/src/KeyVault/KeyVault/Commands/KeyVault/NewAzureKeyVault.cs @@ -88,10 +88,9 @@ public class NewAzureKeyVault : KeyVaultManagementCmdletBase HelpMessage = "If specified, protection against immediate deletion is enabled for this vault; requires soft delete to be enabled as well. Enabling 'purge protection' on a key vault is an irreversible action. Once enabled, it cannot be changed or removed.")] public SwitchParameter EnablePurgeProtection { get; set; } - [CmdletParameterBreakingChangeWithVersion(nameof(EnableRbacAuthorization), "12.0.0", "6.0.0", ReplaceMentCmdletParameterName = "DisableRbacAuthorization", ChangeDescription = "RBAC will be enabled by default during the process of key vault creation. To disable RBAC authorization, please use parameter 'DisableRbacAuthorization'.")] [Parameter(Mandatory = false, - HelpMessage = "If specified, enables to authorize data actions by Role Based Access Control (RBAC), and then the access policies specified in vault properties will be ignored. Note that management actions are always authorized with RBAC.")] - public SwitchParameter EnableRbacAuthorization { get; set; } + HelpMessage = "If specified, disables to authorize data actions by Role Based Access Control (RBAC), and then the access policies specified in vault properties will be ignored. Note that management actions are always authorized with RBAC.")] + public SwitchParameter DisableRbacAuthorization { get; set; } [Parameter(Mandatory = false, HelpMessage = "Specifies how long deleted resources are retained, and how long until a vault or an object in the deleted state can be purged. The default is " + Constants.DefaultSoftDeleteRetentionDaysString + " days.")] [ValidateRange(Constants.MinSoftDeleteRetentionDays, Constants.MaxSoftDeleteRetentionDays)] @@ -169,7 +168,7 @@ public override void ExecuteCmdlet() EnabledForDiskEncryption = EnabledForDiskEncryption.IsPresent ? true : null as bool?, EnableSoftDelete = null, EnablePurgeProtection = EnablePurgeProtection.IsPresent ? true : (bool?)null, // false is not accepted - EnableRbacAuthorization = EnableRbacAuthorization.IsPresent ? true : null as bool?, + EnableRbacAuthorization = DisableRbacAuthorization.IsPresent ? false : null as bool?, /* * If retention days is not specified, use the default value, * else use the vault user provides diff --git a/src/KeyVault/KeyVault/Commands/RemoveAzureKeyVault.cs b/src/KeyVault/KeyVault/Commands/KeyVault/RemoveAzureKeyVault.cs similarity index 100% rename from src/KeyVault/KeyVault/Commands/RemoveAzureKeyVault.cs rename to src/KeyVault/KeyVault/Commands/KeyVault/RemoveAzureKeyVault.cs diff --git a/src/KeyVault/KeyVault/Commands/UndoAzureKeyVaultRemoval.cs b/src/KeyVault/KeyVault/Commands/KeyVault/UndoAzureKeyVaultRemoval.cs similarity index 100% rename from src/KeyVault/KeyVault/Commands/UndoAzureKeyVaultRemoval.cs rename to src/KeyVault/KeyVault/Commands/KeyVault/UndoAzureKeyVaultRemoval.cs diff --git a/src/KeyVault/KeyVault/Commands/UpdateAzureKeyVault.cs b/src/KeyVault/KeyVault/Commands/KeyVault/UpdateAzureKeyVault.cs similarity index 100% rename from src/KeyVault/KeyVault/Commands/UpdateAzureKeyVault.cs rename to src/KeyVault/KeyVault/Commands/KeyVault/UpdateAzureKeyVault.cs From 807a52c5369956f7701615fd53f00b8226a92e2c Mon Sep 17 00:00:00 2001 From: Beisi Zhou Date: Mon, 22 Apr 2024 15:05:54 +0800 Subject: [PATCH 2/6] RBAC will be enabled by default during the process of key vault creation. --- src/KeyVault/KeyVault/ChangeLog.md | 4 +++- .../KeyVault/Commands/KeyVault/NewAzureKeyVault.cs | 2 +- .../KeyVault/Commands/KeyVault/UpdateAzureKeyVault.cs | 7 +++---- 3 files changed, 7 insertions(+), 6 deletions(-) diff --git a/src/KeyVault/KeyVault/ChangeLog.md b/src/KeyVault/KeyVault/ChangeLog.md index 8643556c9672..02c88b59b43c 100644 --- a/src/KeyVault/KeyVault/ChangeLog.md +++ b/src/KeyVault/KeyVault/ChangeLog.md @@ -18,6 +18,8 @@ - Additional information about change #1 --> ## Upcoming Release +* [Breaking Change] Replaced parameter `EnableRbacAuthorization` by `DisableRbacAuthorization` in `New-AzKeyVault` and `Update-AzKeyVault`. + - RBAC will be enabled by default during the process of key vault creation. * Added parameter `PolicyPath` in `Add-AzKeyVaultCertificate` to support custom policy in the process of certificate enrollment. * Upgraded the API version of merging certificate to 7.5. [#24323] @@ -27,7 +29,7 @@ * [Upcoming Breaking Change] Added breaking change warning message for parameter `EnableRbacAuthorization` of `New-AzKeyVault` and `Update-AzKeyVault`. - RBAC will be enabled by default during the process of key vault creation. To disable RBAC authorization, please use parameter 'DisableRbacAuthorization'. - Parameter `EnableRbacAuthorization` is expected to be removed in Az.KeyVault 6.0.0 and Az 12.0.0. - - Parameter `EnableRbacAuthorization` is expected to be replaced by `DisableRbacAuthorization`. + - Parameter `EnableRbacAuthorization` is expected to be replaced by `DisableRbacAuthorization`. * Upgraded Azure.Core to 1.37.0. ## Version 5.2.1 diff --git a/src/KeyVault/KeyVault/Commands/KeyVault/NewAzureKeyVault.cs b/src/KeyVault/KeyVault/Commands/KeyVault/NewAzureKeyVault.cs index 927e6be9140c..e6c80edabe6a 100644 --- a/src/KeyVault/KeyVault/Commands/KeyVault/NewAzureKeyVault.cs +++ b/src/KeyVault/KeyVault/Commands/KeyVault/NewAzureKeyVault.cs @@ -168,7 +168,7 @@ public override void ExecuteCmdlet() EnabledForDiskEncryption = EnabledForDiskEncryption.IsPresent ? true : null as bool?, EnableSoftDelete = null, EnablePurgeProtection = EnablePurgeProtection.IsPresent ? true : (bool?)null, // false is not accepted - EnableRbacAuthorization = DisableRbacAuthorization.IsPresent ? false : null as bool?, + EnableRbacAuthorization = DisableRbacAuthorization.IsPresent ? false : true, /* * If retention days is not specified, use the default value, * else use the vault user provides diff --git a/src/KeyVault/KeyVault/Commands/KeyVault/UpdateAzureKeyVault.cs b/src/KeyVault/KeyVault/Commands/KeyVault/UpdateAzureKeyVault.cs index 6a6ea4b75588..1eb615bd0a9c 100644 --- a/src/KeyVault/KeyVault/Commands/KeyVault/UpdateAzureKeyVault.cs +++ b/src/KeyVault/KeyVault/Commands/KeyVault/UpdateAzureKeyVault.cs @@ -52,9 +52,8 @@ public class UpdateTopLevelResourceCommand : KeyVaultManagementCmdletBase [Parameter(Mandatory = false, HelpMessage = "Enable the purge protection functionality for this key vault. Once enabled it cannot be disabled. It requires soft-delete to be turned on.")] public SwitchParameter EnablePurgeProtection { get; set; } - [CmdletParameterBreakingChangeWithVersion(nameof(EnableRbacAuthorization), "12.0.0", "6.0.0", ReplaceMentCmdletParameterName = "DisableRbacAuthorization", ChangeDescription = "RBAC will be enabled by default during the process of key vault creation. To disable RBAC authorization, please use parameter 'DisableRbacAuthorization'.")] - [Parameter(Mandatory = false, HelpMessage = "Enable or disable this key vault to authorize data actions by Role Based Access Control (RBAC).")] - public bool? EnableRbacAuthorization { get; set; } + [Parameter(Mandatory = false, HelpMessage = "Disable or enable this key vault to authorize data actions by Role Based Access Control (RBAC).")] + public bool? DisableRbacAuthorization { get; set; } [Parameter(Mandatory = false, HelpMessage = "Specifies whether the vault will accept traffic from public internet. If set to 'disabled' all traffic except private endpoint traffic and that originates from trusted services will be blocked. This will override the set firewall rules, meaning that even if the firewall rules are present we will not honor the rules.")] @@ -105,7 +104,7 @@ public override void ExecuteCmdlet() updatedParamater: new VaultCreationOrUpdateParameters { EnablePurgeProtection = this.EnablePurgeProtection.IsPresent ? (true as bool?) : null, - EnableRbacAuthorization = this.EnableRbacAuthorization, + EnableRbacAuthorization = this.DisableRbacAuthorization == null ? null : !this.DisableRbacAuthorization, PublicNetworkAccess = this.PublicNetworkAccess, Tags = this.Tag } From 3c007c1212b251caff69629988ce4097ac67c751 Mon Sep 17 00:00:00 2001 From: Beisi Zhou Date: Wed, 24 Apr 2024 10:15:12 +0800 Subject: [PATCH 3/6] add BreakingChangeIssues.csv --- .../Exceptions/Az.KeyVault/BreakingChangeIssues.csv | 8 ++++++++ 1 file changed, 8 insertions(+) create mode 100644 tools/StaticAnalysis/Exceptions/Az.KeyVault/BreakingChangeIssues.csv diff --git a/tools/StaticAnalysis/Exceptions/Az.KeyVault/BreakingChangeIssues.csv b/tools/StaticAnalysis/Exceptions/Az.KeyVault/BreakingChangeIssues.csv new file mode 100644 index 000000000000..b1ff8148df08 --- /dev/null +++ b/tools/StaticAnalysis/Exceptions/Az.KeyVault/BreakingChangeIssues.csv @@ -0,0 +1,8 @@ +"Module","ClassName","Target","Severity","ProblemId","Description","Remediation" +"Az.KeyVault","Microsoft.Azure.Commands.KeyVault.NewAzureKeyVault","New-AzKeyVault","0","2000","The cmdlet 'New-AzKeyVault' no longer supports the parameter 'EnableRbacAuthorization' and no alias was found for the original parameter name.","Add the parameter 'EnableRbacAuthorization' back to the cmdlet 'New-AzKeyVault', or add an alias to the original parameter name." +"Az.KeyVault","Microsoft.Azure.Commands.KeyVault.NewAzureKeyVault","New-AzKeyVault","0","1050","The parameter set '__AllParameterSets' for cmdlet 'New-AzKeyVault' has been removed.","Add parameter set '__AllParameterSets' back to cmdlet 'New-AzKeyVault'." +"Az.KeyVault","Microsoft.Azure.Commands.KeyVault.UpdateTopLevelResourceCommand","Update-AzKeyVault","0","2000","The cmdlet 'Update-AzKeyVault' no longer supports the parameter 'EnableRbacAuthorization' and no alias was found for the original parameter name.","Add the parameter 'EnableRbacAuthorization' back to the cmdlet 'Update-AzKeyVault', or add an alias to the original parameter name." +"Az.KeyVault","Microsoft.Azure.Commands.KeyVault.UpdateTopLevelResourceCommand","Update-AzKeyVault","0","1050","The parameter set 'UpdateByNameParameterSet' for cmdlet 'Update-AzKeyVault' has been removed.","Add parameter set 'UpdateByNameParameterSet' back to cmdlet 'Update-AzKeyVault'." +"Az.KeyVault","Microsoft.Azure.Commands.KeyVault.UpdateTopLevelResourceCommand","Update-AzKeyVault","0","1050","The parameter set 'UpdateByInputObjectParameterSet' for cmdlet 'Update-AzKeyVault' has been removed.","Add parameter set 'UpdateByInputObjectParameterSet' back to cmdlet 'Update-AzKeyVault'." +"Az.KeyVault","Microsoft.Azure.Commands.KeyVault.UpdateTopLevelResourceCommand","Update-AzKeyVault","0","1050","The parameter set 'UpdateByResourceIdParameterSet' for cmdlet 'Update-AzKeyVault' has been removed.","Add parameter set 'UpdateByResourceIdParameterSet' back to cmdlet 'Update-AzKeyVault'." +"Az.KeyVault","Microsoft.Azure.Commands.KeyVault.UpdateTopLevelResourceCommand","Update-AzKeyVault","0","1050","The parameter set '__AllParameterSets' for cmdlet 'Update-AzKeyVault' has been removed.","Add parameter set '__AllParameterSets' back to cmdlet 'Update-AzKeyVault'." \ No newline at end of file From c78dae16e75c170fa6b8048b3d01a83632f5192b Mon Sep 17 00:00:00 2001 From: Beisi Zhou Date: Wed, 24 Apr 2024 10:24:44 +0800 Subject: [PATCH 4/6] update help docs and test cases --- .../LiveTests/TestLiveScenarios.ps1 | 2 +- .../ScenarioTests/KeyVaultManagementTests.ps1 | 6 +- src/KeyVault/KeyVault/help/New-AzKeyVault.md | 32 +++---- .../KeyVault/help/Update-AzKeyVault.md | 34 +++---- .../TestCoverageAnalysis/Raw/Az.KeyVault.csv | 89 +++++++++++++++++++ 5 files changed, 126 insertions(+), 37 deletions(-) create mode 100644 src/Resources/TestCoverageAnalysis/Raw/Az.KeyVault.csv diff --git a/src/KeyVault/KeyVault.Test/LiveTests/TestLiveScenarios.ps1 b/src/KeyVault/KeyVault.Test/LiveTests/TestLiveScenarios.ps1 index f065d688d7d2..0297d0416af0 100644 --- a/src/KeyVault/KeyVault.Test/LiveTests/TestLiveScenarios.ps1 +++ b/src/KeyVault/KeyVault.Test/LiveTests/TestLiveScenarios.ps1 @@ -47,7 +47,7 @@ Invoke-LiveTestScenario -Name "Update key vault" -Description "Test updating pro # Update EnableRbacAuthorization $vault = New-AzKeyVault -VaultName $vaultName -ResourceGroupName $rgName -Location $vaultLocation - $vault = $vault | Update-AzKeyVault -EnableRbacAuthorization $false + $vault = $vault | Update-AzKeyVault -DisableRbacAuthorization $true Assert-False { $vault.EnableRbacAuthorization } "EnableRbacAuthorization should be false" # Update Tags diff --git a/src/KeyVault/KeyVault.Test/ScenarioTests/KeyVaultManagementTests.ps1 b/src/KeyVault/KeyVault.Test/ScenarioTests/KeyVaultManagementTests.ps1 index 9609bde22727..350c954e76b5 100644 --- a/src/KeyVault/KeyVault.Test/ScenarioTests/KeyVaultManagementTests.ps1 +++ b/src/KeyVault/KeyVault.Test/ScenarioTests/KeyVaultManagementTests.ps1 @@ -134,7 +134,7 @@ function Test-CreateNewVault { Assert-AreEqual 10 $actual.SoftDeleteRetentionInDays "SoftDeleteRetentionInDays should be the same value as set" # Test enable RbacAuthorization - $actual = New-AzKeyVault -VaultName (getAssetName) -ResourceGroupName $rgName -Location $vaultLocation -EnableRbacAuthorization + $actual = New-AzKeyVault -VaultName (getAssetName) -ResourceGroupName $rgName -Location $vaultLocation Assert-True { $actual.EnableRbacAuthorization } "If specified, EnableRbacAuthorization should be true" # Test positional parameters @@ -823,11 +823,11 @@ function Test-UpdateKeyVault { # Assert-Throws { $vault = $vault | Update-AzKeyVault -SoftDeleteRetentionInDays 80} #Set EnableRbacAuthorization true - $vault = $vault | Update-AzKeyVault -EnableRbacAuthorization $true + $vault = $vault | Update-AzKeyVault -DisableRbacAuthorization $false Assert-True { $vault.EnableRbacAuthorization } "5. EnableRbacAuthorization should be true" #Set EnableRbacAuthorization false - $vault = $vault | Update-AzKeyVault -EnableRbacAuthorization $false + $vault = $vault | Update-AzKeyVault -DisableRbacAuthorization $true Assert-False { $vault.EnableRbacAuthorization } "6. EnableRbacAuthorization should be false" # Update Tags diff --git a/src/KeyVault/KeyVault/help/New-AzKeyVault.md b/src/KeyVault/KeyVault/help/New-AzKeyVault.md index 69c12e99307a..95a3f39c1a48 100644 --- a/src/KeyVault/KeyVault/help/New-AzKeyVault.md +++ b/src/KeyVault/KeyVault/help/New-AzKeyVault.md @@ -16,10 +16,10 @@ Creates a key vault. ``` New-AzKeyVault [-Name] [-ResourceGroupName] [-Location] [-EnabledForDeployment] [-EnabledForTemplateDeployment] [-EnabledForDiskEncryption] [-EnablePurgeProtection] - [-EnableRbacAuthorization] [-SoftDeleteRetentionInDays ] [-PublicNetworkAccess ] + [-DisableRbacAuthorization] [-SoftDeleteRetentionInDays ] [-PublicNetworkAccess ] [-Sku ] [-Tag ] [-NetworkRuleSet ] - [-DefaultProfile ] [-WhatIf] [-Confirm] - [-SubscriptionId ] [] + [-DefaultProfile ] [-WhatIf] [-Confirm] [-SubscriptionId ] + [] ``` ## DESCRIPTION @@ -184,9 +184,8 @@ Accept pipeline input: False Accept wildcard characters: False ``` -### -EnabledForDeployment -Enables the Microsoft.Compute resource provider to retrieve secrets from this key vault when this -key vault is referenced in resource creation, for example when creating a virtual machine. +### -DisableRbacAuthorization +If specified, disables to authorize data actions by Role Based Access Control (RBAC), and then the access policies specified in vault properties will be ignored. Note that management actions are always authorized with RBAC. ```yaml Type: System.Management.Automation.SwitchParameter @@ -196,12 +195,13 @@ Aliases: Required: False Position: Named Default value: None -Accept pipeline input: True (ByPropertyName) +Accept pipeline input: False Accept wildcard characters: False ``` -### -EnabledForDiskEncryption -Enables the Azure disk encryption service to get secrets and unwrap keys from this key vault. +### -EnabledForDeployment +Enables the Microsoft.Compute resource provider to retrieve secrets from this key vault when this +key vault is referenced in resource creation, for example when creating a virtual machine. ```yaml Type: System.Management.Automation.SwitchParameter @@ -215,8 +215,8 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` -### -EnabledForTemplateDeployment -Enables Azure Resource Manager to get secrets from this key vault when this key vault is referenced in a template deployment. +### -EnabledForDiskEncryption +Enables the Azure disk encryption service to get secrets and unwrap keys from this key vault. ```yaml Type: System.Management.Automation.SwitchParameter @@ -230,8 +230,8 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` -### -EnablePurgeProtection -If specified, protection against immediate deletion is enabled for this vault; requires soft delete to be enabled as well. +### -EnabledForTemplateDeployment +Enables Azure Resource Manager to get secrets from this key vault when this key vault is referenced in a template deployment. ```yaml Type: System.Management.Automation.SwitchParameter @@ -241,12 +241,12 @@ Aliases: Required: False Position: Named Default value: None -Accept pipeline input: False +Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` -### -EnableRbacAuthorization -If specified, enables to authorize data actions by Role Based Access Control (RBAC), and then the access policies specified in vault properties will be ignored. Note that management actions are always authorized with RBAC. +### -EnablePurgeProtection +If specified, protection against immediate deletion is enabled for this vault; requires soft delete to be enabled as well. ```yaml Type: System.Management.Automation.SwitchParameter diff --git a/src/KeyVault/KeyVault/help/Update-AzKeyVault.md b/src/KeyVault/KeyVault/help/Update-AzKeyVault.md index 7940f03e2b4d..d17a1b9ca781 100644 --- a/src/KeyVault/KeyVault/help/Update-AzKeyVault.md +++ b/src/KeyVault/KeyVault/help/Update-AzKeyVault.md @@ -15,23 +15,23 @@ Update the state of an Azure key vault. ### UpdateByNameParameterSet (Default) ``` Update-AzKeyVault -ResourceGroupName -VaultName [-EnablePurgeProtection] - [-EnableRbacAuthorization ] [-PublicNetworkAccess ] [-Tag ] - [-DefaultProfile ] [-WhatIf] [-Confirm] - [-SubscriptionId ] [] + [-DisableRbacAuthorization ] [-PublicNetworkAccess ] [-Tag ] + [-DefaultProfile ] [-WhatIf] [-Confirm] [-SubscriptionId ] + [] ``` ### UpdateByInputObjectParameterSet ``` -Update-AzKeyVault -InputObject [-EnablePurgeProtection] [-EnableRbacAuthorization ] - [-PublicNetworkAccess ] [-Tag ] [-DefaultProfile ] - [-WhatIf] [-Confirm] [-SubscriptionId ] [] +Update-AzKeyVault -InputObject [-EnablePurgeProtection] [-DisableRbacAuthorization ] + [-PublicNetworkAccess ] [-Tag ] [-DefaultProfile ] [-WhatIf] + [-Confirm] [-SubscriptionId ] [] ``` ### UpdateByResourceIdParameterSet ``` -Update-AzKeyVault -ResourceId [-EnablePurgeProtection] [-EnableRbacAuthorization ] - [-PublicNetworkAccess ] [-Tag ] [-DefaultProfile ] - [-WhatIf] [-Confirm] [-SubscriptionId ] [] +Update-AzKeyVault -ResourceId [-EnablePurgeProtection] [-DisableRbacAuthorization ] + [-PublicNetworkAccess ] [-Tag ] [-DefaultProfile ] [-WhatIf] + [-Confirm] [-SubscriptionId ] [] ``` ## DESCRIPTION @@ -84,13 +84,11 @@ Accept pipeline input: False Accept wildcard characters: False ``` -### -EnablePurgeProtection -Enable the purge protection functionality for this key vault. -Once enabled it cannot be disabled. -It requires soft-delete to be turned on. +### -DisableRbacAuthorization +Disable or enable this key vault to authorize data actions by Role Based Access Control (RBAC). ```yaml -Type: System.Management.Automation.SwitchParameter +Type: System.Nullable`1[System.Boolean] Parameter Sets: (All) Aliases: @@ -101,11 +99,13 @@ Accept pipeline input: False Accept wildcard characters: False ``` -### -EnableRbacAuthorization -Enable or disable this key vault to authorize data actions by Role Based Access Control (RBAC). +### -EnablePurgeProtection +Enable the purge protection functionality for this key vault. +Once enabled it cannot be disabled. +It requires soft-delete to be turned on. ```yaml -Type: System.Nullable`1[System.Boolean] +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: diff --git a/src/Resources/TestCoverageAnalysis/Raw/Az.KeyVault.csv b/src/Resources/TestCoverageAnalysis/Raw/Az.KeyVault.csv new file mode 100644 index 000000000000..dabf5133e31f --- /dev/null +++ b/src/Resources/TestCoverageAnalysis/Raw/Az.KeyVault.csv @@ -0,0 +1,89 @@ +CommandName,ParameterSetName,Parameters,SourceScript,LineNumber,StartDateTime,EndDateTime,IsSuccess +New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -Tag ***,KeyVaultManagementTests.ps1,102,2024-04-24T02:22:54,2024-04-24T02:22:54,true +New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -Sku *** -EnabledForDeployment ***,KeyVaultManagementTests.ps1,122,2024-04-24T02:22:54,2024-04-24T02:22:54,true +New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -Sku *** -EnablePurgeProtection *** -SoftDeleteRetentionInDays ***,KeyVaultManagementTests.ps1,131,2024-04-24T02:22:54,2024-04-24T02:22:54,true +New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location ***,KeyVaultManagementTests.ps1,137,2024-04-24T02:22:54,2024-04-24T02:22:54,true +New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location ***,KeyVaultManagementTests.ps1,141,2024-04-24T02:22:54,2024-04-24T02:22:54,true +New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location ***,KeyVaultManagementTests.ps1,856,2024-04-24T02:22:55,2024-04-24T02:22:55,true +Update-AzKeyVault,UpdateByInputObjectParameterSet,-PublicNetworkAccess ***,KeyVaultManagementTests.ps1,860,2024-04-24T02:22:55,2024-04-24T02:22:55,true +Update-AzKeyVault,UpdateByInputObjectParameterSet,-Tag ***,KeyVaultManagementTests.ps1,864,2024-04-24T02:22:55,2024-04-24T02:22:55,true +Update-AzKeyVault,UpdateByInputObjectParameterSet,-PublicNetworkAccess ***,KeyVaultManagementTests.ps1,868,2024-04-24T02:22:55,2024-04-24T02:22:55,true +New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location ***,KeyVaultManagementTests.ps1,731,2024-04-24T02:22:56,2024-04-24T02:22:56,true +New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location ***,KeyVaultManagementTests.ps1,170,2024-04-24T02:22:56,2024-04-24T02:22:56,true +New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -PublicNetworkAccess ***,KeyVaultManagementTests.ps1,172,2024-04-24T02:22:56,2024-04-24T02:22:56,true +New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -PublicNetworkAccess ***,KeyVaultManagementTests.ps1,174,2024-04-24T02:22:56,2024-04-24T02:22:56,true +New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location ***,KeyVaultManagementTests.ps1,276,2024-04-24T02:22:57,2024-04-24T02:22:57,true +Get-AzKeyVault,GetVaultByName,-VaultName *** -ResourceGroupName ***,KeyVaultManagementTests.ps1,277,2024-04-24T02:22:57,2024-04-24T02:22:57,true +Get-AzKeyVault,GetVaultByName,-VaultName ***,KeyVaultManagementTests.ps1,284,2024-04-24T02:22:57,2024-04-24T02:22:57,true +Get-AzKeyVault,GetVaultByName,-VaultName ***,KeyVaultManagementTests.ps1,291,2024-04-24T02:22:57,2024-04-24T02:22:57,true +Get-AzKeyVault,GetVaultByName,-VaultName *** -ResourceGroupName ***,KeyVaultManagementTests.ps1,301,2024-04-24T02:22:57,2024-04-24T02:22:57,true +Get-AzKeyVault,GetVaultByName,-VaultName *** -ResourceGroupName ***,KeyVaultManagementTests.ps1,304,2024-04-24T02:22:57,2024-04-24T02:22:57,true +New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location ***,KeyVaultManagementTests.ps1,324,2024-04-24T02:22:58,2024-04-24T02:22:58,true +New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -Tag ***,KeyVaultManagementTests.ps1,325,2024-04-24T02:22:58,2024-04-24T02:22:58,true +Get-AzKeyVault,GetVaultByName,,KeyVaultManagementTests.ps1,327,2024-04-24T02:22:58,2024-04-24T02:22:58,true +Get-AzKeyVault,GetVaultByName,-ResourceGroupName ***,KeyVaultManagementTests.ps1,335,2024-04-24T02:22:58,2024-04-24T02:22:58,true +Get-AzKeyVault,GetVaultByName,-ResourceGroupName *** -VaultName ***,KeyVaultManagementTests.ps1,344,2024-04-24T02:22:58,2024-04-24T02:22:58,true +Get-AzKeyVault,GetVaultByName,-ResourceGroupName *** -VaultName ***,KeyVaultManagementTests.ps1,353,2024-04-24T02:22:58,2024-04-24T02:22:58,true +Get-AzKeyVault,GetVaultByName,-ResourceGroupName *** -VaultName ***,KeyVaultManagementTests.ps1,361,2024-04-24T02:22:58,2024-04-24T02:22:58,true +Get-AzKeyVault,GetVaultByName,-VaultName ***,KeyVaultManagementTests.ps1,370,2024-04-24T02:22:58,2024-04-24T02:22:58,true +Get-AzKeyVault,GetVaultByName,-Tag ***,KeyVaultManagementTests.ps1,378,2024-04-24T02:22:58,2024-04-24T02:22:58,true +New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location ***,KeyVaultManagementTests.ps1,808,2024-04-24T02:22:58,2024-04-24T02:22:58,true +Update-AzKeyVault,UpdateByInputObjectParameterSet,-EnablePurgeProtection ***,KeyVaultManagementTests.ps1,814,2024-04-24T02:22:58,2024-04-24T02:22:58,true +Update-AzKeyVault,UpdateByInputObjectParameterSet,-DisableRbacAuthorization ***,KeyVaultManagementTests.ps1,826,2024-04-24T02:22:58,2024-04-24T02:22:59,true +Update-AzKeyVault,UpdateByInputObjectParameterSet,-DisableRbacAuthorization ***,KeyVaultManagementTests.ps1,830,2024-04-24T02:22:59,2024-04-24T02:22:59,true +Update-AzKeyVault,UpdateByInputObjectParameterSet,-Tag ***,KeyVaultManagementTests.ps1,834,2024-04-24T02:22:59,2024-04-24T02:22:59,true +Update-AzKeyVault,UpdateByInputObjectParameterSet,-Tag ***,KeyVaultManagementTests.ps1,840,2024-04-24T02:22:59,2024-04-24T02:22:59,true +New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location ***,KeyVaultManagementTests.ps1,406,2024-04-24T02:22:59,2024-04-24T02:22:59,true +Remove-AzKeyVault,ByAvailableVault,-VaultName *** -Force ***,KeyVaultManagementTests.ps1,408,2024-04-24T02:22:59,2024-04-24T02:22:59,true +Get-AzKeyVault,GetVaultByName,-VaultName *** -ResourceGroupName ***,KeyVaultManagementTests.ps1,410,2024-04-24T02:22:59,2024-04-24T02:22:59,true +Remove-AzKeyVault,ByDeletedVault,-VaultName *** -Location *** -InRemovedState *** -Force ***,KeyVaultManagementTests.ps1,414,2024-04-24T02:22:59,2024-04-24T02:22:59,true +New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location ***,KeyVaultManagementTests.ps1,417,2024-04-24T02:22:59,2024-04-24T02:22:59,true +Get-AzKeyVault,GetVaultByName,-VaultName ***,KeyVaultManagementTests.ps1,419,2024-04-24T02:22:59,2024-04-24T02:22:59,true +Remove-AzKeyVault,InputObjectByAvailableVault,-Force ***,KeyVaultManagementTests.ps1,419,2024-04-24T02:22:59,2024-04-24T02:22:59,true +Get-AzKeyVault,GetVaultByName,-VaultName *** -ResourceGroupName ***,KeyVaultManagementTests.ps1,421,2024-04-24T02:22:59,2024-04-24T02:22:59,true +Remove-AzKeyVault,ByAvailableVault,-VaultName *** -AsJob ***,KeyVaultManagementTests.ps1,425,2024-04-24T02:22:59,2024-04-24T02:22:59,true +New-AzKeyVaultManagedHsm,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -Administrator *** -SoftDeleteRetentionInDays ***,ManagedHsmManagementTests.ps1,116,2024-04-24T02:23:00,2024-04-24T02:23:00,true +Update-AzKeyVaultManagedHsm,UpdateByNameParameterSet,-Name *** -ResourceGroupName *** -Tag ***,ManagedHsmManagementTests.ps1,120,2024-04-24T02:23:00,2024-04-24T02:23:00,true +New-AzKeyVaultManagedHsm,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -Administrator *** -PublicNetworkAccess *** -SoftDeleteRetentionInDays ***,ManagedHsmManagementTests.ps1,124,2024-04-24T02:23:00,2024-04-24T02:23:00,true +Update-AzKeyVaultManagedHsm,UpdateByNameParameterSet,-Name *** -ResourceGroupName *** -PublicNetworkAccess ***,ManagedHsmManagementTests.ps1,128,2024-04-24T02:23:00,2024-04-24T02:23:00,true +New-AzKeyVaultManagedHsm,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -Administrator *** -PublicNetworkAccess *** -SoftDeleteRetentionInDays ***,ManagedHsmManagementTests.ps1,132,2024-04-24T02:23:00,2024-04-24T02:23:00,true +Update-AzKeyVaultManagedHsm,UpdateByNameParameterSet,-Name *** -ResourceGroupName *** -PublicNetworkAccess ***,ManagedHsmManagementTests.ps1,136,2024-04-24T02:23:00,2024-04-24T02:23:00,true +Remove-AzKeyVaultManagedHsm,RemoveDeletedManagedHsmByName,-Name *** -Location *** -InRemovedState *** -Force ***,ManagedHsmManagementTests.ps1,140,2024-04-24T02:23:00,2024-04-24T02:23:01,true +Remove-AzKeyVaultManagedHsm,RemoveDeletedManagedHsmByName,-Name *** -Location *** -InRemovedState *** -Force ***,ManagedHsmManagementTests.ps1,141,2024-04-24T02:23:01,2024-04-24T02:23:01,true +Remove-AzKeyVaultManagedHsm,RemoveDeletedManagedHsmByName,-Name *** -Location *** -InRemovedState *** -Force ***,ManagedHsmManagementTests.ps1,142,2024-04-24T02:23:01,2024-04-24T02:23:01,true +New-AzKeyVaultManagedHsm,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -Administrator *** -SoftDeleteRetentionInDays ***,ManagedHsmManagementTests.ps1,29,2024-04-24T02:23:01,2024-04-24T02:23:01,true +Get-AzKeyVaultManagedHsm,GetManagedHsm,-Name ***,ManagedHsmManagementTests.ps1,39,2024-04-24T02:23:01,2024-04-24T02:23:01,true +Remove-AzKeyVaultManagedHsm,RemoveManagedHsmByInputObject,-InputObject *** -Force ***,ManagedHsmManagementTests.ps1,50,2024-04-24T02:23:01,2024-04-24T02:23:01,true +Get-AzKeyVaultManagedHsm,GetManagedHsm,-Name *** -ResourceGroupName ***,ManagedHsmManagementTests.ps1,51,2024-04-24T02:23:01,2024-04-24T02:23:01,true +Remove-AzKeyVaultManagedHsm,RemoveDeletedManagedHsmByName,-Name *** -Location *** -InRemovedState *** -Force ***,ManagedHsmManagementTests.ps1,61,2024-04-24T02:23:01,2024-04-24T02:23:01,true +New-AzKeyVaultManagedHsm,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -Administrator *** -SoftDeleteRetentionInDays *** -UserAssignedIdentity ***,ManagedHsmManagementTests.ps1,84,2024-04-24T02:23:02,2024-04-24T02:23:02,true +New-AzKeyVaultManagedHsm,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -Administrator *** -SoftDeleteRetentionInDays ***,ManagedHsmManagementTests.ps1,87,2024-04-24T02:23:02,2024-04-24T02:23:02,true +Update-AzKeyVaultManagedHsm,UpdateByInputObjectParameterSet,-UserAssignedIdentity ***,ManagedHsmManagementTests.ps1,88,2024-04-24T02:23:02,2024-04-24T02:23:02,true +Remove-AzKeyVaultManagedHsm,RemoveDeletedManagedHsmByName,-Name *** -Location *** -InRemovedState *** -Force ***,ManagedHsmManagementTests.ps1,93,2024-04-24T02:23:02,2024-04-24T02:23:02,true +Remove-AzKeyVaultManagedHsm,RemoveDeletedManagedHsmByName,-Name *** -Location *** -InRemovedState *** -Force ***,ManagedHsmManagementTests.ps1,94,2024-04-24T02:23:02,2024-04-24T02:23:02,true +New-AzKeyVaultManagedHsm,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -Administrator *** -EnablePurgeProtection *** -SoftDeleteRetentionInDays ***,ManagedHsmManagementTests.ps1,191,2024-04-24T02:23:02,2024-04-24T02:23:03,true +Remove-AzKeyVaultManagedHsm,RemoveManagedHsmByInputObject,-InputObject *** -Force ***,ManagedHsmManagementTests.ps1,195,2024-04-24T02:23:03,2024-04-24T02:23:03,true +New-AzKeyVaultManagedHsm,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -Administrator *** -SoftDeleteRetentionInDays ***,ManagedHsmManagementTests.ps1,214,2024-04-24T02:23:03,2024-04-24T02:23:03,true +Remove-AzKeyVaultManagedHsm,RemoveManagedHsmByInputObject,-InputObject *** -Force ***,ManagedHsmManagementTests.ps1,216,2024-04-24T02:23:03,2024-04-24T02:23:03,true +Get-AzKeyVaultManagedHsm,GetDeletedManagedHsm,-Name *** -Location *** -InRemovedState ***,ManagedHsmManagementTests.ps1,219,2024-04-24T02:23:03,2024-04-24T02:23:03,true +Undo-AzKeyVaultManagedHsmRemoval,InputObject,-InputObject ***,ManagedHsmManagementTests.ps1,223,2024-04-24T02:23:03,2024-04-24T02:23:03,true +Get-AzKeyVaultManagedHsm,GetManagedHsm,-Name *** -ResourceGroupName ***,ManagedHsmManagementTests.ps1,224,2024-04-24T02:23:03,2024-04-24T02:23:03,true +New-AzKeyVaultManagedHsm,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -Administrator *** -SoftDeleteRetentionInDays ***,ManagedHsmManagementTests.ps1,160,2024-04-24T02:23:04,2024-04-24T02:23:04,true +Remove-AzKeyVaultManagedHsm,RemoveManagedHsmByInputObject,-InputObject *** -Force ***,ManagedHsmManagementTests.ps1,163,2024-04-24T02:23:04,2024-04-24T02:23:04,true +Get-AzKeyVaultManagedHsm,GetDeletedManagedHsm,-Name *** -Location *** -InRemovedState ***,ManagedHsmManagementTests.ps1,166,2024-04-24T02:23:04,2024-04-24T02:23:04,true +Remove-AzKeyVaultManagedHsm,RemoveDeletedManagedHsmByInputObject,-InputObject *** -InRemovedState *** -Force ***,ManagedHsmManagementTests.ps1,170,2024-04-24T02:23:04,2024-04-24T02:23:04,true +New-AzKeyVaultNetworkRuleSetObject,__AllParameterSets,-IpAddressRange *** -VirtualNetworkResourceId *** -Bypass *** -DefaultAction ***,NetworkRuleTests.ps1,17,2024-04-24T02:23:06,2024-04-24T02:23:06,true +New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -NetworkRuleSet ***,NetworkRuleTests.ps1,18,2024-04-24T02:23:06,2024-04-24T02:23:07,true +New-AzKeyVaultNetworkRuleSetObject,__AllParameterSets,-Bypass *** -DefaultAction ***,NetworkRuleTests.ps1,28,2024-04-24T02:23:07,2024-04-24T02:23:07,true +New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -NetworkRuleSet ***,NetworkRuleTests.ps1,29,2024-04-24T02:23:07,2024-04-24T02:23:07,true +New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location ***,NetworkRuleTests.ps1,48,2024-04-24T02:23:07,2024-04-24T02:23:07,true +Add-AzKeyVaultNetworkRule,ByVaultName,-VaultName *** -IpAddressRange *** -VirtualNetworkResourceId ***,NetworkRuleTests.ps1,54,2024-04-24T02:23:07,2024-04-24T02:23:07,true +Get-AzKeyVault,GetVaultByName,-ResourceGroupName *** -VaultName ***,NetworkRuleTests.ps1,55,2024-04-24T02:23:07,2024-04-24T02:23:07,true +Update-AzKeyVaultNetworkRuleSet,ByVaultName,-VaultName *** -ResourceGroupName *** -Bypass *** -DefaultAction *** -PassThru ***,NetworkRuleTests.ps1,63,2024-04-24T02:23:07,2024-04-24T02:23:07,true +Get-AzKeyVault,GetVaultByName,-ResourceGroupName *** -VaultName ***,NetworkRuleTests.ps1,66,2024-04-24T02:23:07,2024-04-24T02:23:07,true +Remove-AzKeyVaultNetworkRule,ByVaultName,-VaultName *** -ResourceGroupName *** -IpAddressRange *** -VirtualNetworkResourceId ***,NetworkRuleTests.ps1,70,2024-04-24T02:23:07,2024-04-24T02:23:07,true +Get-AzKeyVault,GetVaultByName,-ResourceGroupName *** -VaultName ***,NetworkRuleTests.ps1,71,2024-04-24T02:23:07,2024-04-24T02:23:07,true +New-AzKeyVault,__AllParameterSets,-ResourceGroupName *** -Name *** -Location ***,PrivateEndpointTests.ps1,10,2024-04-24T02:23:08,2024-04-24T02:23:08,true +New-AzKeyVault,__AllParameterSets,-ResourceGroupName *** -Name *** -Location ***,AccessPolicyTests.ps1,11,2024-04-24T02:23:09,2024-04-24T02:23:09,true +Set-AzKeyVaultAccessPolicy,ByObjectId,-VaultName *** -ObjectId *** -PermissionsToCertificates *** -PermissionsToKeys *** -PermissionsToSecrets *** -PermissionsToStorage *** -BypassObjectIdValidation ***,AccessPolicyTests.ps1,12,2024-04-24T02:23:09,2024-04-24T02:23:09,true +Get-AzKeyVault,GetVaultByName,-ResourceGroupName *** -VaultName ***,AccessPolicyTests.ps1,13,2024-04-24T02:23:09,2024-04-24T02:23:09,true \ No newline at end of file From 9f27742ef759161c4eba8c15ede95eaa4808ed46 Mon Sep 17 00:00:00 2001 From: Beisi Zhou Date: Wed, 24 Apr 2024 10:28:44 +0800 Subject: [PATCH 5/6] remove unrelated files --- .../TestCoverageAnalysis/Raw/Az.KeyVault.csv | 89 ------------------- 1 file changed, 89 deletions(-) delete mode 100644 src/Resources/TestCoverageAnalysis/Raw/Az.KeyVault.csv diff --git a/src/Resources/TestCoverageAnalysis/Raw/Az.KeyVault.csv b/src/Resources/TestCoverageAnalysis/Raw/Az.KeyVault.csv deleted file mode 100644 index dabf5133e31f..000000000000 --- a/src/Resources/TestCoverageAnalysis/Raw/Az.KeyVault.csv +++ /dev/null @@ -1,89 +0,0 @@ -CommandName,ParameterSetName,Parameters,SourceScript,LineNumber,StartDateTime,EndDateTime,IsSuccess -New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -Tag ***,KeyVaultManagementTests.ps1,102,2024-04-24T02:22:54,2024-04-24T02:22:54,true -New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -Sku *** -EnabledForDeployment ***,KeyVaultManagementTests.ps1,122,2024-04-24T02:22:54,2024-04-24T02:22:54,true -New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -Sku *** -EnablePurgeProtection *** -SoftDeleteRetentionInDays ***,KeyVaultManagementTests.ps1,131,2024-04-24T02:22:54,2024-04-24T02:22:54,true -New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location ***,KeyVaultManagementTests.ps1,137,2024-04-24T02:22:54,2024-04-24T02:22:54,true -New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location ***,KeyVaultManagementTests.ps1,141,2024-04-24T02:22:54,2024-04-24T02:22:54,true -New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location ***,KeyVaultManagementTests.ps1,856,2024-04-24T02:22:55,2024-04-24T02:22:55,true -Update-AzKeyVault,UpdateByInputObjectParameterSet,-PublicNetworkAccess ***,KeyVaultManagementTests.ps1,860,2024-04-24T02:22:55,2024-04-24T02:22:55,true -Update-AzKeyVault,UpdateByInputObjectParameterSet,-Tag ***,KeyVaultManagementTests.ps1,864,2024-04-24T02:22:55,2024-04-24T02:22:55,true -Update-AzKeyVault,UpdateByInputObjectParameterSet,-PublicNetworkAccess ***,KeyVaultManagementTests.ps1,868,2024-04-24T02:22:55,2024-04-24T02:22:55,true -New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location ***,KeyVaultManagementTests.ps1,731,2024-04-24T02:22:56,2024-04-24T02:22:56,true -New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location ***,KeyVaultManagementTests.ps1,170,2024-04-24T02:22:56,2024-04-24T02:22:56,true -New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -PublicNetworkAccess ***,KeyVaultManagementTests.ps1,172,2024-04-24T02:22:56,2024-04-24T02:22:56,true -New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -PublicNetworkAccess ***,KeyVaultManagementTests.ps1,174,2024-04-24T02:22:56,2024-04-24T02:22:56,true -New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location ***,KeyVaultManagementTests.ps1,276,2024-04-24T02:22:57,2024-04-24T02:22:57,true -Get-AzKeyVault,GetVaultByName,-VaultName *** -ResourceGroupName ***,KeyVaultManagementTests.ps1,277,2024-04-24T02:22:57,2024-04-24T02:22:57,true -Get-AzKeyVault,GetVaultByName,-VaultName ***,KeyVaultManagementTests.ps1,284,2024-04-24T02:22:57,2024-04-24T02:22:57,true -Get-AzKeyVault,GetVaultByName,-VaultName ***,KeyVaultManagementTests.ps1,291,2024-04-24T02:22:57,2024-04-24T02:22:57,true -Get-AzKeyVault,GetVaultByName,-VaultName *** -ResourceGroupName ***,KeyVaultManagementTests.ps1,301,2024-04-24T02:22:57,2024-04-24T02:22:57,true -Get-AzKeyVault,GetVaultByName,-VaultName *** -ResourceGroupName ***,KeyVaultManagementTests.ps1,304,2024-04-24T02:22:57,2024-04-24T02:22:57,true -New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location ***,KeyVaultManagementTests.ps1,324,2024-04-24T02:22:58,2024-04-24T02:22:58,true -New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -Tag ***,KeyVaultManagementTests.ps1,325,2024-04-24T02:22:58,2024-04-24T02:22:58,true -Get-AzKeyVault,GetVaultByName,,KeyVaultManagementTests.ps1,327,2024-04-24T02:22:58,2024-04-24T02:22:58,true -Get-AzKeyVault,GetVaultByName,-ResourceGroupName ***,KeyVaultManagementTests.ps1,335,2024-04-24T02:22:58,2024-04-24T02:22:58,true -Get-AzKeyVault,GetVaultByName,-ResourceGroupName *** -VaultName ***,KeyVaultManagementTests.ps1,344,2024-04-24T02:22:58,2024-04-24T02:22:58,true -Get-AzKeyVault,GetVaultByName,-ResourceGroupName *** -VaultName ***,KeyVaultManagementTests.ps1,353,2024-04-24T02:22:58,2024-04-24T02:22:58,true -Get-AzKeyVault,GetVaultByName,-ResourceGroupName *** -VaultName ***,KeyVaultManagementTests.ps1,361,2024-04-24T02:22:58,2024-04-24T02:22:58,true -Get-AzKeyVault,GetVaultByName,-VaultName ***,KeyVaultManagementTests.ps1,370,2024-04-24T02:22:58,2024-04-24T02:22:58,true -Get-AzKeyVault,GetVaultByName,-Tag ***,KeyVaultManagementTests.ps1,378,2024-04-24T02:22:58,2024-04-24T02:22:58,true -New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location ***,KeyVaultManagementTests.ps1,808,2024-04-24T02:22:58,2024-04-24T02:22:58,true -Update-AzKeyVault,UpdateByInputObjectParameterSet,-EnablePurgeProtection ***,KeyVaultManagementTests.ps1,814,2024-04-24T02:22:58,2024-04-24T02:22:58,true -Update-AzKeyVault,UpdateByInputObjectParameterSet,-DisableRbacAuthorization ***,KeyVaultManagementTests.ps1,826,2024-04-24T02:22:58,2024-04-24T02:22:59,true -Update-AzKeyVault,UpdateByInputObjectParameterSet,-DisableRbacAuthorization ***,KeyVaultManagementTests.ps1,830,2024-04-24T02:22:59,2024-04-24T02:22:59,true -Update-AzKeyVault,UpdateByInputObjectParameterSet,-Tag ***,KeyVaultManagementTests.ps1,834,2024-04-24T02:22:59,2024-04-24T02:22:59,true -Update-AzKeyVault,UpdateByInputObjectParameterSet,-Tag ***,KeyVaultManagementTests.ps1,840,2024-04-24T02:22:59,2024-04-24T02:22:59,true -New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location ***,KeyVaultManagementTests.ps1,406,2024-04-24T02:22:59,2024-04-24T02:22:59,true -Remove-AzKeyVault,ByAvailableVault,-VaultName *** -Force ***,KeyVaultManagementTests.ps1,408,2024-04-24T02:22:59,2024-04-24T02:22:59,true -Get-AzKeyVault,GetVaultByName,-VaultName *** -ResourceGroupName ***,KeyVaultManagementTests.ps1,410,2024-04-24T02:22:59,2024-04-24T02:22:59,true -Remove-AzKeyVault,ByDeletedVault,-VaultName *** -Location *** -InRemovedState *** -Force ***,KeyVaultManagementTests.ps1,414,2024-04-24T02:22:59,2024-04-24T02:22:59,true -New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location ***,KeyVaultManagementTests.ps1,417,2024-04-24T02:22:59,2024-04-24T02:22:59,true -Get-AzKeyVault,GetVaultByName,-VaultName ***,KeyVaultManagementTests.ps1,419,2024-04-24T02:22:59,2024-04-24T02:22:59,true -Remove-AzKeyVault,InputObjectByAvailableVault,-Force ***,KeyVaultManagementTests.ps1,419,2024-04-24T02:22:59,2024-04-24T02:22:59,true -Get-AzKeyVault,GetVaultByName,-VaultName *** -ResourceGroupName ***,KeyVaultManagementTests.ps1,421,2024-04-24T02:22:59,2024-04-24T02:22:59,true -Remove-AzKeyVault,ByAvailableVault,-VaultName *** -AsJob ***,KeyVaultManagementTests.ps1,425,2024-04-24T02:22:59,2024-04-24T02:22:59,true -New-AzKeyVaultManagedHsm,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -Administrator *** -SoftDeleteRetentionInDays ***,ManagedHsmManagementTests.ps1,116,2024-04-24T02:23:00,2024-04-24T02:23:00,true -Update-AzKeyVaultManagedHsm,UpdateByNameParameterSet,-Name *** -ResourceGroupName *** -Tag ***,ManagedHsmManagementTests.ps1,120,2024-04-24T02:23:00,2024-04-24T02:23:00,true -New-AzKeyVaultManagedHsm,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -Administrator *** -PublicNetworkAccess *** -SoftDeleteRetentionInDays ***,ManagedHsmManagementTests.ps1,124,2024-04-24T02:23:00,2024-04-24T02:23:00,true -Update-AzKeyVaultManagedHsm,UpdateByNameParameterSet,-Name *** -ResourceGroupName *** -PublicNetworkAccess ***,ManagedHsmManagementTests.ps1,128,2024-04-24T02:23:00,2024-04-24T02:23:00,true -New-AzKeyVaultManagedHsm,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -Administrator *** -PublicNetworkAccess *** -SoftDeleteRetentionInDays ***,ManagedHsmManagementTests.ps1,132,2024-04-24T02:23:00,2024-04-24T02:23:00,true -Update-AzKeyVaultManagedHsm,UpdateByNameParameterSet,-Name *** -ResourceGroupName *** -PublicNetworkAccess ***,ManagedHsmManagementTests.ps1,136,2024-04-24T02:23:00,2024-04-24T02:23:00,true -Remove-AzKeyVaultManagedHsm,RemoveDeletedManagedHsmByName,-Name *** -Location *** -InRemovedState *** -Force ***,ManagedHsmManagementTests.ps1,140,2024-04-24T02:23:00,2024-04-24T02:23:01,true -Remove-AzKeyVaultManagedHsm,RemoveDeletedManagedHsmByName,-Name *** -Location *** -InRemovedState *** -Force ***,ManagedHsmManagementTests.ps1,141,2024-04-24T02:23:01,2024-04-24T02:23:01,true -Remove-AzKeyVaultManagedHsm,RemoveDeletedManagedHsmByName,-Name *** -Location *** -InRemovedState *** -Force ***,ManagedHsmManagementTests.ps1,142,2024-04-24T02:23:01,2024-04-24T02:23:01,true -New-AzKeyVaultManagedHsm,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -Administrator *** -SoftDeleteRetentionInDays ***,ManagedHsmManagementTests.ps1,29,2024-04-24T02:23:01,2024-04-24T02:23:01,true -Get-AzKeyVaultManagedHsm,GetManagedHsm,-Name ***,ManagedHsmManagementTests.ps1,39,2024-04-24T02:23:01,2024-04-24T02:23:01,true -Remove-AzKeyVaultManagedHsm,RemoveManagedHsmByInputObject,-InputObject *** -Force ***,ManagedHsmManagementTests.ps1,50,2024-04-24T02:23:01,2024-04-24T02:23:01,true -Get-AzKeyVaultManagedHsm,GetManagedHsm,-Name *** -ResourceGroupName ***,ManagedHsmManagementTests.ps1,51,2024-04-24T02:23:01,2024-04-24T02:23:01,true -Remove-AzKeyVaultManagedHsm,RemoveDeletedManagedHsmByName,-Name *** -Location *** -InRemovedState *** -Force ***,ManagedHsmManagementTests.ps1,61,2024-04-24T02:23:01,2024-04-24T02:23:01,true -New-AzKeyVaultManagedHsm,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -Administrator *** -SoftDeleteRetentionInDays *** -UserAssignedIdentity ***,ManagedHsmManagementTests.ps1,84,2024-04-24T02:23:02,2024-04-24T02:23:02,true -New-AzKeyVaultManagedHsm,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -Administrator *** -SoftDeleteRetentionInDays ***,ManagedHsmManagementTests.ps1,87,2024-04-24T02:23:02,2024-04-24T02:23:02,true -Update-AzKeyVaultManagedHsm,UpdateByInputObjectParameterSet,-UserAssignedIdentity ***,ManagedHsmManagementTests.ps1,88,2024-04-24T02:23:02,2024-04-24T02:23:02,true -Remove-AzKeyVaultManagedHsm,RemoveDeletedManagedHsmByName,-Name *** -Location *** -InRemovedState *** -Force ***,ManagedHsmManagementTests.ps1,93,2024-04-24T02:23:02,2024-04-24T02:23:02,true -Remove-AzKeyVaultManagedHsm,RemoveDeletedManagedHsmByName,-Name *** -Location *** -InRemovedState *** -Force ***,ManagedHsmManagementTests.ps1,94,2024-04-24T02:23:02,2024-04-24T02:23:02,true -New-AzKeyVaultManagedHsm,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -Administrator *** -EnablePurgeProtection *** -SoftDeleteRetentionInDays ***,ManagedHsmManagementTests.ps1,191,2024-04-24T02:23:02,2024-04-24T02:23:03,true -Remove-AzKeyVaultManagedHsm,RemoveManagedHsmByInputObject,-InputObject *** -Force ***,ManagedHsmManagementTests.ps1,195,2024-04-24T02:23:03,2024-04-24T02:23:03,true -New-AzKeyVaultManagedHsm,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -Administrator *** -SoftDeleteRetentionInDays ***,ManagedHsmManagementTests.ps1,214,2024-04-24T02:23:03,2024-04-24T02:23:03,true -Remove-AzKeyVaultManagedHsm,RemoveManagedHsmByInputObject,-InputObject *** -Force ***,ManagedHsmManagementTests.ps1,216,2024-04-24T02:23:03,2024-04-24T02:23:03,true -Get-AzKeyVaultManagedHsm,GetDeletedManagedHsm,-Name *** -Location *** -InRemovedState ***,ManagedHsmManagementTests.ps1,219,2024-04-24T02:23:03,2024-04-24T02:23:03,true -Undo-AzKeyVaultManagedHsmRemoval,InputObject,-InputObject ***,ManagedHsmManagementTests.ps1,223,2024-04-24T02:23:03,2024-04-24T02:23:03,true -Get-AzKeyVaultManagedHsm,GetManagedHsm,-Name *** -ResourceGroupName ***,ManagedHsmManagementTests.ps1,224,2024-04-24T02:23:03,2024-04-24T02:23:03,true -New-AzKeyVaultManagedHsm,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -Administrator *** -SoftDeleteRetentionInDays ***,ManagedHsmManagementTests.ps1,160,2024-04-24T02:23:04,2024-04-24T02:23:04,true -Remove-AzKeyVaultManagedHsm,RemoveManagedHsmByInputObject,-InputObject *** -Force ***,ManagedHsmManagementTests.ps1,163,2024-04-24T02:23:04,2024-04-24T02:23:04,true -Get-AzKeyVaultManagedHsm,GetDeletedManagedHsm,-Name *** -Location *** -InRemovedState ***,ManagedHsmManagementTests.ps1,166,2024-04-24T02:23:04,2024-04-24T02:23:04,true -Remove-AzKeyVaultManagedHsm,RemoveDeletedManagedHsmByInputObject,-InputObject *** -InRemovedState *** -Force ***,ManagedHsmManagementTests.ps1,170,2024-04-24T02:23:04,2024-04-24T02:23:04,true -New-AzKeyVaultNetworkRuleSetObject,__AllParameterSets,-IpAddressRange *** -VirtualNetworkResourceId *** -Bypass *** -DefaultAction ***,NetworkRuleTests.ps1,17,2024-04-24T02:23:06,2024-04-24T02:23:06,true -New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -NetworkRuleSet ***,NetworkRuleTests.ps1,18,2024-04-24T02:23:06,2024-04-24T02:23:07,true -New-AzKeyVaultNetworkRuleSetObject,__AllParameterSets,-Bypass *** -DefaultAction ***,NetworkRuleTests.ps1,28,2024-04-24T02:23:07,2024-04-24T02:23:07,true -New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location *** -NetworkRuleSet ***,NetworkRuleTests.ps1,29,2024-04-24T02:23:07,2024-04-24T02:23:07,true -New-AzKeyVault,__AllParameterSets,-Name *** -ResourceGroupName *** -Location ***,NetworkRuleTests.ps1,48,2024-04-24T02:23:07,2024-04-24T02:23:07,true -Add-AzKeyVaultNetworkRule,ByVaultName,-VaultName *** -IpAddressRange *** -VirtualNetworkResourceId ***,NetworkRuleTests.ps1,54,2024-04-24T02:23:07,2024-04-24T02:23:07,true -Get-AzKeyVault,GetVaultByName,-ResourceGroupName *** -VaultName ***,NetworkRuleTests.ps1,55,2024-04-24T02:23:07,2024-04-24T02:23:07,true -Update-AzKeyVaultNetworkRuleSet,ByVaultName,-VaultName *** -ResourceGroupName *** -Bypass *** -DefaultAction *** -PassThru ***,NetworkRuleTests.ps1,63,2024-04-24T02:23:07,2024-04-24T02:23:07,true -Get-AzKeyVault,GetVaultByName,-ResourceGroupName *** -VaultName ***,NetworkRuleTests.ps1,66,2024-04-24T02:23:07,2024-04-24T02:23:07,true -Remove-AzKeyVaultNetworkRule,ByVaultName,-VaultName *** -ResourceGroupName *** -IpAddressRange *** -VirtualNetworkResourceId ***,NetworkRuleTests.ps1,70,2024-04-24T02:23:07,2024-04-24T02:23:07,true -Get-AzKeyVault,GetVaultByName,-ResourceGroupName *** -VaultName ***,NetworkRuleTests.ps1,71,2024-04-24T02:23:07,2024-04-24T02:23:07,true -New-AzKeyVault,__AllParameterSets,-ResourceGroupName *** -Name *** -Location ***,PrivateEndpointTests.ps1,10,2024-04-24T02:23:08,2024-04-24T02:23:08,true -New-AzKeyVault,__AllParameterSets,-ResourceGroupName *** -Name *** -Location ***,AccessPolicyTests.ps1,11,2024-04-24T02:23:09,2024-04-24T02:23:09,true -Set-AzKeyVaultAccessPolicy,ByObjectId,-VaultName *** -ObjectId *** -PermissionsToCertificates *** -PermissionsToKeys *** -PermissionsToSecrets *** -PermissionsToStorage *** -BypassObjectIdValidation ***,AccessPolicyTests.ps1,12,2024-04-24T02:23:09,2024-04-24T02:23:09,true -Get-AzKeyVault,GetVaultByName,-ResourceGroupName *** -VaultName ***,AccessPolicyTests.ps1,13,2024-04-24T02:23:09,2024-04-24T02:23:09,true \ No newline at end of file From da5441c33d2d1b3b1cf957b98e8cbb5e526cbabe Mon Sep 17 00:00:00 2001 From: Beisi Zhou Date: Wed, 24 Apr 2024 11:43:00 +0800 Subject: [PATCH 6/6] refresh examples --- src/KeyVault/KeyVault/help/Update-AzKeyVault.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/KeyVault/KeyVault/help/Update-AzKeyVault.md b/src/KeyVault/KeyVault/help/Update-AzKeyVault.md index d17a1b9ca781..fa3052db0f5f 100644 --- a/src/KeyVault/KeyVault/help/Update-AzKeyVault.md +++ b/src/KeyVault/KeyVault/help/Update-AzKeyVault.md @@ -48,7 +48,7 @@ Enables purge protection using piping syntax. ### Example 2: Enable RBAC Authorization ```powershell -Get-AzKeyVault -VaultName $keyVaultName -ResourceGroupName $resourceGroupName | Update-AzKeyVault -EnableRbacAuthorization $true +Get-AzKeyVault -VaultName $keyVaultName -ResourceGroupName $resourceGroupName | Update-AzKeyVault -DisableRbacAuthorization $false ``` Enables RBAC Authorization using piping syntax.