|
19 | 19 | function Test-ManagedInstanceActiveDirectoryAdministrator |
20 | 20 | { |
21 | 21 | # Setup |
22 | | - $rg = Create-ResourceGroupForTest |
23 | | - $vnetName = "cl_initial" |
24 | | - $subnetName = "Cool" |
| 22 | + $params = Get-DefaultManagedInstanceNameAndRgForAADAdmin |
25 | 23 |
|
26 | | - # Setup VNET |
27 | | - $virtualNetwork1 = CreateAndGetVirtualNetworkForManagedInstance $vnetName $subnetName $rg.Location |
28 | | - $subnetId = $virtualNetwork1.Subnets.where({ $_.Name -eq $subnetName })[0].Id |
29 | | - |
30 | | - $managedInstance = Create-ManagedInstanceForTest $rg $subnetId |
31 | | - |
32 | 24 | # If there is a need to re-record this test, these values must be changed to correspond to existing group and user from Azure Active Directory related to current subscription. |
33 | | - $activeDirectoryGroup1 = "aadadmin" |
34 | | - $activeDirectoryGroup1ObjectId = "52b6d571-5ff9-4b8f-92de-4a5b1bcdbbef" |
35 | | - $activeDirectoryUser1 = "CL AAD Test User" |
36 | | - $activeDirectoryUser1ObjectId = "034bb7d9-ca26-4c6f-abe0-4aff74fdca50" |
| 25 | + $activeDirectoryGroup = "testSqlAADPowershellGroup" |
| 26 | + $activeDirectoryGroupObjectId = "a461269d-f0e1-4214-a0bd-85b4df11a2c3" |
| 27 | + $activeDirectoryUser = "Test User 1" |
| 28 | + $activeDirectoryUserMail = "[email protected]" |
| 29 | + $activeDirectoryUserObjectId = "c803e62a-3720-4b88-9bc5-ba910dcf229e" |
| 30 | + $activeDirectoryServicePrincipal = "testSqlAADPowershellServicePrincipal" |
| 31 | + $activeDirectoryServicePrincipalObjectId = "5541c08c-3845-44a9-a485-ea6b7e785a87" |
| 32 | + |
| 33 | + # Set an Active Directory Administrator Group on Managed Instance |
| 34 | + # This command uses the Graph API to check if there is a user/group for provided DisplayName and ObjectId. Graph authentication blocks test passes, so if you need to record this test again, you must provide real token in |
| 35 | + # MockTokenAuthenticationFactory constructor and change SetAuthenticationFactory in EnvironmentSetupHelper. |
| 36 | + $activeDirectoryAdmin1 = Set-AzSqlInstanceActiveDirectoryAdministrator -ResourceGroupName $params.rg -InstanceName $params.name -DisplayName $activeDirectoryGroup -ObjectId $activeDirectoryGroupObjectId |
| 37 | + |
| 38 | + Assert-NotNull $activeDirectoryAdmin1 |
37 | 39 |
|
38 | | - try |
39 | | - { |
40 | | - # Verify there is no Active Directory Administrator set |
41 | | - $activeDirectoryAdmin = Get-AzSqlInstanceActiveDirectoryAdministrator -ResourceGroupName $rg.ResourceGroupName -InstanceName $managedInstance.ManagedInstanceName |
| 40 | + # Verify the correct Active Directory Administrator is set |
| 41 | + Assert-AreEqual $activeDirectoryAdmin1.DisplayName $activeDirectoryGroup |
| 42 | + Assert-AreEqual $activeDirectoryAdmin1.ObjectId $activeDirectoryGroupObjectId |
42 | 43 |
|
43 | | - Assert-Null $activeDirectoryAdmin |
| 44 | + # Get an Active Directory Administrator |
| 45 | + $activeDirectoryAdmin2 = Get-AzSqlInstanceActiveDirectoryAdministrator -ResourceGroupName $params.rg -InstanceName $params.name |
44 | 46 |
|
45 | | - # Set an Active Directory Administrator Group on Managed Instance |
46 | | - # This command uses the Graph API to check if there is a user/group for provided DisplayName and ObjectId. Graph authentication blocks test passes, so if you need to record this test again, you must provide real token in |
47 | | - # MockTokenAuthenticationFactory constructor and change SetAuthenticationFactory in EnvironmentSetupHelper. |
48 | | - $activeDirectoryAdmin1 = Set-AzSqlInstanceActiveDirectoryAdministrator -ResourceGroupName $rg.ResourceGroupName -InstanceName $managedInstance.ManagedInstanceName -DisplayName $activeDirectoryGroup1 -ObjectId $activeDirectoryGroup1ObjectId |
| 47 | + Assert-AreEqual $activeDirectoryAdmin2.DisplayName $activeDirectoryGroup |
| 48 | + Assert-AreEqual $activeDirectoryAdmin2.ObjectId $activeDirectoryGroupObjectId |
49 | 49 |
|
50 | | - Assert-NotNull $activeDirectoryAdmin1 |
| 50 | + # Set an Active Directory Administrator User on Managed Instance |
| 51 | + $activeDirectoryAdmin3 = Set-AzSqlInstanceActiveDirectoryAdministrator -ResourceGroupName $params.rg -InstanceName $params.name -DisplayName $activeDirectoryUser -ObjectId $activeDirectoryUserObjectId |
51 | 52 |
|
52 | | - # Verify the correct Active Directory Administrator is set |
53 | | - Assert-AreEqual $activeDirectoryAdmin1.DisplayName $activeDirectoryGroup1 |
54 | | - Assert-AreEqual $activeDirectoryAdmin1.ObjectId $activeDirectoryGroup1ObjectId |
| 53 | + # We expect that email is returned since the API expects email to be sent as the display name |
| 54 | + Assert-AreEqual $activeDirectoryAdmin3.DisplayName $activeDirectoryUserMail |
| 55 | + Assert-AreEqual $activeDirectoryAdmin3.ObjectId $activeDirectoryUserObjectId |
55 | 56 |
|
56 | | - # Get an Active Directory Administrator |
57 | | - $activeDirectoryAdmin2 = Get-AzSqlInstanceActiveDirectoryAdministrator -ResourceGroupName $rg.ResourceGroupName -InstanceName $managedInstance.ManagedInstanceName |
| 57 | + # Set an Active Directory Administrator Service principal on Managed Instance |
| 58 | + $activeDirectoryAdmin4 = Set-AzSqlInstanceActiveDirectoryAdministrator -ResourceGroupName $params.rg -InstanceName $params.name -DisplayName $activeDirectoryServicePrincipal -ObjectId $activeDirectoryServicePrincipalObjectId |
58 | 59 |
|
59 | | - Assert-AreEqual $activeDirectoryAdmin2.DisplayName $activeDirectoryGroup1 |
60 | | - Assert-AreEqual $activeDirectoryAdmin2.ObjectId $activeDirectoryGroup1ObjectId |
| 60 | + Assert-AreEqual $activeDirectoryAdmin4.DisplayName $activeDirectoryServicePrincipal |
| 61 | + Assert-AreEqual $activeDirectoryAdmin4.ObjectId $activeDirectoryServicePrincipalObjectId |
61 | 62 |
|
62 | | - # Set an Active Directory Administrator User on Managed Instance |
63 | | - $activeDirectoryAdmin3 = Set-AzSqlInstanceActiveDirectoryAdministrator -ResourceGroupName $rg.ResourceGroupName -InstanceName $managedInstance.ManagedInstanceName -DisplayName $activeDirectoryUser1 -ObjectId $activeDirectoryUser1ObjectId |
| 63 | + # Set an Active Directory Administrator User (mail) on Managed Instance |
| 64 | + $activeDirectoryAdmin5 = Set-AzSqlInstanceActiveDirectoryAdministrator -ResourceGroupName $params.rg -InstanceName $params.name -DisplayName $activeDirectoryUserMail -ObjectId $activeDirectoryUserObjectId |
64 | 65 |
|
65 | | - Assert-AreEqual $activeDirectoryAdmin3.DisplayName $activeDirectoryUser1 |
66 | | - Assert-AreEqual $activeDirectoryAdmin3.ObjectId $activeDirectoryUser1ObjectId |
| 66 | + Assert-AreEqual $activeDirectoryAdmin5.DisplayName $activeDirectoryUserMail |
| 67 | + Assert-AreEqual $activeDirectoryAdmin5.ObjectId $activeDirectoryUserObjectId |
67 | 68 |
|
68 | | - # Remove an Active Directory Administrator User from Managed Instance |
69 | | - $activeDirectoryAdmin4 = Remove-AzSqlInstanceActiveDirectoryAdministrator -ResourceGroupName $rg.ResourceGroupName -InstanceName $managedInstance.ManagedInstanceName -Force |
| 69 | + # Remove an Active Directory Administrator User from Managed Instance |
| 70 | + Remove-AzSqlInstanceActiveDirectoryAdministrator -ResourceGroupName $params.rg -InstanceName $params.name -Force |
70 | 71 |
|
71 | | - # Verify that Active Directory Administrator was deleted |
72 | | - $activeDirectoryAdmin5 = Get-AzSqlInstanceActiveDirectoryAdministrator -ResourceGroupName $rg.ResourceGroupName -InstanceName $managedInstance.ManagedInstanceName |
| 72 | + # Verify that Active Directory Administrator was deleted |
| 73 | + $activeDirectoryAdmin6 = Get-AzSqlInstanceActiveDirectoryAdministrator -ResourceGroupName $params.rg -InstanceName $params.name |
73 | 74 |
|
74 | | - Assert-Null $activeDirectoryAdmin5 |
75 | | - } |
76 | | - finally |
77 | | - { |
78 | | - Remove-ResourceGroupForTest $rg |
79 | | - } |
| 75 | + Assert-Null $activeDirectoryAdmin6 |
80 | 76 | } |
0 commit comments