Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -173,6 +173,15 @@ public void TestAzureFirewallPolicyRuleDescription()
TestRunner.RunTestScript("Test-AzureFirewallPolicyRuleDescription");
}


[Fact]
[Trait(Category.AcceptanceType, Category.CheckIn)]
[Trait(Category.Owner, NrpTeamAlias.azurefirewall)]
public void TestAzureFirewallPolicyWithMultipleUAMI()
{
TestRunner.RunTestScript("Test-AzureFirewallPolicyWithMultipleUAMI");
}
Comment thread
Balashivaram marked this conversation as resolved.

[Fact]
[Trait(Category.AcceptanceType, Category.CheckIn)]
[Trait(Category.Owner, NrpTeamAlias.azurefirewall)]
Expand Down
101 changes: 94 additions & 7 deletions src/Network/Network.Test/ScenarioTests/AzureFirewallPolicyTests.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -1597,19 +1597,20 @@ function Test-AzureFirewallPolicyExplicitProxyCRUD {
$rgname = Get-ResourceGroupName
$azureFirewallPolicyName = Get-ResourceName
$resourceTypeParent = "Microsoft.Network/FirewallPolicies"
$location = "westus2"
$location = "francecentral"
$vnetName = Get-ResourceName
$pacFile = "fake_pacfile_url"
$pacFile = "https://teststgeproxywithrbacfix.blob.core.windows.net/pacfile/proxy.pac"
$userAssignedManagedIdentity = "/subscriptions/e7eb2257-46e4-4826-94df-153853fea38f/resourcegroups/newrgeproxy/providers/Microsoft.ManagedIdentity/userAssignedIdentities/PacFileMSI-testmsirbacfix"

try {

# Create the resource group
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $location -Tags @{ testtag = "testval" }

Comment thread
Balashivaram marked this conversation as resolved.
$explicitProxySettings = New-AzFirewallPolicyExplicitProxy -EnableExplicitProxy -HttpPort 85 -HttpsPort 121 -EnablePacFile -PacFilePort 122 -PacFile $pacFile
$explicitProxySettings = New-AzFirewallPolicyExplicitProxy -EnableExplicitProxy -HttpPort 85 -EnablePacFile -PacFilePort 122 -PacFile $pacFile

# Create AzureFirewallPolicy (with Explicit Proxy Settings)
$azureFirewallPolicy = New-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgname -Location $location -ExplicitProxy $explicitProxySettings
$azureFirewallPolicy = New-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgname -Location $location -ExplicitProxy $explicitProxySettings -UserAssignedIdentityId @($userAssignedManagedIdentity)

# Get AzureFirewallPolicy
$getAzureFirewallPolicy = Get-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgname
Expand All @@ -1622,29 +1623,115 @@ function Test-AzureFirewallPolicyExplicitProxyCRUD {
Assert-AreEqual (Normalize-Location $location) $getAzureFirewallPolicy.Location
Assert-NotNull $getAzureFirewallPolicy.ExplicitProxy
Assert-AreEqual 85 $getAzureFirewallPolicy.ExplicitProxy.HttpPort
Assert-AreEqual 121 $getAzureFirewallPolicy.ExplicitProxy.HttpsPort
Assert-AreEqual 122 $getAzureFirewallPolicy.ExplicitProxy.PacFilePort
Assert-AreEqual $pacFile $getAzureFirewallPolicy.ExplicitProxy.PacFile
Assert-AreEqual "UserAssigned" $getAzureFirewallPolicy.Identity.type
Assert-AreEqual 1 $getAzureFirewallPolicy.Identity.userAssignedIdentities.Count
Assert-True { $getAzureFirewallPolicy.Identity.userAssignedIdentities.ContainsKey($userAssignedManagedIdentity) }

# Modify
$exProxy = New-AzFirewallPolicyExplicitProxy -EnableExplicitProxy -HttpPort 86 -HttpsPort 123 -EnablePacFile -PacFilePort 124 -PacFile $pacFile
$exProxy = New-AzFirewallPolicyExplicitProxy -EnableExplicitProxy -HttpPort 86 -EnablePacFile -PacFilePort 124 -PacFile $pacFile
# Set AzureFirewallPolicy
$azureFirewallPolicy.ExplicitProxy = $exProxy
Set-AzFirewallPolicy -InputObject $azureFirewallPolicy
$getAzureFirewallPolicy = Get-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgname

Assert-NotNull $getAzureFirewallPolicy.ExplicitProxy
Assert-AreEqual 86 $getAzureFirewallPolicy.ExplicitProxy.HttpPort
Assert-AreEqual 123 $getAzureFirewallPolicy.ExplicitProxy.HttpsPort
Assert-AreEqual 124 $getAzureFirewallPolicy.ExplicitProxy.PacFilePort
Assert-AreEqual $pacFile $getAzureFirewallPolicy.ExplicitProxy.PacFile
Assert-AreEqual "UserAssigned" $getAzureFirewallPolicy.Identity.type
Assert-AreEqual 1 $getAzureFirewallPolicy.Identity.userAssignedIdentities.Count
Assert-True { $getAzureFirewallPolicy.Identity.userAssignedIdentities.ContainsKey($userAssignedManagedIdentity) }
}
finally {
# Cleanup
Clean-ResourceGroup $rgname
}
}

<#
.SYNOPSIS
Tests AzureFirewall Policy with Multiple UAMIs
#>

function Test-AzureFirewallPolicyWithMultipleUAMI {
$rgname = Get-ResourceGroupName
$azureFirewallPolicyName = Get-ResourceName
$resourceTypeParent = "Microsoft.Network/FirewallPolicies"
$location = "francecentral"
$vnetName = Get-ResourceName
$pacFile = "https://teststgeproxywithrbacfix.blob.core.windows.net/pacfile/proxy.pac"
$transportSecurityName = "cert"
$transportSecurityId = "https://eproxyclipskv.vault.azure.net/secrets/cert/a0497e639d04459aa880901be337c52d"
$userAssignedManagedIdentity = "/subscriptions/e7eb2257-46e4-4826-94df-153853fea38f/resourcegroups/newrgeproxy/providers/Microsoft.ManagedIdentity/userAssignedIdentities/PacFileMSI-testmsirbacfix"
$transportSecurityIdentity = "/subscriptions/e7eb2257-46e4-4826-94df-153853fea38f/resourcegroups/ExplicitProxyCLIPSTestResource/providers/Microsoft.ManagedIdentity/userAssignedIdentities/ExplicitProxy_tlsidentity"
$tier = "Premium"

Comment thread
Balashivaram marked this conversation as resolved.
try {
# Create the resource group
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $location -Tags @{ testtag = "testval" }

$explicitProxySettings = New-AzFirewallPolicyExplicitProxy -EnableExplicitProxy -HttpPort 85 -EnablePacFile -PacFilePort 122 -PacFile $pacFile

# Create AzureFirewallPolicy (with Explicit Proxy Settings)
$azureFirewallPolicy = New-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgname -Location $location -SkuTier $tier -ExplicitProxy $explicitProxySettings -UserAssignedIdentityId $userAssignedManagedIdentity

# Get AzureFirewallPolicy
$getAzureFirewallPolicy = Get-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgname


#verification
Assert-AreEqual $rgName $getAzureFirewallPolicy.ResourceGroupName
Assert-AreEqual $azureFirewallPolicyName $getAzureFirewallPolicy.Name
Assert-NotNull $getAzureFirewallPolicy.Location
Assert-AreEqual (Normalize-Location $location) $getAzureFirewallPolicy.Location
Assert-NotNull $getAzureFirewallPolicy.ExplicitProxy
Assert-AreEqual 85 $getAzureFirewallPolicy.ExplicitProxy.HttpPort
Assert-AreEqual 122 $getAzureFirewallPolicy.ExplicitProxy.PacFilePort
Assert-AreEqual $pacFile $getAzureFirewallPolicy.ExplicitProxy.PacFile
Assert-AreEqual "UserAssigned" $getAzureFirewallPolicy.Identity.type
Assert-AreEqual 1 $getAzureFirewallPolicy.Identity.userAssignedIdentities.Count
Assert-True { $getAzureFirewallPolicy.Identity.userAssignedIdentities.ContainsKey($userAssignedManagedIdentity) }

# Two different UAMIs for Explicit Proxy and TLS Inspection
$exProxy = New-AzFirewallPolicyExplicitProxy -EnableExplicitProxy -HttpPort 86 -EnablePacFile -PacFilePort 124 -PacFile $pacFile
# Set AzureFirewallPolicy
$azureFirewallPolicy = Set-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgname -Location $location -SkuTier $tier -ExplicitProxy $exProxy -TransportSecurityName $transportSecurityName -TransportSecurityKeyVaultSecretId $transportSecurityId -UserAssignedIdentityId @($userAssignedManagedIdentity, $transportSecurityIdentity)

$getAzureFirewallPolicy = Get-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgname

Assert-NotNull $getAzureFirewallPolicy.ExplicitProxy
Assert-AreEqual 86 $getAzureFirewallPolicy.ExplicitProxy.HttpPort
Assert-AreEqual 124 $getAzureFirewallPolicy.ExplicitProxy.PacFilePort
Assert-AreEqual $pacFile $getAzureFirewallPolicy.ExplicitProxy.PacFile
Assert-AreEqual "UserAssigned" $getAzureFirewallPolicy.Identity.type
Assert-AreEqual 2 $getAzureFirewallPolicy.Identity.userAssignedIdentities.Count
Assert-True { $getAzureFirewallPolicy.Identity.userAssignedIdentities.ContainsKey($userAssignedManagedIdentity) }
Assert-True { $getAzureFirewallPolicy.Identity.userAssignedIdentities.ContainsKey($transportSecurityIdentity) }

# Single UAMI to set both Explicit Proxy and TLS Inspection
$exProxy = New-AzFirewallPolicyExplicitProxy -EnableExplicitProxy -HttpPort 86 -EnablePacFile -PacFilePort 124 -PacFile $pacFile
# Set AzureFirewallPolicy
$azureFirewallPolicy = Set-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgname -Location $location -SkuTier $tier -ExplicitProxy $exProxy -TransportSecurityName $transportSecurityName -TransportSecurityKeyVaultSecretId $transportSecurityId -UserAssignedIdentityId @($userAssignedManagedIdentity)

$getAzureFirewallPolicy = Get-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgname

Assert-NotNull $getAzureFirewallPolicy.ExplicitProxy
Assert-AreEqual 86 $getAzureFirewallPolicy.ExplicitProxy.HttpPort
Assert-AreEqual 124 $getAzureFirewallPolicy.ExplicitProxy.PacFilePort
Assert-AreEqual $pacFile $getAzureFirewallPolicy.ExplicitProxy.PacFile
Assert-AreEqual "UserAssigned" $getAzureFirewallPolicy.Identity.type
Assert-AreEqual 1 $getAzureFirewallPolicy.Identity.userAssignedIdentities.Count
Assert-True { $getAzureFirewallPolicy.Identity.userAssignedIdentities.ContainsKey($userAssignedManagedIdentity) }
}
finally {
# Cleanup
Clean-ResourceGroup $rgname
}

}

<#
.SYNOPSIS
Tests AzureFirewall Policy Rule Description
Expand Down
Loading