-
Notifications
You must be signed in to change notification settings - Fork 4k
Updated New-AzFirewallPolicyApplicationRule to only use HTTPS as the default Protocol for FqdnTag rules #28027
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
…tp,mssql) for new application rules. Added a test scenario and record to confirm new default protocol and confirm that manually setting the protocol for FqdnTag application rules is not allowed.
Thanks for your contribution! The pull request validation has started. Please revisit this comment for updated status. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull Request Overview
This PR updates the default protocol for FQDN Tag application rules in Azure Firewall Policy to use only HTTPS. The changes remove the previously allowed protocols ("http" and "mssql") and include new tests to validate the default behavior and disallow manual protocol overrides.
- Updated the default protocol in the application rule command.
- Added and updated tests (both PowerShell and C#) for FQDN Tag rules.
- Updated the changelog accordingly.
Reviewed Changes
Copilot reviewed 5 out of 5 changed files in this pull request and generated no comments.
Show a summary per file
File | Description |
---|---|
src/Network/Network/ChangeLog.md | Updated changelog entry for the new default protocol. |
src/Network/Network/AzureFirewallPolicy/ApplicationRuleCondition/NewAzureFirewallPolicyApplicationRuleCommand.cs | Modified protocol array to include only "https" for FQDN Tag rules. |
src/Network/Network.Test/SessionRecords/Commands.Network.Test.ScenarioTests.AzureFirewallPolicyTests/TestAzureFirewallPolicyApplicationRuleFqdnTagDefaultProtocol.json | Added test record for verifying default protocol. |
src/Network/Network.Test/ScenarioTests/AzureFirewallPolicyTests.ps1 | Added a new test function to check protocol behavior. |
src/Network/Network.Test/ScenarioTests/AzureFirewallPolicyTests.cs | Added a test method for FQDN Tag default protocol verification. |
Comments suppressed due to low confidence (1)
src/Network/Network/AzureFirewallPolicy/ApplicationRuleCondition/NewAzureFirewallPolicyApplicationRuleCommand.cs:164
- Ensure that the protocol string 'https' is normalized to 'Https' as expected by the tests to maintain consistency with documented behavior.
this.Protocol = new string[] {"https"}; // "http" and "mssql" are not allowed for FqdnTags
/azp run |
Azure Pipelines successfully started running 3 pipeline(s). |
…proxy CRUD test. Includes replacing the secrets in the session records.
/azp run |
Commenter does not have sufficient privileges for PR 28027 in repo Azure/azure-powershell |
/azp run |
Azure Pipelines successfully started running 3 pipeline(s). |
Description
Overview
Changed the default protocol to be https (instead of https, http, mssql) for new FQDN tag application rules. Added a test scenario and record to confirm new default protocol and confirm that manually setting the protocol for FQDN tag application rules is not allowed.
Additional changes
Replaced a packet capture URL secret with a fake URL and updated the accompanying test records with the same fake URL.
Mandatory Checklist
Please choose the target release of Azure PowerShell. (⚠️ Target release is a different concept from API readiness. Please click below links for details.)
Check this box to confirm: I have read the Submitting Changes section of
CONTRIBUTING.md
and reviewed the following information:ChangeLog.md
file(s) appropriatelysrc/{{SERVICE}}/{{SERVICE}}/ChangeLog.md
.## Upcoming Release
header in the past tense.ChangeLog.md
if no new release is required, such as fixing test case only.