Skip to content

Commit ec11a87

Browse files
committed
Merge remote-tracking branch 'origin/main' into yabo/merge-release-2025-01-14-to-main
2 parents 0916bad + 876ca26 commit ec11a87

File tree

37 files changed

+25193
-1520
lines changed

37 files changed

+25193
-1520
lines changed

documentation/development-docs/examples/private-link-resource-example.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ $VNet=Get-AzVirtualNetwork -ResourceGroupName {rgName} -Name {vnetName}
8484

8585
+ private link service connection (object in memory)
8686
```
87-
$PLSConnection = New-AzPrivateLinkServiceConnection -Name {plsConnectionName} -PrivateLinkServiceId $TopLevelResource.Id -GroupId $TopLevelResource.GroupId
87+
$PLSConnection = New-AzPrivateLinkServiceConnection -Name {plsConnectionName} -PrivateLinkServiceId $TopLevelResource.Id -GroupId $PrivateLinkResource.GroupId
8888
```
8989

9090
+ endpoint

src/Automation/Automation/ChangeLog.md

+4
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,12 @@
1818
- Additional information about change #1
1919
-->
2020
## Upcoming Release
21+
<<<<<<< HEAD
2122

2223
## Version 1.11.0
24+
=======
25+
* Fixed Bug: Start-AzAutomationRunbook throws object reference error when the automation account is not available in the subscription
26+
>>>>>>> origin/main
2327
* Upgraded nuget package to signed package.
2428

2529
## Version 1.10.0

src/Automation/Automation/Common/AutomationPSClient.cs

+1-1
Original file line numberDiff line numberDiff line change
@@ -2158,7 +2158,7 @@ private IDictionary<string, string> ProcessRunbookParameters(string resourceGrou
21582158
i++;
21592159
}
21602160
}
2161-
else
2161+
else if(runbook != null)
21622162
{
21632163
runbookParameters = runbook.Parameters.Cast<DictionaryEntry>().ToDictionary(k => k.Key.ToString(), k => (RunbookParameter)k.Value);
21642164

src/Compute/Compute.Test/ScenarioTests/ComputeTestCommon.ps1

+41
Original file line numberDiff line numberDiff line change
@@ -138,6 +138,47 @@ function Create-KeyVault
138138
return $properties
139139
}
140140

141+
# Create key vault resources
142+
function Create-KeyVaultWithAclEncryptionIdentity
143+
{
144+
Param
145+
(
146+
[Parameter(Mandatory=$true, Position=0)]
147+
[string] $resourceGroupName,
148+
[Parameter(Mandatory=$true, Position=1)]
149+
[string] $location,
150+
[Parameter(Mandatory=$false, Position=2)]
151+
[string] $vaultName,
152+
[Parameter(Mandatory=$false, Position=3)]
153+
[String] $userIdentityPrincipalId
154+
)
155+
156+
# initialize parameters if needed
157+
if ([string]::IsNullOrEmpty($resourceGroupName)) { $resourceGroupName = Get-ComputeTestResourceName }
158+
if ([string]::IsNullOrEmpty($location)) { $location = Get-ComputeVMLocation }
159+
if ([string]::IsNullOrEmpty($vaultName)) { $vaultName = 'kv' + $resourceGroupName }
160+
161+
# create vault
162+
$vault = New-AzKeyVault -VaultName $vaultName -ResourceGroupName $resourceGroupName -Location $location -Sku standard -DisableRbacAuthorization
163+
$vault = Get-AzKeyVault -VaultName $vaultName -ResourceGroupName $resourceGroupName
164+
165+
# create access policy
166+
$servicePrincipalName = (Get-AzContext).Account.Id
167+
Assert-NotNull $servicePrincipalName
168+
if (-not [string]::IsNullOrEmpty($userIdentityPrincipalId)) {
169+
Set-AzKeyVaultAccessPolicy -VaultName $vaultName -ResourceGroupName $resourceGroupName -ObjectId $userIdentityPrincipalId -PermissionsToKeys all -PermissionsToSecrets all
170+
}
171+
Set-AzKeyVaultAccessPolicy -VaultName $vaultName -ResourceGroupName $resourceGroupName -EnabledForDeployment -EnabledForTemplateDeployment
172+
173+
# return the newly created key vault properties
174+
$properties = New-Object PSObject -Property @{
175+
DiskEncryptionKeyVaultId = $vault.ResourceId
176+
DiskEncryptionKeyVaultUrl = $vault.VaultUri
177+
#KeyEncryptionKeyUrl = $kek.Key.kid
178+
}
179+
return $properties
180+
}
181+
141182
# Create a new virtual machine with other necessary resources configured
142183
function Create-VirtualMachine
143184
{

src/Compute/Compute.Test/ScenarioTests/VirtualMachineExtensionTests.cs

+27
Original file line numberDiff line numberDiff line change
@@ -156,6 +156,33 @@ public void TestAzureDiskEncryptionLnxManagedDisk()
156156
TestRunner.RunTestScript("Test-AzureDiskEncryptionLnxManagedDisk");
157157
}
158158

159+
[Fact]
160+
[Trait(Category.AcceptanceType, Category.CheckIn)]
161+
public void TestAzureDiskEncryptionWithEncryptionIdentityAddedInAzVmConfig()
162+
{
163+
TestRunner.RunTestScript("Test-AzureDiskEncryptionWithEncryptionIdentityAddedInAzVmConfig");
164+
}
165+
166+
[Fact]
167+
[Trait(Category.AcceptanceType, Category.CheckIn)]
168+
public void TestAzureDiskEncryptionWithEncryptionIdentityAddedInSetADECmdlet()
169+
{
170+
TestRunner.RunTestScript("Test-AzureDiskEncryptionWithEncryptionIdentityAddedInSetADECmdlet");
171+
}
172+
173+
[Fact]
174+
[Trait(Category.AcceptanceType, Category.CheckIn)]
175+
public void TestAzureDiskEncryptionWithIdentityNotSetInVirtualMachine()
176+
{
177+
TestRunner.RunTestScript("Test-AzureDiskEncryptionWithIdentityNotSetInVirtualMachine");
178+
}
179+
[Fact]
180+
[Trait(Category.AcceptanceType, Category.CheckIn)]
181+
public void TestAzureDiskEncryptionWithIdentityNotAckledInKeyVault()
182+
{
183+
TestRunner.RunTestScript("Test-AzureDiskEncryptionWithIdentityNotAckledInKeyVault");
184+
}
185+
159186
[Fact]
160187
[Trait(Category.AcceptanceType, Category.CheckIn)]
161188
public void TestVirtualMachineBginfoExtension()

0 commit comments

Comments
 (0)