Skip to content

Added Support to Input Multiple User Assigned Identities #27750

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 4 commits into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -165,6 +165,14 @@ public void TestAzureFirewallPolicyExplicitProxyCRUD()
TestRunner.RunTestScript("Test-AzureFirewallPolicyExplicitProxyCRUD");
}

[Fact]
[Trait(Category.AcceptanceType, Category.CheckIn)]
[Trait(Category.Owner, NrpTeamAlias.azurefirewall)]
public void TestAzureFirewallPolicyMultipleIdentities ()
{
TestRunner.RunTestScript("Test-AzureFirewallPolicyMultipleIdentities");
}

[Fact]
[Trait(Category.AcceptanceType, Category.CheckIn)]
[Trait(Category.Owner, NrpTeamAlias.azurefirewall)]
Expand Down
108 changes: 95 additions & 13 deletions src/Network/Network.Test/ScenarioTests/AzureFirewallPolicyTests.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -1457,9 +1457,10 @@ function Test-AzureFirewallPolicyPremiumFeatures {
$bypass = New-AzFirewallPolicyIntrusionDetectionBypassTraffic -Name $bypassTestName -Protocol "TCP" -DestinationPort "80" -SourceAddress "10.0.0.0" -DestinationAddress "10.0.0.0"
$sigOverride = New-AzFirewallPolicyIntrusionDetectionSignatureOverride -Id "123456798" -Mode "Deny"
$intrusionDetection = New-AzFirewallPolicyIntrusionDetection -Mode "Alert" -SignatureOverride $sigOverride -BypassTraffic $bypass -PrivateRange @("10.0.0.0/8", "172.16.0.0/12")
$userassignedIdentity = @($identity.id)

# Create AzureFirewallPolicy (with Intrusion Detection, TransportSecurity and Identity parameters)
$azureFirewallPolicy = New-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgname -Location $location -SkuTier $tier -IntrusionDetection $intrusionDetection -UserAssignedIdentityId $identity.Id
$azureFirewallPolicy = New-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgname -Location $location -SkuTier $tier -IntrusionDetection $intrusionDetection -UserAssignedIdentityId $userassignedIdentity
# Get AzureFirewallPolicy
$getAzureFirewallPolicy = Get-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgname

Expand Down Expand Up @@ -1597,19 +1598,26 @@ function Test-AzureFirewallPolicyExplicitProxyCRUD {
$rgname = Get-ResourceGroupName
$azureFirewallPolicyName = Get-ResourceName
$resourceTypeParent = "Microsoft.Network/FirewallPolicies"
$location = "westus2"
$location = "francecentral"
$vnetName = Get-ResourceName
$pacFile ="https://packetcapturesdev.blob.core.windows.net/explicit-proxy/pacfile.pac?sp=r&st=2022-06-02T21:14:54Z&se=2022-07-15T05:14:54Z&spr=https&sv=2021-06-08&sr=b&sig=VqX7Jfqb0P2HhuoDFDCeGLHvtM65Tu8lpkV96kCWZn0%3D"
$identityName = "PacFileMSI-testExplicitProxyV2"
$identityRG = "ExplicitProxy_clipstestresource"
$pacFileURL = "https://eproxypstestresources.blob.core.windows.net/explicitproxycontainer/proxy.pac"

try {

# Create the resource group
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $location -Tags @{ testtag = "testval" }

$explicitProxySettings = New-AzFirewallPolicyExplicitProxy -EnableExplicitProxy -HttpPort 85 -HttpsPort 121 -EnablePacFile -PacFilePort 122 -PacFile $pacFile
#GetIdentityPrincipalId
$identity = Get-AzUserAssignedIdentity -ResourceGroupName $identityRG -Name $identityName

$userAssignedIdentity = @($identity.Id)

$explicitProxySettings = New-AzFirewallPolicyExplicitProxy -EnableExplicitProxy -HttpPort 85 -EnablePacFile -PacFilePort 122 -PacFile $pacFileURL

# Create AzureFirewallPolicy (with Explicit Proxy Settings)
$azureFirewallPolicy = New-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgname -Location $location -ExplicitProxy $explicitProxySettings
$azureFirewallPolicy = New-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgname -Location $location -ExplicitProxy $explicitProxySettings -UserAssignedIdentityId $userAssignedIdentity

# Get AzureFirewallPolicy
$getAzureFirewallPolicy = Get-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgname
Expand All @@ -1622,22 +1630,96 @@ function Test-AzureFirewallPolicyExplicitProxyCRUD {
Assert-AreEqual (Normalize-Location $location) $getAzureFirewallPolicy.Location
Assert-NotNull $getAzureFirewallPolicy.ExplicitProxy
Assert-AreEqual 85 $getAzureFirewallPolicy.ExplicitProxy.HttpPort
Assert-AreEqual 121 $getAzureFirewallPolicy.ExplicitProxy.HttpsPort
Assert-AreEqual 122 $getAzureFirewallPolicy.ExplicitProxy.PacFilePort
Assert-AreEqual $pacFile $getAzureFirewallPolicy.ExplicitProxy.PacFile
Assert-AreEqual $pacFileURL $getAzureFirewallPolicy.ExplicitProxy.PacFile
Assert-AreEqual $identity.principalid $getAzureFirewallPolicy.Identity.UserAssignedIdentities.Values[0].principalId

# Modify
$exProxy = New-AzFirewallPolicyExplicitProxy -EnableExplicitProxy -HttpPort 86 -HttpsPort 123 -EnablePacFile -PacFilePort 124 -PacFile $pacFile
$exProxy = New-AzFirewallPolicyExplicitProxy -EnableExplicitProxy -HttpPort 86
# Set AzureFirewallPolicy
$azureFirewallPolicy.ExplicitProxy = $exProxy
Set-AzFirewallPolicy -InputObject $azureFirewallPolicy
$getAzureFirewallPolicy.ExplicitProxy = $exProxy
$getAzureFirewallPolicy.Identity.Type = "None"
Set-AzFirewallPolicy -InputObject $getAzureFirewallPolicy
$getAzureFirewallPolicy = Get-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgname

Assert-NotNull $getAzureFirewallPolicy.ExplicitProxy
Assert-AreEqual 86 $getAzureFirewallPolicy.ExplicitProxy.HttpPort
Assert-AreEqual 123 $getAzureFirewallPolicy.ExplicitProxy.HttpsPort
Assert-AreEqual 124 $getAzureFirewallPolicy.ExplicitProxy.PacFilePort
Assert-AreEqual $pacFile $getAzureFirewallPolicy.ExplicitProxy.PacFile
Assert-Null $getAzureFirewallPolicy.ExplicitProxy.EnablePacFile
Assert-Null $getAzureFirewallPolicy.Identity

}
finally {
# Cleanup
Clean-ResourceGroup $rgname
}
}

<#
.SYNOPSIS
Tests AzureFirewall Policy With Multiple Identities
#>
function Test-AzureFirewallPolicyMultipleIdentities {
$rgname = Get-ResourceGroupName
$azureFirewallPolicyName = Get-ResourceName
$location = "francecentral"
$tlsIdentityName = "TLSIdentity_clipstestresource"
$eproxyIdentityName = "PacFileMSI-testExplicitProxyV2"
$keyvaultSecretID = "https://explicitproxyclipskv.vault.azure.net/secrets/cacert/e99a9c61211d499aa2950da88d8e6966"
$pacFileURL = "https://eproxypstestresources.blob.core.windows.net/explicitproxycontainer/proxy.pac"
$secretName = "cacert"
$resourceRG = "ExplicitProxy_clipstestresource"


try {
# Create the resource group
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $location -Tags @{ testtag = "testval" }

#GetIdentity
$tlsIdentity = Get-AzUserAssignedIdentity -ResourceGroupName $resourceRG -Name $tlsIdentityName

$eproxyIdentity = Get-AzUserAssignedIdentity -ResourceGroupName $resourceRG -Name $eproxyIdentityName

#Enable Explicit Proxy - Single MSI
$userAssignedIdentity = @($eproxyIdentity.Id)
$explicitProxySettings = New-AzFirewallPolicyExplicitProxy -EnableExplicitProxy -HttpPort 85 -EnablePacFile -PacFilePort 122 -PacFile $pacFileURL

# Create AzureFirewallPolicy (with Explicit Proxy Settings)
$azureFirewallPolicy = New-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgname -Location $location -SkuTier Premium -ExplicitProxy $explicitProxySettings -UserAssignedIdentityId $userAssignedIdentity

#Get Azure FirewallPolicy
$getAzureFirewallPolicy = Get-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgname

#verification
Assert-AreEqual $rgName $getAzureFirewallPolicy.ResourceGroupName
Assert-AreEqual $azureFirewallPolicyName $getAzureFirewallPolicy.Name
Assert-NotNull $getAzureFirewallPolicy.Location
Assert-AreEqual (Normalize-Location $location) $getAzureFirewallPolicy.Location
Assert-NotNull $getAzureFirewallPolicy.ExplicitProxy
Assert-AreEqual 85 $getAzureFirewallPolicy.ExplicitProxy.HttpPort
Assert-AreEqual 122 $getAzureFirewallPolicy.ExplicitProxy.PacFilePort
Assert-AreEqual $pacFileURL $getAzureFirewallPolicy.ExplicitProxy.PacFile
Assert-AreEqual 1 $getAzureFirewallPolicy.Identity.UserAssignedIdentities.Count

$userAssignedIdentity = @($eproxyIdentity.Id, $tlsIdentity.Id)

$azureFirewallPolicy = Set-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgname -Location $location -SkuTier Premium -TransportSecurityName $secretName -TransportSecurityKeyVaultSecretId $keyvaultSecretID -UserAssignedIdentityId $userAssignedIdentity


#Get Azure FirewallPolicy
$getAzureFirewallPolicy = Get-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgname

#Disable TLS, Explicit Proxy and Remove Managed Identity
$getAzureFirewallPolicy.Identity.Type = "None"
$getAzureFirewallPolicy.ExplicitProxy = $null
$getAzureFirewallPolicy.TransportSecurity = $null
Set-AzFirewallPolicy -InputObject $getAzureFirewallPolicy

#Get Azure FirewallPolicy
$getAzureFirewallPolicy = Get-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgname

#verification
Assert-Null $getAzureFirewallPolicy.ExplicitProxy
Assert-Null $getAzureFirewallPolicy.TransportSecurity
}
finally {
# Cleanup
Expand Down
Loading
Loading